Software  >   Systems Software  >   Server Software  >   Firewall Server Software  >  

Desktop Firewall Software

RSS Feed    Add to Google    Add to My Yahoo!
Desktop Firewall Software White Papers (View All Report Types)
 
A Buyer's Guide to Endpoint Protection Platforms
sponsored by Intel Security
WHITE PAPER: This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012

Intel Security

Overcome 5 Objections to Using Visual App Development
sponsored by AppGyver
WHITE PAPER: This white paper explores how to tackle modern mobile app challenges by leveraging visual, low-code app development. Discover the top 5 objects against visual app development platforms and learn how to overcome them to accelerate and simplify your development initiatives.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

AppGyver

An Integrated Platform Approach Brings IT Goals within Reach
sponsored by Red Hat
WHITE PAPER: IT is taking advantage of new aggregations of servers, open source operating systems, and in-memory technology to accelerate business transformation. Discover how these tools can help leverage big data and analytics, modernize the data warehouse, and more.
Posted: 19 Jul 2016 | Published: 19 Jul 2016

Red Hat

Microservices Done Right with API Management
sponsored by Apigee
WHITE PAPER: This white paper explores how important APIs are for managing and securing microservice architectures. Learn about how API management platforms create analytics and reporting capabilities for deep visibility, deliver modern RESTful APIs for legacy services, boost Agile development, expose microservices securely, and more.
Posted: 02 Mar 2017 | Published: 02 Mar 2017

Apigee

Five Simple Symbols You Should Know to Unlock Your PowerShell Potential
sponsored by Global Knowledge
WHITE PAPER: Read this white paper to uncover and learn about the five sysmbols regularly used in PowerShell and become well-equipped to follow the logic of many cmd scripts.
Posted: 15 Jun 2015 | Published: 15 Jun 2015

Global Knowledge

Intelligent Business Process Management for the Enterprise
sponsored by Red Hat
WHITE PAPER: By combining business process management, resource planning, and complex event processes into a single, integrated strategy, teams can experience the benefits of Agile development. Uncover ways to achieve automated business operations and shorter development cycles with a cloud-ready architecture.
Posted: 16 Aug 2016 | Published: 16 Aug 2016

Red Hat

Modernize Any App or Workflow for Mobile
sponsored by PowWow
WHITE PAPER: This white paper examines a mobile development platform that facilitates the transformation of legacy apps and systems. Discover a modern method that enables you to build and modernize any workflow or app, connect data sources and APIs, create an intuitive user experience, and more.
Posted: 23 Feb 2017 | Published: 01 Dec 2016


DevOps, the Cloud, and AWS: Tying it All Together
sponsored by Chef Software
WHITE PAPER: This white paper explores how to implement DevOps, using an automation platform in conjunction with AWS cloud resources. Discover how this approach can decrease time to market and reduce costs. Plus, uncover some critical best practices for workflow automation.
Posted: 04 Nov 2016 | Published: 04 Nov 2016

Chef Software

Forget Hand-Coding: 5 Development Challenges to Consider
sponsored by OutSystems
WHITE PAPER: In this white paper, you'll explore 5 development challenges to consider when using hand coding over a RAD platform as a development method. Learn why apps typically require 10x more work today, and tools that make development times faster and more simplified.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

OutSystems

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement