Control Internet Access Reports

Print security: An imperative in the IoT era
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: Analyst group Quocirca gives the perspective on the risks and best practices of print security.
Posted: 08 Feb 2021 | Published: 10 Jul 2017

TechTarget ComputerWeekly.com

CW Benelux May 2018
sponsored by TechTarget ComputerWeekly.com
EZINE: GDPR becomes law at the end of this month, so we take a look at how organisations in the Netherlands are preparing for it. Cover your eyes if you are squeamish as you only have days left to get things right.We lead this issue with a story published in February, so perhaps things have changed. But if not, some organisations should be concerned.
Posted: 08 Feb 2021 | Published: 01 May 2018

TechTarget ComputerWeekly.com

Royal Holloway: Investigating the security vulnerabilities and solutions for connected and autonomous vehicle technologies
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article introduces connected and autonomous vehicles, analysing the underlying technologies and considering their cyber security vulnerabilities and attacks. We identify and assess the existing and emerging countermeasures for such vulnerabilities, and propose high-level recommendations.
Posted: 23 Jun 2022 | Published: 23 Jun 2022

TechTarget ComputerWeekly.com

CW Benelux August 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.
Posted: 08 Feb 2021 | Published: 10 Aug 2017

TechTarget ComputerWeekly.com

eBook: Data Security in the E-discovery Process
sponsored by Dell and VMware
EBOOK: In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
Posted: 27 Aug 2013 | Published: 31 Dec 2011

Dell and VMware

Simplify SSL Certificate Management Across the Enterprise
sponsored by Symantec Corporation
WHITE PAPER: Managing SSL Certificates has become a complex task especially for organizations with multiple locations, divisions and increasing Web-based services. In this resource, uncover a five (5) step guide to help you take control on SSL Certificates across the enterprise and key recommendations.
Posted: 07 May 2012 | Published: 07 May 2012

Symantec Corporation

The four rules of complete web protection
sponsored by Sophos
WHITE PAPER: As an IT manager you’ve always known the web is a dangerous place. But with infections growing and the demands on your time and budget rising, it’s time to revisit your strategy. This whitepaper discusses the major web threats and provides four rules to help you stay protected. When you follow them, these rules will also save you time and money.
Posted: 01 Jan 2012 | Published: 16 Dec 2011

Sophos

Kaspersky Endpoint Security 8 for Windows
sponsored by Kaspersky
WHITE PAPER: Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.
Posted: 08 May 2012 | Published: 03 Oct 2011

Kaspersky

Banca Intesa Counters Threats with HP ArcSight
sponsored by Hewlett Packard Enterprise
CASE STUDY: Explore how Banca Intesa, Serbia's leading bank, stays one step ahead of cyber-crime with the help of their security information and event management (SIEM) solution and HP ArcSight – which correlates info across their entire infrastructure.
Posted: 30 May 2014 | Published: 29 Mar 2013

Hewlett Packard Enterprise

The Pros and Cons of Delivering Web Pages Over an SSL Connection
sponsored by TechTarget Security
EGUIDE: Though Secure Sockets Layer (SSL) offers distinct security advantages, there are drawbacks to this method of webpage delivery, as well. This expert e-guide explores the pros and cons of delivering webpages over an SSL connection. See if this strategy is right for your organization – read on to learn more.
Posted: 27 Dec 2012 | Published: 20 Dec 2012

TechTarget Security