Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blocking Programs

RSS Feed    Add to Google    Add to My Yahoo!
Ad Blocking Programs Reports
 
Managing App Sideloading Threats on iOS 2015
sponsored by Lookout
WHITE PAPER: This white paper examines the security threats organizations face when attackers continue to abuse enterprise provisioning and use it to sideload malware on iOS devices.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Lookout

The 3 Steps to Protect Your Software Apps from Failure and Attack
sponsored by Rogue Wave Software
WHITE PAPER: This white paper outlines three important steps that software development teams can follow to identify critical coding errors and security vulnerabilities, and protect software against failure and malicious attacks.
Posted: 11 Aug 2015 | Published: 31 Dec 2014

Rogue Wave Software

Playtech case study: Predictive monitoring tools deliver game-changing uptime
sponsored by Hewlett-Packard Limited
WHITE PAPER: Read this white paper to see how automated, integrated monitoring tools helped Playtech monitor web applications predictively to further protect uptime, user experience, and revenue.
Posted: 02 Jun 2015 | Published: 31 Aug 2013

Hewlett-Packard Limited

Forrester: Use Actionable Threat Intelligence to Protect Your Digital Business
sponsored by Symantec Corporation
WHITE PAPER: Download this report from Forrester to figure out the key characteristic of actionable threat intelligence and learn how to maximize threat intelligence to protect your digital business from targeted cyber-attacks.
Posted: 14 Aug 2015 | Published: 14 Aug 2014

Symantec Corporation

Data Security for the Most Sensitive Materials
sponsored by IntraLinks, Inc
WHITE PAPER: Download and discover how you can make even the most sensitive data safe from falling into the wrong hands while simplifying business processes and cutting costs.
Posted: 20 May 2015 | Published: 26 Dec 2014

IntraLinks, Inc

451 Research Report: How One Security Tool Compares against the Rest
sponsored by Splunk
WHITE PAPER: This white paper analyzes a relatively new player in the security market and discusses its capabilities, strengths and weaknesses.
Posted: 13 Aug 2015 | Published: 31 Jan 2014

Splunk

Financial Institution Builds App to Enable Secure Account Access on Any Device
sponsored by Carrington Associates
CASE STUDY: This case study describes Raymond James Financial's journey to build an app that would enable investors to gain secure access to their accounts and contact financial advisors at any time and on any device.
Posted: 02 Jul 2015 | Published: 31 Dec 2014

Carrington Associates

Case Study: Large ISP Transforms DNS, Protects Network
sponsored by Nominum, Inc.
CASE STUDY: The following case study examines how Nominum helped a large North American ISP transform their DNS infrastructure, which in turn allowed the ISP to foil the DDoS attack and safeguard them from further DNS exposure. Access now and learn how you can do the same in your business.
Posted: 14 May 2015 | Published: 14 May 2015

Nominum, Inc.

Breaking the Rules in BRMS Technology
sponsored by Progress
WHITE PAPER: Read this technology spotlight to examine the key benefits and use cases for business rules engines and learn about a specific offering and its contribution to the BRMS market.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Progress

Malware Defense and the Fundamentals of Endpoint Security
sponsored by Malwarebytes Corporation
EGUIDE: This e-guide contains expert advice on malware detection, endpoint security, and more.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement