Software  >   Applications Software  >   Diagnostic and Test Software  >  

Network Traffic Analyzer Software

RSS Feed    Add to Google    Add to My Yahoo!
Network Traffic Analyzer Software White Papers (View All Report Types)
  Delivering Comprehensive Business Monitoring and Protection
sponsored by ArcSight, an HP Company
WHITE PAPER: ArcSight ESM is a sophisticated solution for compliance requirements and protection against external and internal security breaches. Read more to find out.
Posted: 02 Mar 2010 | Published: 02 Mar 2010

ArcSight, an HP Company

How to Successfully Automate the Functional Testing Process
sponsored by Borland Software Corporation
WHITE PAPER: This white paper provides practical insight into the lessons learned by those who have successfully automated the functional testing process.
Posted: 24 May 2006 | Published: 01 May 2006

Borland Software Corporation

Connecting Virtual Desktop and Disaster Recovery
sponsored by Forsythe
WHITE PAPER: Connecting virtual desktop technology with the disaster recovery process has probably not been a major focus for organizations; however, integrating a disaster recovery plan for the virtual desktop is moving up organizational priority lists for a multitude of reasons.
Posted: 20 Nov 2009 | Published: 20 Nov 2009


How Linux Containers Change the Development and Delivery of Applications
sponsored by Red Hat
WHITE PAPER: Discover how to adopt a cloud model for production and consumption of services to facilitate productive DevOps implementation using Linux containers. Read now to deliver the cloud through this container technology, and affect a cost-efficient means of delivering next-gen applications.
Posted: 18 Jul 2016 | Published: 18 Jul 2016

Red Hat

Enable Rapid IT Service Delivery and Innovation with an Infrastructure Built for Cloud-Native Applications
sponsored by Red Hat
WHITE PAPER: This web book explores the cloud infrastructure and tools required to support agile IT methods and applications, and demonstrates why open source technology is the best way to achieve the full benefits of this new, rapid mode of IT service delivery. Learn how innovative applications propelled by IT can create entirely new revenue streams.
Posted: 13 Jan 2016 | Published: 13 Jan 2016

Red Hat

Top 5 Applications You Should Blacklist Now
sponsored by Thycotic
WHITE PAPER: Mitigate the threat presented by the 30 most targeted high-risk vulnerabilities by learning why you should blacklist the following applications: Apple QuickTime for Windows, Adobe Flash Player, iTunes for Windows, and MS Office 2007. Download now to gain the best practices for restricting malicious software.
Posted: 18 Oct 2016 | Published: 18 Oct 2016


Driving Innovation with Platform-As-A-Service
sponsored by Red Hat
WHITE PAPER: Access this white paper to learn how cloud infrastructure, DevOps, microservices, and containers can all be brought together using platform-as-a-service (PaaS) technology. See how a PaaS can provide benefits that include developer agility, operational efficiency, and more.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

Red Hat

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012


The Great Debate: One Integrated Business System vs. Siloed Applications
sponsored by NetSuite
WHITE PAPER: This white paper analyzes the inefficiencies caused by running disparate business applications and systems across your various departments, and demonstrates how a cloud-based software can unify your critical-business processes.
Posted: 04 Dec 2015 | Published: 04 Dec 2015


Lifecycle Management Best Practices for Mobile Apps
sponsored by IBM
WHITE PAPER: This white paper explores the role of app security in mobile app lifecycle management. From design through deployment, learn about the proactive best practices that can simplify and strengthen the development process.
Posted: 11 Aug 2016 | Published: 31 Mar 2016

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement