Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blocking Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Ad Blocker Programs, Ad Blocking Programs, Blocking Software, Ad Blockers, Ad Blocker Software
DEFINITION: Software programs that block ads while Web browsing.
Ad Blocking Software Reports
101 - 125 of 1398 Matches Previous Page  |  Next Page
Advanced Analytics and Machine Learning: A Prescriptive and Proactive Approach to Security
sponsored by McAfee, Inc.
WHITE PAPER: Overwhelmed by the immense volume of security intelligence and alerts, human analysts need machine learning to augment and accelerate their efforts. In this white paper learn how these programs adapt to threats based on new data in a 3 part learning process, separate static and dynamic data to sift the clean files from the malware, and more.
Posted: 11 Apr 2017 | Published: 28 Feb 2017

McAfee, Inc.

Advanced cyber-security intelligence
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

Advanced Evasion Techniques for Dummies
sponsored by Forcepoint
EBOOK: Learn the current state of cyber-criminality and why the security landscape looks so rosy from their perspective. Come to understand not only the shortcomings of traditional approaches but also how patching can lead to further problems and the issues with current network security devices countering advanced evasion techniques.
Posted: 12 Sep 2016 | Published: 31 Dec 2015

Forcepoint

Advanced Threat Prevention: 6 Vendors go Head to Head
sponsored by Cylance
RESEARCH CONTENT: See the results of an advanced threat prevention test of enterprise endpoint protection software where 6 competitor endpoint products – Cylance, Kaspersky, McAfee, Sophos, Symantec and Trend Micro – go head-to-head in 4 performance areas.
Posted: 05 May 2017 | Published: 02 Feb 2017

Cylance

Advancing Industrial Internet Security: Convergence of IT With OT
sponsored by Bayshore Networks
WHITE PAPER: Discover the state of IoT security in industrial and operational technology environments and how OT security needs differ from those in IT environments.
Posted: 25 May 2017 | Published: 25 May 2017

Bayshore Networks

After Antimalware: Moving Toward Endpoint Antivirus Alternatives
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com outlines why - although endpoint antimalware has become ineffective - organizations today cannot live without it. In addition, learn about alternative methods available to protect your network and endpoints.
Posted: 06 May 2013 | Published: 06 May 2013

SearchSecurity.com

Agile Tools for Agile Development: Ensuring Software Quality
sponsored by QASymphony
WHITE PAPER: How do you move at an Agile pace and at the same time ensure that software doesn't have critical defects? This guide explores how to put the right Agile testing tools in place to help you maintain software quality. Discover how to improve ALM strategies, maximize the value of testing investments, and more.
Posted: 23 Jan 2017 | Published: 23 Jan 2017

QASymphony

Amazon EC2 vs. Google's App Engine
sponsored by IT Central Station
ESSENTIAL GUIDE: With the amount of PaaS solutions out there, sometimes it can be hard to decide which one is the best fit for your organization. Find out what verified IT experts say about many PaaS products in this IT Central Station guide.
Posted: 05 Dec 2014 | Published: 05 Dec 2014


An App - Centric Approach to Mobile Security in Healthcare
sponsored by Blue Cedar
WHITE PAPER: In this brief white paper, learn about a new mobile security suite that makes protecting your devices as simple as downloading one application.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Blue Cedar

An Essential Guide to IoT App Development
sponsored by Mendix
WHITE PAPER: With varying levels of complexity for endpoints, software, security, and integration, the defining elements of IoT can seem overwhelming. To help guide you through IoT adoption, this paper digs down into the anatomy of IoT and explores how to overcome the challenges of IoT app development.
Posted: 04 May 2017 | Published: 04 May 2017

Mendix

An Introduction to the Security Advantages of Mirco-Segmentation
sponsored by VMware
WHITE PAPER: Traditional data center works to defer threats from breaching your network's perimeter, so what do you do once it gets inside? Read this white paper to learn why we can't permanently resolve the perimeter-style network security problem and what micro-segmentation offers as a supplement to your existing network security.
Posted: 29 Mar 2017 | Published: 30 Nov 2016

VMware

Analyst's take: Force.com application drives faster development
sponsored by ComputerWeekly.com
WHITE PAPER: Nucleus analyzed existing Force.com application deployments and found an average of 4.9 times faster development.  End customers, developers, and ISVs experience more rapid time to value, lower cost, and greater ongoing flexibility.
Posted: 21 Oct 2011 | Published: 18 Feb 2011

ComputerWeekly.com

Addressing the Security Dangers of "Appification"
sponsored by IBM
WHITE PAPER: Identify the key security dangers of mobile apps in the enterprise and find out how to eliminate them. Learn not only what an enterprise can do for data at rest, data in motion, methods of deployment, and more.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

IBM

Adobe Flash Builder 4
sponsored by Adobe Systems, Inc.
SOFTWARE DOWNLOAD: Enterprises are challenged to create easy to use rich Internet applications that enable users and customers to access and interact with data and content in more intuitive and visual ways. Download this trial software to learn more.
Posted: 04 Jan 2011 | Premiered: 04 Jan 2011

Adobe Systems, Inc.

Adopt a Bimodal Approach to Manage PCs and Broaden Support for New Devices
sponsored by Lenovo Software
WHITE PAPER: This Gartner Report teaches you new approaches to endpoint management and security as updates to PC software increase in volume and frequency.
Posted: 26 Aug 2016 | Published: 21 Sep 2015

Lenovo Software

Advanced Attacks are Catching On - Here's What you can Do
sponsored by Kaspersky Lab
EGUIDE: In this e-guide, Kaspersky Lab reports on how enterprises can upgrade their security programs against APT-style attacks. Uncover the effectiveness of network segmentation when it comes to detecting attacks that have bypassed your controls.
Posted: 02 Nov 2016 | Published: 27 Oct 2016

Kaspersky Lab

Advanced Authentication Methods: Software vs Hardware
sponsored by CA Technologies.
WEBCAST: View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.
Posted: 01 Jul 2011 | Premiered: Jun 30, 2011, 10:00 EDT (14:00 GMT)

CA Technologies.

Advanced Threat Detection with Machine-Generated Intelligence
sponsored by Prelert
RESEARCH CONTENT: In this resource, you will discover the research results from a survey of 614 IT security practitioners in the U.S., revealing a lack of confidence in their IT security team's ability to defend their organization. Read on to learn why adoption of a machine-generated intelligence will bolster your cyberdefense.
Posted: 29 Jan 2016 | Published: 31 Oct 2015

Prelert

Agile Testing Quadrants: Guiding Managers and Team in Test Strategies
sponsored by IBM
EGUIDE: Read this e-guide to discover why a testing taxonomy such as the Agile testing quadrants is an effective tool for software teams undertaking this task.
Posted: 27 Dec 2012 | Published: 27 Dec 2012

IBM

Agility in the Data Center
sponsored by SearchSDN.com
EBOOK: This expert guide offers all the information you need to discover whether or not SDN is a good fit for your organization. Learn how the pros and cons of SDN and how you should go about implementing it.
Posted: 06 Apr 2015 | Published: 06 Apr 2015

SearchSDN.com

Alegent Health Implements Courion Solutions to Deliver Access Assurance
sponsored by Courion Corporation
CASE STUDY: This case study describes how Alegent, a large healthcare system in Nebraska, implemented Courion Solutions to assist with their access assurance needs. Read on to learn what was changed and the benefits that were attained.
Posted: 15 Apr 2010 | Published: 01 Dec 2009

Courion Corporation

Align Employee Performance and Strategic Workforce Planning
sponsored by MacroMicro
EGUIDE: Data grants insight into your talent's performance, but how can you use data from across the company to determine how an individual employee's performance assists in reaching your goals?
Posted: 29 Jul 2016 | Published: 26 Jul 2016

MacroMicro

Analyst Report: Forrester - Product innovation demands more flexible software delivery
sponsored by IBM
ANALYST REPORT: In September 2010, the IBM Corporation commissioned the Forrester Consulting group to conduct a study whose aim was to better understand the critical role software innovation plays in product development. Download the report to see the results.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

IBM

Analyst: Gartner Report - Magic Quadrant for Integrated Quality Suite
sponsored by IBM
ANALYST REPORT: According to Gartner, vendors must demonstrate both "completeness of vision" and an "ability to execute" to be evaluated as a leader. Gartner's 2011 Magic Quadrant for Integrated Software Quality Suites evaluates IBM as a leader. Read the report to learn more.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

IBM

Analytics Deliver Good User Experience for DevOps and End-Users
sponsored by CA Technologies
EGUIDE: Analytics can measure user satisfaction with enterprise mobile apps, but what about day-to-day maintenance? Learn from experts which metrics help with heavy lifting, and are more than just a pretty interface.
Posted: 18 Feb 2016 | Published: 14 Feb 2016

CA Technologies
101 - 125 of 1398 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement