Software  >   Systems Software  >   Server Software  >  

Security Proxies

RSS Feed    Add to Google    Add to My Yahoo!
Security Proxies White Papers (View All Report Types)
 
A Technical Review of Caching Technologies
sponsored by BlueCoat
WHITE PAPER: The goal of this white paper is to discuss the role of caching, describe in detail how object caching and byte caching works, and show how these caching technologies work together to deliver true performance differentiation.
Posted: 29 Jun 2009 | Published: 17 Dec 2007

BlueCoat

Toward an Identity & Context Virtualization Service: A Buyer’s Guide to Virtual Directories
sponsored by Radiant Logic, Inc.
WHITE PAPER: This paper is a practical guide to choosing the best virtual directory solution to meet your needs, both now and in the future. Check out this white paper for a blueprint on how to evaluate virtual directories, from use cases and technical parameters to the five questions you should ask yourself before choosing a virtualization solution.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

Radiant Logic, Inc.

Web Security Gateway: Web 2.0 Secured and Simplified
sponsored by Websense, Inc.
WHITE PAPER: The Websense Web Security Gateway is designed for customers that want to ensure their level of web security increases as the web evolves from a static resource, to a dynamic communication platform.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

Websense, Inc.

How to Gain Visibility and Control of Encrypted SSL Web Sessions
sponsored by BlueCoat
WHITE PAPER: Blue Coat's SSL proxy functionality enables organizations to extend the power of the intelligent and secure proxy appliances to all SSL traffic. Read about how a proxy gives visibility and control of SSL communications.
Posted: 20 Sep 2007 | Published: 01 Jan 2006

BlueCoat

Understanding and Selecting a Data Loss Prevention Solution
sponsored by Websense, Inc.
WHITE PAPER: Data Loss Prevention has matured considerably since the release of the first version of this report three years ago. Back then, the market was dominated by startups with only a couple major acquisitions by established security companies.The entire market was probably smaller than the leading one or two providers today.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

Websense, Inc.

Expert Tips to Keep Your Mobile App Secure
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how enterprises can address the security problems in their app development.
Posted: 12 Jun 2015 | Published: 31 Dec 2014

CA Technologies.

Could HP’s Superdome X Be the Mission-Critical x86 Platform We’ve Been Waiting For?
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper explores a new approach to the mission-critical x86 Platform. Access now and take a close look at the newly launched x86-based platform that has been designed to provide compute, storage, and networking into a single, more efficient system with a larger number of sockets and cores to achieve a better cost-performance ratio.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Hewlett-Packard Limited

Understanding the Business Value of Migrating to Windows Server 2012
sponsored by Intel
WHITE PAPER: This IDC white paper explores the many benefits of migrating to Windows Server 2012 after end-of-life for WS 2003. Access now and discover why so many businesses have already made the switch and what you would stand to gain doing the same.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Intel

Gartner Market Guide for File Analysis Software
sponsored by Symantec | Veritas
WHITE PAPER: File analysis (FA) enables better information management decisions for unstructured data. Access this market guide for File Analysis software to read about use cases, recommendations, and vendor comparisons.
Posted: 18 Jun 2015 | Published: 23 Sep 2014

Symantec | Veritas

The End is Near: Support for Windows Server 2003 Approaches Deadline
sponsored by Dell and Microsoft
WHITE PAPER: The following white paper explores the ramifications of staying with Windows Server 2003 after end-of-life. Access now and uncover security risks, operational deficiencies, and other hazards that come with the server end-of-life. Read on to learn about migration challenges, how to find the right partner when moving forward, and more.
Posted: 15 May 2015 | Published: 15 May 2015

Dell and Microsoft
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement