Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blockers

RSS Feed    Add to Google    Add to My Yahoo!
Ad Blockers Reports
 
Defining Modern Hybrid Security: Enable Cloud-powered Data Protection
sponsored by Amazon Web Services
WHITE PAPER: With the blisteringly fast pace of change in cloud data protection, settling for architecture that doesn't provide what organizations are seeking is a death knell for data security. In this ESG report learn what, how, and why a hybrid cloud architecture could be right for your enterprise's data security needs.
Posted: 23 Mar 2017 | Published: 23 Mar 2017

Amazon Web Services

Sleeping Android: the danger of dormant permissions
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis series explains how weaknesses in the Android platform could leave users open to exploitation or abuse.
Posted: 13 Mar 2017 | Published: 04 Mar 2013

ComputerWeekly.com

London Theatre Direct Presents APIs for Better Ticket Selling
sponsored by TIBCO Software Inc.
CASE STUDY: Learn how London Theatre Direct leveraged an API platform to make their system more user-friendly, creating real-time availability for ticketing, secure booking, and customer reviews. Discover how they turned open APIs into a key business differentiator that offers high-volume traffic, reliability, and better customer experiences.
Posted: 07 Mar 2017 | Published: 16 Feb 2017

TIBCO Software Inc.

Geek Guide: Containers 101
sponsored by Puppet
EBOOK: This guide defines what containers are, how they work, and how developers can use them for rapid development initiatives. Learn about how to optimize the value of containers, what's involved in managing them, how configuration management applies to them, and more.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Puppet

How to Achieve Stronger Information Security
sponsored by Iron Mountain
WHITE PAPER: Find out just how important paper is to data privacy and the risks created from ignoring it. Plus, uncover a free guide to help you achieve stronger information security.
Posted: 16 Mar 2017 | Published: 25 Jan 2016

Iron Mountain

Reduce the Number of Ransomware Infections Across Your Organization
sponsored by Cisco and Dimension Data
WHITE PAPER: Ransomware is becoming a bigger threat every quarter. Learn what ransomware truly is and how it works, as well as what can be done to mitigate its threat to your organization.
Posted: 24 Mar 2017 | Published: 24 Mar 2017

Cisco and Dimension Data

The Rise of the Secure Internet Gateway
sponsored by Cisco and Dimension Data
WHITE PAPER: With the responsibility of preventing and mitigating the damage of breach risks falling heavily on the shoulders of IT pros, the reality of the cloud, a mobile workforce, and borderless networks can make their job seem nearly impossible. In this white paper learn how to change the game's rules when it comes to better protecting today's workforce.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Cisco and Dimension Data

Mobile Development and App Refactoring: Modernizing Legacy Apps
sponsored by PowWow
EGUIDE: In this expert e-guide, we explore how to transform traditional web apps into modern mobile apps using an app refactoring platform. Discover how refactoring is emerging as a competitive method for accelerating mobile development and updating legacy apps. Plus, learn about how the app refactoring market is changing.
Posted: 07 Mar 2017 | Published: 23 Feb 2017


Take Traditional Apps Mobile Quickly and Easily
sponsored by PowWow
VIDEO: Watch this brief video to learn about a platform that allows you to consolidate and transform legacy apps for mobile quickly and easily. Discover how to create user-friendly UIs, extend the business logic of apps with a JavaScript template, and more.
Posted: 20 Mar 2017 | Premiered: 21 Feb 2017


2017 Analyst Report for Application Security Testing
sponsored by IBM
WHITE PAPER: In this report, analysts review 18 application security testing (AST) tools. Learn which ones improve coordination between development and security teams.
Posted: 16 Mar 2017 | Published: 16 Mar 2017

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement