Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blocking Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Ad Blocker Programs, Ad Blocking Programs, Blocking Software, Ad Blockers, Ad Blocker Software
DEFINITION: Software programs that block ads while Web browsing.
Ad Blocking Software White Papers (View All Report Types)
151 - 175 of 540 Matches Previous Page  |  Next Page
Eight Essential Elements for Effective Threat Intelligence Management
sponsored by BrightPoint Security
WHITE PAPER: This white paper contains eight techniques you can adopt to keep up with the ever-shifting threat intelligence landscape.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

BrightPoint Security

Endpoint Security for Today's Cyber Risks
sponsored by Malwarebytes Corporation
WHITE PAPER: In this white paper, discover how you can create layered endpoint security with the combination of anti-malware and anti-exploit software.
Posted: 07 May 2015 | Published: 07 May 2015


Ensuring the security of your mobile business intelligence
sponsored by IBM
WHITE PAPER: Organizations need to know that when their employees access BI applications from their mobile devices, whether from a native application or the web, that security measures are in place to ensure their BI data is protected and safe from hackers or if a device is ever lost or stolen. Read to find strategies on how to best secure BI on mobile devices.
Posted: 24 Sep 2012 | Published: 24 Sep 2012

IBM

Enterprise Development in the Cloud: Top Benefits, Drivers, and Concerns
sponsored by Red Hat
WHITE PAPER: According to a survey of 408 enterprise IT software development professionals, enterprises using the cloud see improvements in time to market as well as higher productivity. Read this white paper for key findings from this survey regarding enterprise development in the cloud.
Posted: 21 Apr 2015 | Published: 17 Jun 2014

Red Hat

ESG Lab Report: Delivering QoS with VMware Virtual Volumes
sponsored by NexGen Storage
WHITE PAPER: Free ESG Lab Report on vSphere 6 Integration. Download this ESG Lab Review to learn about NexGen VVOL integration and storage QoS. Manage virtual environments on a per-VM basis.
Posted: 27 May 2015 | Published: 27 May 2015

NexGen Storage

Expert Tips to Keep Your Mobile App Secure
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how enterprises can address the security problems in their app development.
Posted: 12 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

Extending Role Security in Analysis Services for SQL Server
sponsored by Global Knowledge
WHITE PAPER: This step-by-step guide describes a method that allows users to extend role security in Analysis Services for SQL Server.
Posted: 20 Jan 2014 | Published: 31 Dec 2013

Global Knowledge

Effectively Manage Permissions in Microsoft SharePoint 2010
sponsored by TITUS
WHITE PAPER: This white paper details security permissions of SharePoint. Read on to learn how you can apply security permissions  to sensitive content in SharePoint and further you understanding of fine grained permissions within SharePoint without affecting business operations.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

TITUS

Eight Strategies for First Rate Customer Service
sponsored by Cisco Systems, Inc.
WHITE PAPER: This paper provides eight strategies for creating a relationship with your customers that will keep them coming back.
Posted: 06 Oct 2008 | Published: 03 Oct 2008

Cisco Systems, Inc.

EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar Vulnerability Manager
sponsored by IBM
WHITE PAPER: Many security teams struggle with the limitations of traditional, isolated security tools. For today's complex IT infrastructure, you need a comprehensive, integrated way to manage the security of your applications, network, and data.
Posted: 06 Dec 2013 | Published: 03 Jul 2013

IBM

EMC Documentum Enterprise Records Management: The Problem of Enterprise Records Management
sponsored by EMC Corporation
WHITE PAPER: This paper examines how one solution provider, EMC, is helping customers address electronic discovery challenges by helping customers manage their information infrastructure more effectively.
Posted: 13 Mar 2008 | Published: 01 Aug 2007

EMC Corporation

Endpoint Protection Performance Benchmarks
sponsored by GFI Software
WHITE PAPER: View this endpoint protection performance benchmark report to explore the impact of GFI Software on system performance for its end users based on a set of objective metrics including: installation time, boot time, average CPU usage, memory usage and more.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

GFI Software

Enterprise Antivirus Security: How Does Your Solution Stack Up?
sponsored by Webroot
WHITE PAPER: Thousands of malware attacks occur on a daily basis, and businesses are always searching for a solution to these threats. Inside, access a survey that explores anti-virus solutions and how each measures up. Check out the results to see if your security is up to date.
Posted: 20 Jul 2012 | Published: 30 Mar 2012

Webroot

ENTERPRISE APPLICATION ARCHIVING: Unified Protection and Management for Enterprise Application Output
sponsored by EMC Corporation
WHITE PAPER: Today easy management of and access to archives is more than compliance and governance, it is also about improving service, repurposing content, creating new revenue streams, protecting public safety and more.
Posted: 13 Mar 2008 | Published: 12 Mar 2008

EMC Corporation

Enterprise Single Sign-On The Holy Grail of Computing
sponsored by Dell Software
WHITE PAPER: In today's enterprise, IT managers are faced with the growing challenge of keeping track of multiple passwords and system identities. In this document, we'll discuss how Quest approaches enterprise single sign-on and a unique solution that addresses nearly all facets of the challenges.
Posted: 02 Oct 2009 | Published: 02 Oct 2009

Dell Software

Epicor ICE 2.0: Introducing Next-Generation Business Architecture
sponsored by Epicor Software Corporation
WHITE PAPER: Epicor Internet Component Environment (ICE) 2.0 is a modern business architecture and application framework which utilizes a 100% service-oriented architecture (SOA) and Web 2.0 technologies for a new breed of enterprise solution.
Posted: 21 Nov 2008 | Published: 21 Nov 2008

Epicor Software Corporation

Evaluating Wireless Intrusion Prevention
sponsored by AirTight Networks, Inc.
WHITE PAPER: This resource will help you learn more about wireless intrusion prevention systems (WIPS) and how they can help your organization stay ahead of wireless attacks. Find out how these systems work, what they can do for your security posture, and what to look for in a WIPS solution.
Posted: 16 Apr 2013 | Published: 15 Apr 2013

AirTight Networks, Inc.

Evaluation of Enterprise Backup and Recovery Software and Vendors
sponsored by Commvault
WHITE PAPER: Access this exclusive resource for a complete list of findings of an enterprise backup and recovery software and vendor evaluation conducted by Forrester Research, Inc.
Posted: 20 Mar 2014 | Published: 28 Jun 2013

Commvault

Fact or Fiction Security Survival Guide
sponsored by Lumension
WHITE PAPER: This guide serves as a good first step in preparing us from falling into the trap of security misconceptions and sets the record straight about each misconception that are most likely to encounter while talking to colleagues or vendors.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension

Fast and Effective Endpoint Security for Business
sponsored by ESET
WHITE PAPER: This white paper demonstrates how, by combining powerful management tools, ease of use for end users, impressive performance and state-of-the-art proactive threat detection, ESET NOD32 Antivirus is the most effective way to protect your business’ valuable data assets while ensuring regulatory compliance.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

ESET

Fidelity Information Services and IBM Storwize V7000 with IBM System Storage Easy Tier
sponsored by IBM
WHITE PAPER: This paper describes the benchmark results of a leading server/storage configuration. Obtain detailed information on the unique configuration that was tested as well as the specific architectural components.
Posted: 14 Nov 2013 | Published: 31 Mar 2012

IBM

Find Security Vulnerabilities in Your ASP.NET Applications before Hackers Do
sponsored by Compuware Corporation
WHITE PAPER: Download this product brief to learn how Compuware DevPartner SecurityChecker can help developers build security into applications before applications go into production.
Posted: 01 Dec 2006 | Published: 01 Oct 2006

Compuware Corporation

Five Security Considerations for the Mobile Age
sponsored by IBM
WHITE PAPER: While mobility presents today's organizations with new business opportunities, it also introduces alarming security risks. This guide counts down five key security issues you need to consider in order to drive mobile success.
Posted: 17 May 2013 | Published: 31 Dec 2012

IBM

Five Steps to Building Visibility and Security Into Your Network
sponsored by Ixia
WHITE PAPER: Discover five steps you need to take to not only build visibility and security into your network, but also get the most out of your current monitoring investments.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

Ixia

Five Technologies Simplifying Infrastructure Management
sponsored by Liebert Corporation
WHITE PAPER: This paper describes five infrastructure technologies that are making it easier for growing businesses to introduce new IT systems as needed while maintaining high levels of availability.
Posted: 20 Feb 2008 | Published: 01 Jan 2007

Liebert Corporation
151 - 175 of 540 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement