Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blocking Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Ad Blocker Programs, Ad Blocking Programs, Blocking Software, Ad Blockers, Ad Blocker Software
DEFINITION: Software programs that block ads while Web browsing.
Ad Blocking Software Reports
151 - 175 of 1163 Matches Previous Page  |  Next Page
Beyond the Scrum Team: Delivering "Done" at Scale
sponsored by Tasktop
WEBCAST: Watch this webcast to find out how you can derive more value from your scrum teams. Find out how to identify, anticipate, and mitigate the challenges to scaling agile development. Plus, learn how to incorporate scrum into the full product lifecycle, from development to operations and insight.
Posted: 27 Jul 2016 | Premiered: Jul 26, 2016

Tasktop

Bridge the Network Security Gap in IP Multifunction Machines
sponsored by HP
EGUIDE: In the following e-guide, experts relay recommendations to secure IP printing and fax devices. Learn where to find guidance on copier and multifunction device security, and how often you should perform vulnerability scans on printers and related systems.
Posted: 25 Oct 2016 | Published: 24 Oct 2016

HP

Bringing Agility & Visibility Together for Cloud Success
sponsored by Splunk
RESOURCE: Learn how AWS and Splunk are working together to optimize end-to-end visibility in AWS cloud environments to make the most of your cloud platform. You'll discover how you can make machine data accessible, usable, and valuable for everyone.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Splunk

Build a Mobile App in Less Than 15 Minutes
sponsored by Red Hat
VIDEO: This video examines a platform that supports an agile approach to developing, integrating, and deploying enterprise mobile apps – whether native, hybrid, or on the web. Discover an easier, faster way to build mobile apps end-to-end with a variety of cloud deployment options.
Posted: 19 Sep 2016 | Premiered: 08 Jan 2016

Red Hat

Build a Secure Network Access Architecture
sponsored by Fortinet, Inc.
WHITE PAPER: Evolving changes in mobile usage, devices, and applications create an enormous challenge for IT to protect the network. Explore ways to enable a secure network access architecture that helps keep internal enterprise assets safe, and protects users from cyberattacks.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Fortinet, Inc.

Building a Strong Application Security Program
sponsored by Onapsis
EGUIDE: What are the first steps to creating a strong app security program, and how do you know you've struck the right balance between static and dynamic testing? These are the types of questions we explore in this e-guide. Find out what role education is playing in building an app security program and get advice for mitigating SAP vulnerabilities.
Posted: 12 Sep 2016 | Published: 09 Sep 2016

Onapsis

Building an Application Security Program: Why Education is Key
sponsored by Synopsys
EGUIDE: This expert guide takes a look at the development process of application security as well as two types of testing that can be beneficial when analyzing security failures.
Posted: 11 Oct 2016 | Published: 10 Oct 2016


Building confidence in data security
sponsored by ComputerWeekly.com
ANALYST REPORT: Businesses need to engage online with users from external organisations and mobile workers about data security. Analysts Bob Tarzey and Clive Longbottom explain why.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

ComputerWeekly.com

Building Management Systems: The cyber security blind spot
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The systems which control heating, lighting and security in most buildings are vulnerable to cyber attack, this report from QinetiQ warns.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

ComputerWeekly.com

Building Natural Active Immunity against Advanced Threats
sponsored by Fortinet, Inc.
WHITE PAPER: Through the collaborative, proactive and coordinated actions of prevention, detection, and mitigation, companies can strengthen their defenses against advanced and unknown threats. Discover how you can build this natural active immunity with Fortinet.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Fortinet, Inc.

Bullet-Proofing Your Email with Cloud-Based Security
sponsored by LogicNow
WHITE PAPER: Since malicious software and web links can bring down entire enterprises, having an extra layer of defense in place has never been more important. Learn what you can do to protect users, and deliver highly accurate spam detection, and robust virus defense.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogicNow

Business Management Software ROI Improvement Guide
sponsored by Sage Software
WHITE PAPER: Aligning technology with your business goals is one of the smartest ways to optimize any software investment (especially when it comes to the cloud). Access this ROI improvement guide to learn how to maximize your business management software solutions to drive great agility and SaaS cost savings.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

Sage Software

Businesses Should Begin Preparing for the Death of the Password
sponsored by Gigya
ANALYST REPORT: Discover what you need to know about the inevitable death of the password, broken down with solid numbers drawn from over 4,000 adults in the US and UK. Discover why username/password pairs aren't working with younger generations and possible future fundamental changes in authentication and authorization.
Posted: 20 Jul 2016 | Published: 20 Jul 2016

Gigya

Busting Myths About Encrypted Communications
sponsored by Blue Coat Systems
RESOURCE: We debunk several pervasive myths about encrypted communications to help you gain a solid understanding of its growing importance. How? With an enlightening (and quick) 10-question quiz that just might expose some hidden vulnerabilities in your current network security initiatives and encrypted traffic blind spots.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Blue Coat Systems

Buyer's Guide to Antimalware
sponsored by SearchSecurity.com
EGUIDE: Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

SearchSecurity.com

Beyond UTM -- The Value of a Purpose-built Network Security Platform
sponsored by Fortinet, Inc.
WHITE PAPER: It is only with a purpose-built network security platform -- as defined by this paper -- that organizations will be assured of maximum security effectiveness, minimum cost of ownership, and the greatest degree of.
Posted: 27 Dec 2007 | Published: 01 Aug 2007

Fortinet, Inc.

Big Data, Integration and Governance: Use Case – How to Extend Security Intelligence using Big Data Solutions
sponsored by IBM.
WEBCAST: Access this live webcast on January 30, 2014 at 12:00 PM EST (17:00 GMT) to learn how you can use big data tools and technologies to extend security intelligence – allowing you to protect massive data volumes and uncover hidden threats.
Posted: 15 Jan 2014 | Premiered: Jan 30, 2014, 12:00 EST (17:00 GMT)

IBM.

Breach Detection System: Detecting the Pros and Cons
sponsored by Fortinet, Inc.
ANALYST REPORT: In this report by NSS Labs, independent experts take a closer look at a breach detection system. Evaluate the strengths, weaknesses, opportunities, and threats of this network security approach to determine if it's the right step for your enterprise.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Bringing the Power of Web 2.0 to the Enterprise
sponsored by OpenText Corporation
WHITE PAPER: The key to Enterprise 2.0 is to bring the worlds of ECM and Web 2.0 together, so that companies can gain the best of both.
Posted: 14 May 2008 | Published: 09 May 2008

OpenText Corporation

Build a Cohesive, Effective Security Strategy
sponsored by Splunk
EGUIDE: Discover how to identify redundancy in your security tools in order to cut costs and increase efficiency. Plus, learn how you can effectively integrate global threat intelligence into your strategy to bolster your security arsenal.
Posted: 08 Aug 2016 | Published: 31 Jul 2016

Splunk

BuilderMT Increases Customer Satisfaction from 66% to 90% in Less than a Year with Parature
sponsored by Parature, Inc.
CASE STUDY: BuilderMT is the nation's leading provider of production management software for residential homebuilders, and has achieved wide notoriety and national awards for streamlining the workflow management process and improving the efficiency.
Posted: 25 Feb 2008 | Published: 01 Jan 2006

Parature, Inc.

Building a Mobile Strategy: Analyst Report Shows Key Components to Success
sponsored by Kony
ANALYST REPORT: Access this analyst report to discover how the enterprise appetite for mobilization grows – but progress has been slow.
Posted: 09 Dec 2014 | Published: 09 Dec 2014

Kony

Building a Successful Security Operations Center
sponsored by ArcSight, an HP Company
WHITE PAPER: Designing, building, and managing an internal security operations center can dramatically improve an organization's ability to rapidly recognize and respond to malicious information security events. This paper outlines industry best practices for building and maturing a security operations center (SOC).
Posted: 30 Aug 2010 | Published: 01 Dec 2009

ArcSight, an HP Company

Building and Managing a Performance Center of Excellence
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper contains advice on improving application performance. It also gives 10 tips for building and managing a performance center of excellence.
Posted: 09 Feb 2010 | Published: 09 Feb 2010

Hewlett Packard Enterprise

Buyer's Essentials: What to Look for in Single Sign-On Technology
sponsored by SearchHealthIT.com
EBOOK: Are you on the hunt for single sign-on (SSO) technology? Discover the differences between the numerous approaches to SSO, their benefits, and what works for various types of healthcare organizations. In this guide, health IT expert Rick Krohn shares his advice on choosing the right SSO tech for your practice.
Posted: 24 Mar 2016 | Published: 18 Mar 2016

SearchHealthIT.com
151 - 175 of 1163 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement