Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blocking Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Ad Blocker Programs, Ad Blocking Programs, Blocking Software, Ad Blockers, Ad Blocker Software
DEFINITION: Software programs that block ads while Web browsing.
Ad Blocking Software Reports
101 - 125 of 1002 Matches Previous Page  |  Next Page
Automating the back office: How BPM can help improve productivity
sponsored by TIBCO Software Inc.
WHITE PAPER: This white paper describes how some major retail banks have accomplished significant productivity and quality improvements by using BPM to automate the back office.
Posted: 17 Mar 2015 | Published: 17 Mar 2015

TIBCO Software Inc.

Avoiding Unpleasant ERP Surprises
sponsored by IFS
WHITE PAPER: Prepare your organization for a successful ERP implementation and find out about the consequences of ERP gone wrong.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

IFS

Best Practices for Improving Mobile Data Security
sponsored by SearchSecurity.com
EGUIDE: This expert guide from SearchConsumerization.com takes an in-depth look at mobile data security best practices, including creating a robust PIN or passcode, implementing anti-malware, understanding the top mobile risks and how to offset them, and much more.
Posted: 15 Jul 2013 | Published: 15 Jul 2013

SearchSecurity.com

Best Practices for Selecting an Enterprise Time and Attendance System
sponsored by Workforce Software
WHITE PAPER: Access this guide to selecting an enterprise time and attendance system for assistance in identifying and describing necessary product capabilities. Additionally, this guide provides questions to ask potential providers to uncover if they have the resources, expertise, and products capable of optimizing your current processes.
Posted: 24 Mar 2015 | Published: 09 Mar 2015

Workforce Software

Best Practices – Maximizing Efficiency Through Service Automation
sponsored by FrontRange Solutions Inc.
WHITE PAPER: Automating tasks such as provisioning, management, and issue remediation enables IT organizations to transform into a true broker of services, which is extremely beneficial for IT service delivery and overall business efficiency. This white paper provides best practices for using service automation to maximize efficiency and get closer to XaaS.
Posted: 02 Feb 2015 | Published: 31 Oct 2014

FrontRange Solutions Inc.

BP Turns to Fujitsu for Technology Upgrade
sponsored by Cisco & Fujitsu
VIDEO: Find which vendor BP selected to ensure a seamless transition to their new operating system.
Posted: 20 Oct 2014 | Premiered: 11 Feb 2014

Cisco & Fujitsu

Breaking Down Silos and Securing Directory Access
sponsored by IBM
WHITE PAPER: Access this white paper to learn strategies to breaking down directory siloes and how to manage and protect heterogeneous data sources.
Posted: 20 Feb 2015 | Published: 08 Oct 2014

IBM

Brian Madden predicts how Wyse vWorkspace 8.5 will fare in the VDI market
sponsored by Dell, Inc.
EGUIDE: In this expert e-guide, world-renowned independent desktop virtualization expert Brian Madden offers his insight into the release of Wyse vWorkspace 8.5. Find out what he thinks of its simplicity, price and Dell enterprise support, and how it will compare to the competition.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Dell, Inc.

Build a Strong Security Foundation with the Right Endpoint Protection
sponsored by ESET
WHITE PAPER: This white paper describes one endpoint protection solution that has proven to provide a strong foundation.
Posted: 12 Mar 2015 | Published: 31 Dec 2014

ESET

Build more robust native mobile applications with IBM the MobileFirst Platform
sponsored by IBM
WHITE PAPER: Learn how IBM MobileFirst Platform Foundation can securely enable mobile application development, delivery and management.
Posted: 15 Sep 2014 | Published: 30 Jun 2014

IBM

Automating Your Code Review: Moving to a SaaS Model for Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security.
Posted: 07 Jun 2010 | Published: 10 Feb 2009

Veracode, Inc.

AVG Anti-Virus Network Edition Delivers Rock Solid, Easy to Manage Protection for US Construction Firm
sponsored by AVG Technologies USA, Inc.
CASE STUDY: R&O Construction was having difficulty managing their mostly mobile network. With so many laptops and mobile devices in use remotely, the company was seeing an increase in security threats infecting the IT infrastructure. Their existing solution was overtaxing both system and human resources. Read on to learn how they overcame these challenges.
Posted: 31 Mar 2010 | Published: 31 Mar 2010

AVG Technologies USA, Inc.

Avoiding 7 Common Mistakes of IT Security Compliance
sponsored by Qualys, Inc.
EGUIDE: This guide describes seven typical mistakes of IT security compliance and how you can use these lessons to help your organization achieve its compliance goals.
Posted: 21 Oct 2009 | Published: 01 Apr 2009

Qualys, Inc.

B.F. Saul Company Finds Flexibility in Sharing and Securing Information with TITUS
sponsored by TITUS
WHITE PAPER: This brief white paper details a SharePoint security system that provides high-level security for important content while also allowing end-users to easily access the documents they need.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

TITUS

Bailing Out Your Budget: How Websense Lowers Your TCO
sponsored by Websense, Inc.
WHITE PAPER: The unfortunate reality for today’s enterprises is that IT security risks continue to escalate at the same time that the resources available to mitigate them are diminishing or, at best, remaining constant.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

Websense, Inc.

Balancing Risk and Complexity with Quality Management
sponsored by IBM
WHITE PAPER: This white paper shows you how a combined IBM and Wind River quality management solution can help you deliver higher-quality products to the marketplace faster.
Posted: 21 Mar 2011 | Published: 21 Mar 2011

IBM

Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett-Packard Company
WHITE PAPER: In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013

Hewlett-Packard Company

Battling Modern Botnets in the Enterprise
sponsored by FireEye
WHITE PAPER: The prevalence of botnets is growing at an alarming rate. The FBI ranked cybercrime as one of it's top priorities and noted that it cost businesses $67.2 billion in 2005 alone. Learn how to keep botnets out of your business.
Posted: 29 Sep 2008 | Published: 01 Sep 2008

FireEye

Becoming More Energy Efficient
sponsored by IBM Software Group
WHITE PAPER: Watch this short video to learn what defines a true green data center. This initial Business First investigation report will help answer these questions -- what is a green data center and why do I need one?
Posted: 15 Feb 2008 | Published: 14 Feb 2008

IBM Software Group

Best practices for implementing 2048-bit SSL
sponsored by Citrix
WHITE PAPER: Ready for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

Citrix

Best Practices in Contract Management: How to Shrink Your Sales Cycle through Smart Contract Management
sponsored by SpringCM
WHITE PAPER: This white paper discusses the seven best practices in contract management. It's time for you to think about how to manage your contracts more effectively, close more deals, and get more cash. Learn how in this paper.
Posted: 16 Apr 2008 | Published: 11 Oct 2010

SpringCM

Better Software Management and More Secure Computers
sponsored by Dell, Inc. and Intel®
CASE STUDY: This whitepaper details the systems management solution that Princeton University selected to solve their three major IT problems.
Posted: 18 Jun 2014 | Published: 05 Dec 2013

Dell, Inc. and Intel®

Beyond UTM -- The Value of a Purpose-built Network Security Platform
sponsored by Fortinet, Inc.
WHITE PAPER: It is only with a purpose-built network security platform -- as defined by this paper -- that organizations will be assured of maximum security effectiveness, minimum cost of ownership, and the greatest degree of.
Posted: 27 Dec 2007 | Published: 01 Aug 2007

Fortinet, Inc.

Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)

IBM.

Bringing the Power of Web 2.0 to the Enterprise
sponsored by OpenText Corporation
WHITE PAPER: The key to Enterprise 2.0 is to bring the worlds of ECM and Web 2.0 together, so that companies can gain the best of both.
Posted: 14 May 2008 | Published: 09 May 2008

OpenText Corporation
101 - 125 of 1002 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement