Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blockers

RSS Feed    Add to Google    Add to My Yahoo!
Ad BlockersReports
 
ROI Assessment Tool: Assess the Value of Deployment Automation
sponsored by IBM
ASSESSMENT TOOL: Software deployment automation can notably accelerate project lifecycle timeframes and reduce the number of errors that need to be addressed during development. Use this tool to receive a targeted analysis of your needs, and find out what ROI your organization can expect from deployment automation.
Posted: 14 Aug 2014 | Published: 14 Aug 2014

IBM

Case Study: How a Global Bank Addressed App Security and Lowered Costs
sponsored by Veracode, Inc.
CASE STUDY: A global leader of major banks mandated a new top-down approach to reduce application-layer risk throughout its global software infrastructure. View this case study to see how a security solution helped this bank assess their security needs and reduce the opportunity for exploitation.
Posted: 14 Aug 2014 | Published: 14 Aug 2014

Veracode, Inc.

Software Quality Assurance Testing: First Mobile Steps
sponsored by IBM
EGUIDE: The process for testing mobile applications isn't quite the same as testing more traditional Web and desktop ones. In this e-guide, uncover 4 valuable tips to help software quality assurance teams successfully approach mobile app testing.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

IBM

Living with open source software
sponsored by Hewlett-Packard Company
VIDEOCAST: This expert webcast highlights the risks of open source code in software projects, and explains why applications are vulnerable to attack from the moment they go live on the internet.
Posted: 07 Oct 2014 | Premiered: Sep 29, 2014

Hewlett-Packard Company

Cybercrime Investigation Use Case: Visualizing Data with Investigative Software
sponsored by DomainTools
WHITE PAPER: In this resource, learn how to accelerate your cybercrime investigations with a data visualization tool. Explore a step-by-step use case and discover how simple it is to choose between several visualization options to quickly spot commonalities in large data sets.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

DomainTools

Unified Threat Management Provides Simplified Management and Increase Security
sponsored by Sophos, Inc.
SOFTWARE DEMO: Check this software trial download to experience firsthand how new UTM solutions can help boost your current security solution with centralized management, flexible deployment, and high performance.
Posted: 18 Sep 2014 | Premiered: 18 Sep 2014

Sophos, Inc.

Firewall Buyers Guide: Evaluate Options Before the Big Decision
sponsored by Sophos, Inc.
WHITE PAPER: This firewall buyer's guide can help you to identify the right solution for your organization, whether you're looking for an alternative to a network firewall to add enhanced functionality, want to reduce the number of network security products you currently manage, or are in need of more visibility and control over your web users.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

Sophos, Inc.

Data Deduplication: Types and Benefits
sponsored by Dell Software
EGUIDE: In this e-guide, learn from expert Rachel Dines, an analyst with Forrester Research, the differences between software and hardware backup deduplication, post process vs. inline deduplication as well as fixed and variable-block length dedupe.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Dell Software

NCSU - IBM PowerLinux - Industry standard Linux systems, solutions tuned to the task
sponsored by IBM
WEBCAST: This video explores a leading solution delivering industry standard Linux systems services faster, with higher quality, and more economically than others. Learn how it combines a leading hardware, Linux software, and domain expertise of different industries resulting in higher quality operations that keep pace with modern business.
Posted: 20 Oct 2014 | Premiered: Apr 23, 2012

IBM

Combatting Digital Fraud: A CIO Report
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this informative white paper, explore a web threat detection solution that leverages big data to enable security teams to better combat digital fraud.
Posted: 29 Aug 2014 | Published: 30 Jun 2014

RSA, The Security Division of EMC
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement