Software  >   Systems Software  >   Server Software  >  

Intelligent Security Proxies

RSS Feed    Add to Google    Add to My Yahoo!
Intelligent Security Proxies White Papers (View All Report Types)
 
Toward an Identity & Context Virtualization Service: A Buyer’s Guide to Virtual Directories
sponsored by Radiant Logic, Inc.
WHITE PAPER: This paper is a practical guide to choosing the best virtual directory solution to meet your needs, both now and in the future. Check out this white paper for a blueprint on how to evaluate virtual directories, from use cases and technical parameters to the five questions you should ask yourself before choosing a virtualization solution.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

Radiant Logic, Inc.

How to Gain Visibility and Control of Encrypted SSL Web Sessions
sponsored by BlueCoat
WHITE PAPER: Blue Coat's SSL proxy functionality enables organizations to extend the power of the intelligent and secure proxy appliances to all SSL traffic. Read about how a proxy gives visibility and control of SSL communications.
Posted: 20 Sep 2007 | Published: 01 Jan 2006

BlueCoat

Understanding and Selecting a Data Loss Prevention Solution
sponsored by Websense, Inc.
WHITE PAPER: Data Loss Prevention has matured considerably since the release of the first version of this report three years ago. Back then, the market was dominated by startups with only a couple major acquisitions by established security companies.The entire market was probably smaller than the leading one or two providers today.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

Websense, Inc.

A Technical Review of Caching Technologies
sponsored by BlueCoat
WHITE PAPER: The goal of this white paper is to discuss the role of caching, describe in detail how object caching and byte caching works, and show how these caching technologies work together to deliver true performance differentiation.
Posted: 29 Jun 2009 | Published: 17 Dec 2007

BlueCoat

How to Build Mobile Apps in the Enterprise, Faster and Smarter
sponsored by Flowfinity
WHITE PAPER: This white paper explores how to meet the demand for mobile apps with a fully declarative approach. Find out how to avoid the costs and delays of coding, and enable both developers and LOB users to build apps quickly.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

Flowfinity

Availability and Risk Avoidance for the Software-Defined Data Center
sponsored by Veeam Software
WHITE PAPER: Users demand access to information and applications at any given time from anywhere and any device, without tolerance for downtime or data loss. Access this white paper to learn how to keep your software-defined data center up and running at all times with backup and replication that won't leave you in the dark like legacy tools.
Posted: 01 Jun 2017 | Published: 16 Aug 2016

Veeam Software

The Need for Speed: 5 Ways to Get Mobile Apps in the Workplace Faster
sponsored by Flowfinity
WHITE PAPER: This white paper explores how to enable both seasoned developers and LOB users to build critical business apps quickly without the high costs and delays of coding. Discover 5 make-or-break features for an efficient mobile app development platform.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

Flowfinity

DevOps Mythbusting
sponsored by Puppet
WHITE PAPER: In this white paper, discover how a variety of organizations – including Walmart, the New York Stock Exchange, and Staples – successfully implemented DevOps practices and learn the truth about 6 of the most common DevOps myths.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

Puppet

Secure DevOps Survival Guide
sponsored by Veracode, Inc.
WHITE PAPER: If you're embarking on a DevOps journey, traditional methods for ensuring app security just won't be able to keep up. This DevOps survival guide explores the elements of accelerated but secure app development. No matter where you are in your journey, uncover critical tactics for implementing secure DevOps.
Posted: 04 May 2017 | Published: 04 May 2017

Veracode, Inc.

When Software Goes Rogue
sponsored by BDNA
WHITE PAPER: How do you know if your software a rogue one? Do you know how to detect the rebel scum that is renegade software? Access this white paper to learn about BYOD, EOL, and EOS challenges, as well as the levels of vulnerability and how to identify your risks.
Posted: 02 Jun 2017 | Published: 31 May 2017

BDNA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement