Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blocking Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Ad Blocker Programs, Ad Blocking Programs, Blocking Software, Ad Blockers, Ad Blocker Software
DEFINITION: Software programs that block ads while Web browsing.
Ad Blocking Software White Papers (View All Report Types)
26 - 50 of 581 Matches Previous Page  |  Next Page
A Modern Approach To The Data Deluge
sponsored by Red Hat
WHITE PAPER: Find out how businesses are utilizing software-defined storage to manage the increasing levels of technology complexity.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

Red Hat

A New Approach to Data Center Security
sponsored by VMware
WHITE PAPER: The persistent threats and coordinated attacks in today's environment call for a new model of data center security. But how do you implement this new model without incurring huge hardware and firewall costs? Access this white paper to learn how micro-segmentation empowered by a network virtualization platform delivers fine-grained security.
Posted: 05 Aug 2016 | Published: 01 Jul 2016

VMware

A Simple, Elegant, and Powerful Metadata Model
sponsored by Tableau Software
WHITE PAPER: Many business users have trouble seeing and understanding their metadata. Discover a platform that increases flexibility and helps you make the most of enterprise-wide metadata.
Posted: 07 Jul 2016 | Published: 07 Jul 2016

Tableau Software

A Structured Design Approach to Business Process Automation & Custom Software Development
sponsored by Red Hat
WHITE PAPER: Discover how to modernize business automation by capitalizing on advances in software development infrastructure, and incorporate them into a new structured, 6-step design approach that eliminates additional risk.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Red Hat

Accelerate Innovation by Automating New Applications
sponsored by BMC
WHITE PAPER: Tailoring custom automation to any application without scripts or proprietary code eliminates extra barriers that stand between you and market leadership. Uncover ways to deliver new digital services, support the pace of innovation, and more.
Posted: 01 Aug 2016 | Published: 01 Aug 2016

BMC

Accelerating Product Innovation Through Agile Development and Continuous Engineering
sponsored by IBM
WHITE PAPER: Access this white paper to learn more about how agile development and continuous engineering are changing the way software engineers work. Read on to discover how innovation has become central to a new collaborative work environment.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

IBM

Addressing the Security Dangers of "Appification"
sponsored by IBM
WHITE PAPER: Identify the key security dangers of mobile apps in the enterprise and find out how to eliminate them. Learn not only what an enterprise can do for data at rest, data in motion, methods of deployment, and more.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

IBM

Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices
sponsored by Lenovo Software
WHITE PAPER: This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.
Posted: 26 Aug 2016 | Published: 21 Sep 2015

Lenovo Software

Advanced Threat Protection Buyer’s Guide
sponsored by Fortinet, Inc.
WHITE PAPER: To improve your network security, you must do more than augment the latest technology to your security repertoire. Discover 3 strategies for combating threats of varying sophistication.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Fortinet, Inc.

Agile Development: Why Requirements Matter
sponsored by IBM
WHITE PAPER: Discover how requirements management can bring significant value to agile development in IT-regulated and complex product development projects. Learn how, with the right processes and automations in place, managing requirements can help improve your productivity.
Posted: 05 Jul 2016 | Published: 30 Sep 2014

IBM

An Integrated Approach to Reducing Detection and Response Times
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this white paper to learn about an integrated set of tools that provide a holistic view across the ever-expanding attack surface, and apply big data analytics to detect patterns of concerning behavior faster.
Posted: 03 Mar 2016 | Published: 03 Mar 2016

LogRhythm, Inc.

An Introduction to Software Defined Networks
sponsored by Citrix
WHITE PAPER: This white paper serves as an introduction to SDN as a solution that can serve your enterprise, but only after you parse the competitive landscape of networking suppliers.
Posted: 02 Sep 2015 | Published: 31 Dec 2014

Citrix

Analyst's take: Force.com application drives faster development
sponsored by ComputerWeekly.com
WHITE PAPER: Nucleus analyzed existing Force.com application deployments and found an average of 4.9 times faster development.  End customers, developers, and ISVs experience more rapid time to value, lower cost, and greater ongoing flexibility.
Posted: 21 Oct 2011 | Published: 18 Feb 2011

ComputerWeekly.com

A Guide to Accelerating Business Value for Microsoft Environments
sponsored by EMC Corporation
WHITE PAPER: In this guide we'll learn how EMC can accelerate the business value of Microsoft environments of any size and scope.
Posted: 10 Mar 2008 | Published: 01 Oct 2007

EMC Corporation

A Guide to Branching and Merging Patterns
sponsored by AccuRev
WHITE PAPER: In this paper, gain a better understanding of how branching and merging patterns work and how applying them to your projects can have a profound effect on how your development team handles change management and delivers software.
Posted: 06 Jan 2012 | Published: 05 Jan 2012

AccuRev

A More Rational Approach to Endpoint Security: Five Reasons to Simplify Your Life
sponsored by Intel Security
WHITE PAPER: This resource offers 5 reasons to rethink your current endpoint protection solution. Learn how to reduce security incident response time by 40% while reducing time spent on remediation by 70%. Read now to learn more about next-gen endpoint protection and discover what you might be missing.
Posted: 30 May 2013 | Published: 30 May 2013

Intel Security

A Practical Guide to Combating Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper features research based on thousands of pieces of malware they detected over the course of one year. Access this guide for details on four capabilities designed to help protect your organization against next-generation network threats.
Posted: 18 Jan 2016 | Published: 30 Sep 2014

WatchGuard Technologies, Inc.

A Pragmatic Approach to SIEM
sponsored by Tripwire, Inc.
WHITE PAPER: In this paper we will take a look at this disturbing trend and provide useful guidance for maximizing the value of SIEM and log management tools, while focusing on protecting systems and data not on simply checking the compliance check box.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Tripwire, Inc.

A Tour of HP Sarbanes-Oxley IT Assessment
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper describes HP Sarbanes-Oxley IT Assessment Accelerator, a template of pre-defined information based on ITGI's COBIT, which is loaded into HP Quality Center to help your organization define and execute Sarbanes-Oxley testing, evaluate the results, and develop remediation plans.
Posted: 29 Apr 2009 | Published: 01 Apr 2009

Hewlett Packard Enterprise

A Whole Team Approach to Quality
sponsored by Rally Software
WHITE PAPER: Explore this presentation to develop a new approach to quality. Agile projects help build software incrementally, using short iterations of 1-4 weeks to keep development aligned with business needs. Learn more about the benefits of agile development by reading this resource now.
Posted: 21 Dec 2012 | Published: 21 Dec 2012

Rally Software

Achieve secure mobile access to enterprise applications
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Oracle Corporation UK Ltd

Achieving North American Electric Reliability Corporation (NERC) Cyber Security Standards
sponsored by Lumension
WHITE PAPER: Learn about NERC compliance challenges and how to ensure audit-readiness by delivering end-to-end vulnerability management, endpoint protection and data protection solutions.
Posted: 06 Apr 2009 | Published: 02 Mar 2009

Lumension

Achieving PCI Compliance at the Point Of Sale Using Bit9 Parity™ to Protect Cardholder Data
sponsored by Bit9, Inc.
WHITE PAPER: As the technology used by merchants and their partners has evolved, card fraud has become more sophisticated. In response to this evolving threat, the major credit card companies have created a set of security standards to protect their customers from security breaches. Read this whitepaper to find out how Bit9 Parity helps achieve compliance...
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.

Acronis Backup & Recovery® 11.5 Virtual Edition for Hyper-V®
sponsored by Acronis
WHITE PAPER: Check out this exclusive white paper to find out the ins and outs of Acronis Backup and Recovery 11.5 Virtual Edition for Hyper-V, and how it will provide top-notch protection for your Hyper-V environment.
Posted: 24 Feb 2014 | Published: 31 Dec 2013

Acronis

Advanced Threat Protection Checklist
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how to assess your current and proposed security posture against a baseline set of requirements to ensure you pick the right security option for your organization. Uncover 3 overarching recommendations for security.
Posted: 10 Feb 2016 | Published: 10 Feb 2016

Fortinet, Inc.
26 - 50 of 581 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement