Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blocking Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Ad Blocker Programs, Ad Blocking Programs, Blocking Software, Ad Blockers, Ad Blocker Software
DEFINITION: Software programs that block ads while Web browsing.
Ad Blocking SoftwareReports
26 - 50 of 806 Matches Previous Page  | Next Page
Accelerate Disaster Recovery & Optimize Storage with Modernized Disaster Recovery Software
sponsored by CommVault Systems, Inc.
WEBCAST: Watch this informative webcast to find out the key features of this modernized disaster recovery software.
Posted: 12 Feb 2014 | Premiered: Oct 8, 2013

CommVault Systems, Inc.

Advanced cyber-security intelligence
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

Advanced DDoS Protection Service for Ecommerce Businesses
sponsored by Neustar®
WHITE PAPER: This informative paper discusses a security solution that provides DDoS protection for Web, email, and APIs 24/7 with unlimited mitigation capacity from upstream users.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

Analyst's take: Force.com application drives faster development
sponsored by ComputerWeekly.com
WHITE PAPER: Nucleus analyzed existing Force.com application deployments and found an average of 4.9 times faster development.  End customers, developers, and ISVs experience more rapid time to value, lower cost, and greater ongoing flexibility.
Posted: 21 Oct 2011 | Published: 18 Feb 2011

ComputerWeekly.com

Antivirus Evasion Techniques Show Ease In Avoiding Antivirus Detection
sponsored by Malwarebytes Corporation
EGUIDE: This expert e-guide uncovers what's next for avoiding some of the most dangerous cyber-attacks.
Posted: 21 Mar 2014 | Published: 21 Mar 2014


A More Rational Approach to Endpoint Security: Five Reasons to Simplify Your Life
sponsored by McAfee, Inc.
WHITE PAPER: This resource offers 5 reasons to rethink your current endpoint protection solution. Learn how to reduce security incident response time by 40% while reducing time spent on remediation by 70%. Read now to learn more about next-gen endpoint protection and discover what you might be missing.
Posted: 30 May 2013 | Published: 30 May 2013

McAfee, Inc.

A Practical Guide to Choosing the Right Agile Tools
sponsored by IBM
DATA SHEET: This evaluation guide is designed to help you choose the best tool for your needs today, while protecting your investment as your team, needs and agile maturity grow.
Posted: 11 Sep 2009 | Published: 11 Sep 2009

IBM

A Pragmatic Approach to SIEM
sponsored by Tripwire, Inc.
WHITE PAPER: In this paper we will take a look at this disturbing trend and provide useful guidance for maximizing the value of SIEM and log management tools, while focusing on protecting systems and data not on simply checking the compliance check box.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Tripwire, Inc.

A Tour of HP Sarbanes-Oxley IT Assessment
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper describes HP Sarbanes-Oxley IT Assessment Accelerator, a template of pre-defined information based on ITGI's COBIT, which is loaded into HP Quality Center to help your organization define and execute Sarbanes-Oxley testing, evaluate the results, and develop remediation plans.
Posted: 29 Apr 2009 | Published: 01 Apr 2009

Hewlett-Packard Company

A Whirlwind Tour of Wireless Vulnerabilities
sponsored by AirMagnet
PRESENTATION TRANSCRIPT: This white paper discusses the steps you must take to ensure that your wireless network is security and how to guard against vulnerabilities.
Posted: 07 Sep 2011 | Published: 07 Sep 2011

AirMagnet

A Whole Team Approach to Quality
sponsored by Rally Software
WHITE PAPER: Explore this presentation to develop a new approach to quality. Agile projects help build software incrementally, using short iterations of 1-4 weeks to keep development aligned with business needs. Learn more about the benefits of agile development by reading this resource now.
Posted: 21 Dec 2012 | Published: 21 Dec 2012

Rally Software

About to Buy Guide: Mobile Device Management Software
sponsored by Symantec Corporation
EBOOK: Are you in the market for a mobile device management (MDM) software solution? Be sure to read this e-book from SearchConsumerization.com first for help making a more informed purchasing decision.
Posted: 21 Nov 2012 | Published: 30 Mar 2012

Symantec Corporation

Achieve secure mobile access to enterprise applications
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: This brief resource highlights a mobile and social access management platform that offers secure mobile access to enterprise applications by leveraging your existing back-end identity management infrastructure.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Oracle Corporation UK Ltd

Achieving North American Electric Reliability Corporation (NERC) Cyber Security Standards
sponsored by Lumension
WHITE PAPER: Learn about NERC compliance challenges and how to ensure audit-readiness by delivering end-to-end vulnerability management, endpoint protection and data protection solutions.
Posted: 06 Apr 2009 | Published: 02 Mar 2009

Lumension

Achieving PCI Compliance at the Point Of Sale Using Bit9 Parity™ to Protect Cardholder Data
sponsored by Bit9, Inc.
WHITE PAPER: As the technology used by merchants and their partners has evolved, card fraud has become more sophisticated. In response to this evolving threat, the major credit card companies have created a set of security standards to protect their customers from security breaches. Read this whitepaper to find out how Bit9 Parity helps achieve compliance...
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.

Acronis Backup & Recovery® 11.5 Virtual Edition for Hyper-V®
sponsored by Acronis
WHITE PAPER: Check out this exclusive white paper to find out the ins and outs of Acronis Backup and Recovery 11.5 Virtual Edition for Hyper-V, and how it will provide top-notch protection for your Hyper-V environment.
Posted: 24 Feb 2014 | Published: 31 Dec 2013

Acronis

Adobe Flash Builder 4
sponsored by Adobe Systems, Inc.
SOFTWARE DOWNLOAD: Enterprises are challenged to create easy to use rich Internet applications that enable users and customers to access and interact with data and content in more intuitive and visual ways. Download this trial software to learn more.
Posted: 04 Jan 2011 | Premiered: 04 Jan 2011

Adobe Systems, Inc.

Advanced Authentication Methods: Software vs Hardware
sponsored by CA Technologies.
WEBCAST: View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.
Posted: 01 Jul 2011 | Premiered: Jun 30, 2011, 10:00 EDT (14:00 GMT)

CA Technologies.

Agile Testing Quadrants: Guiding Managers and Team in Test Strategies
sponsored by IBM
EGUIDE: Read this e-guide to discover why a testing taxonomy such as the Agile testing quadrants is an effective tool for software teams undertaking this task.
Posted: 27 Dec 2012 | Published: 27 Dec 2012

IBM

Alegent Health Implements Courion Solutions to Deliver Access Assurance
sponsored by Courion Corporation
CASE STUDY: This case study describes how Alegent, a large healthcare system in Nebraska, implemented Courion Solutions to assist with their access assurance needs. Read on to learn what was changed and the benefits that were attained.
Posted: 15 Apr 2010 | Published: 01 Dec 2009

Courion Corporation

Analyst Report: Forrester - Product innovation demands more flexible software delivery
sponsored by IBM
ANALYST REPORT: In September 2010, the IBM Corporation commissioned the Forrester Consulting group to conduct a study whose aim was to better understand the critical role software innovation plays in product development. Download the report to see the results.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

IBM

Analyst: Gartner Report - Magic Quadrant for Integrated Quality Suite
sponsored by IBM
ANALYST REPORT: According to Gartner, vendors must demonstrate both "completeness of vision" and an "ability to execute" to be evaluated as a leader. Gartner's 2011 Magic Quadrant for Integrated Software Quality Suites evaluates IBM as a leader. Read the report to learn more.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

IBM

Anittel Simplifies Managed Antivirus Service Case Study
sponsored by Webroot
CASE STUDY: This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.
Posted: 14 May 2013 | Published: 14 May 2013

Webroot

Antivirus Evaluation Guide
sponsored by Threat Track
WHITE PAPER: In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.
Posted: 13 Sep 2013 | Published: 31 Dec 2012

Threat Track

Antivirus: The Hippest New Apple Accessory
sponsored by Threat Track
WHITE PAPER: For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track
26 - 50 of 806 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement