Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blocking Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Ad Blocker Programs, Ad Blocking Programs, Blocking Software, Ad Blockers, Ad Blocker Software
DEFINITION: Software programs that block ads while Web browsing.
Ad Blocking Software Reports
26 - 50 of 1163 Matches Previous Page  |  Next Page
6 Crucial Incident Response Policy Mistakes to Avoid
sponsored by Delta Risk
EGUIDE: Discover how to avoid 6 common pitfalls of a modern incident response policy as shared by expert Kevin Beaver. Access now before your policy's weaknesses make you – and your company – look bad.
Posted: 20 Sep 2016 | Published: 16 Sep 2016

Delta Risk

6 Practical Tips for Becoming an HR and Payroll Hero
sponsored by Sage (UK) Limited
EBOOK: So you have implemented a new HR and payroll software, what's next? How do you ensure that your software investment actually pays off? This e-book gives you 6 tips to make sure your HR and payroll software is successful.
Posted: 08 Dec 2016 | Published: 29 Apr 2016

Sage (UK) Limited

6 Things to Consider While Choosing an ERP Software
sponsored by Deskera
WHITE PAPER: The enterprise resource planning (ERP) software market is in flux, so it's more important than ever to understand exactly which vendor is going to meet your unique business needs before you commit. Read on to uncover the top 6 considerations before you dive into the choppy waters of the ERP software market.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

Deskera

7 Steps for Building a Digital Strategy in Distribution
sponsored by Infor
WHITE PAPER: The wholesale distribution industry is facing massive disruption due to technological growth, and most companies are taking a reactionary approach. You need to rethink your digital strategy now, because a reactionary "strategy" means you will be left behind. Read on to learn 7 steps to building your best digital distribution strategy.
Posted: 14 Oct 2016 | Published: 31 Aug 2016

Infor

7 Ways to Make Yourself Harder to Hack
sponsored by LogicNow
WHITE PAPER: Whether you call it layered security or defense in depth, layers of control buys you time to respond effectively. Access now to learn more about integrated tools that cover security and network management for MSPs.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

LogicNow

8 Key API Performance Indicators for Digital Business
sponsored by TIBCO Software Inc.
WHITE PAPER: This white paper explores and defines some of the most common and useful key API performance indicators (KAPIs). Discover how to boost your API management and analytics with KAPIs like registered API keys, usage consistency, queries per second, and 5 more.
Posted: 02 Dec 2016 | Published: 02 Dec 2016

TIBCO Software Inc.

8 Reasons why Users are Rethinking their SIEM Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief yet informative infographic highlights eight reasons why having the right SIEM approach is critical to productivity, compliance and ROI. Read on to determine if your current SIEM practices are doing the most for your network security.
Posted: 11 Jan 2016 | Published: 11 Jan 2016

LogRhythm, Inc.

9 Steps to Choosing the Right HR and Payroll Software Business Partner
sponsored by Sage (UK) Limited
EBOOK: This e-book gives you 9 tips on what to do before signing up with a vendor and how to plan out your research. Learn how to move beyond traditional software to an HR and payroll solution and how to anticipate its impact.
Posted: 08 Dec 2016 | Published: 29 Apr 2016

Sage (UK) Limited

A 10 Minute Guide to Software Harvesting
sponsored by Snow Software
WHITE PAPER: Securing the funding to get started in Software Asset Management (SAM) or Software License Optimization can sometimes be difficult. One way to get the attention of senior business managers is to provide quick wins that point to greater cost savings over time.
Posted: 11 Mar 2016 | Published: 30 Sep 2014

Snow Software

A CIO’s 5 Point Plan for Managing Endpoint Security and Implementing MDM
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, our expert Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise. Then expert Lisa Phifer shares what mobile device management software IT needs and why.
Posted: 25 Jun 2013 | Published: 25 Jun 2013

SearchSecurity.com

A CW buyer's guide to software asset management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at best practice for software asset management in this 10-page buyer's guide.
Posted: 09 Sep 2013 | Published: 09 Sep 2013

ComputerWeekly.com

A Guide to Cyber Risk
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com

A Guide to Safely Adopting Office 365
sponsored by Symantec + Blue Coat
WHITE PAPER: Access this white paper for tips on how you can safely adopt Office 365. Learn where Office 365 fails to protect your organization and how to mitigate those shortcomings to prevent data exposures, safeguard against unauthorized user activity, and more.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

Symantec + Blue Coat

6 Steps to SIEM Success
sponsored by AlienVault
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AlienVault

7 Critical Components for Cybersecurity Readiness
sponsored by Dimension Data
EGUIDE: This guide shows you seven elements of cyber security readiness critical for every organization. Expert Peter Sullivan outlines the most important components that your organization needs for a high degree of situational awareness into your network operations and utilization.
Posted: 22 Sep 2016 | Published: 20 Sep 2016

Dimension Data

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction
sponsored by Qualys, Inc.
WHITE PAPER: Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?
Posted: 20 Oct 2009 | Published: 20 Oct 2009

Qualys, Inc.

7 Habits of Highly Effective Teams
sponsored by IBM
WEBCAST: Consult this informative video to learn more about the widespread adoption of "going agile." Find out how you can obtain shorter release cycles, greater flexibility and tighter alignment by going agile. It explores the broad technical, organizational and process changes that can help your team transition to an agile environment.
Posted: 22 Apr 2013 | Premiered: Apr 22, 2013

IBM

9 Catastrophic Projects, And the Lessons They Teach
sponsored by AtTask
WHITE PAPER: This white paper considers 9 massive project failures, and analyzes where teams went wrong. Read on to see how mistakes, communication breakdowns, and destroyed budgets can obliterate your projects, and how you can avoid a similar fate.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

AtTask

A Breakthrough in Insider Threat Detection & Prevention
sponsored by Intellinx Software Inc.
PRODUCT LITERATURE: Read this white paper and find out how tt provides a first-of-its-kind cross-platform surveillance system for unparalleled visibility of end-user activity across the enterprise.
Posted: 17 May 2007 | Published: 17 May 2007

Intellinx Software Inc.

A Buyer's Guide to Endpoint Protection Platforms
sponsored by Intel Security
WHITE PAPER: This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012

Intel Security

A Closer Look at Windows Vista
sponsored by National Instruments
WHITE PAPER: One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative...
Posted: 19 Feb 2008 | Published: 19 Feb 2008

National Instruments

A Comprehensive Guide to the Latest Threat Detection Technologies
sponsored by SearchSecurity.com
WHITE PAPER: This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchSecurity.com

A Day in a Low Carbon Life: What Might It Be like to Lead a Business in 2012?
sponsored by IBM
WHITE PAPER: This entertaining paper describes a day in the life of a fictional Chief Executive Officer, preparing to face market analysts in 2012.
Posted: 14 May 2008 | Published: 01 May 2008

IBM

A Guide to Accelerating Business Value for Microsoft Environments
sponsored by EMC Corporation
WHITE PAPER: In this guide we'll learn how EMC can accelerate the business value of Microsoft environments of any size and scope.
Posted: 10 Mar 2008 | Published: 01 Oct 2007

EMC Corporation

A Guide to Branching and Merging Patterns
sponsored by AccuRev
WHITE PAPER: In this paper, gain a better understanding of how branching and merging patterns work and how applying them to your projects can have a profound effect on how your development team handles change management and delivers software.
Posted: 06 Jan 2012 | Published: 05 Jan 2012

AccuRev
26 - 50 of 1163 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement