St. Bernard Software

Latest Content From St. Bernard Software

Demo: Test-Drive a Web Filter: Win a Hot Music Video Game Bundle

by St. Bernard SoftwareFeb 19, 2010

Are your users continually breaking your Web usage policies? Are you still getting slammed with malware, phishing and other Web-borne attacks?

A new wave of threats has hit the Web in recent months. Is your Web filtering technology keeping up?

There is a new, next-generation tool that offers a better way to mitigate Web threats and improve employee productivity.

To see it, register for a free preview of this new technology, and enter for a chance to win a hot music

Whitepaper: 6 Important Steps to Evaluating a Web Filter

by St. Bernard SoftwareNov 18, 2009

Determining the best Web filter for your organization can be difficult with so many choices on the market. IT Professionals know that there?s more to choosing a solution than looking at a few features and comparing prices. Other considerations may be just as important but you may not be aware of their significance. This informative guide discusses the critical considerations you need to make before you decide, and also, how thoroughly analyzing your options can lead to the best long-term

Whitepaper: Filtering the Spectrum of Internet Threats: Defending Against Inappropriate Content, Spyware, IM, and P2P at the Perimeter

by St. Bernard SoftwareJan 01, 2008

Attackers continue to evolve clever methods for reaching victims, such as sending crafty Web links through Instant Messaging (IM) clients or email, or by simply linking to other Web sites that one employees might surf. This white paper examines the threats of allowing unwanted or offensive content into the network and describes the technologies and methodologies to combat these types of threats. Specifically, this paper looks at how one can leverage the features of the St. Bernard Software

Whitepaper: The Powerful Technologies Behind Best-of-Breed Internet Filtering

by St. Bernard SoftwareJan 01, 2008

This paper published by St. Bernard Software states that in order to effectively manage and secure organization from the internal and external threats associated with Internet access, one needs a solution to filter traffic that knows precisely what’s being sent. This paper is written for system administrators and IT professionals that outline the available filtering and classification technologies that can be deployed to secure Internet access.