Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blocking Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Ad Blocker Programs, Ad Blocking Programs, Blocking Software, Ad Blockers, Ad Blocker Software
DEFINITION: Software programs that block ads while Web browsing.
Ad Blocking Software Reports
51 - 75 of 976 Matches Previous Page  |  Next Page
Advanced cyber-security intelligence
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

Advanced Security through Micro-segmentation and Cryptographic Cloaking for Highly Sensitive Data, Networks, and Systems
sponsored by Unisys
WHITE PAPER: Traditional network security hardware and software are becoming less effective and increasingly susceptible to advanced threats. Discover a different approach to mitigating risks by securing data-in-motion across any public or private network.
Posted: 13 May 2016 | Published: 13 May 2016

Unisys

Advanced Threat Detection with Machine-Generated Intelligence
sponsored by Prelert
RESEARCH CONTENT: In this resource, you will discover the research results from a survey of 614 IT security practitioners in the U.S., revealing a lack of confidence in their IT security team's ability to defend their organization. Read on to learn why adoption of a machine-generated intelligence will bolster your cyberdefense.
Posted: 29 Jan 2016 | Published: 31 Oct 2015

Prelert

Advanced Threat Protection Checklist
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how to assess your current and proposed security posture against a baseline set of requirements to ensure you pick the right security option for your organization. Uncover 3 overarching recommendations for security.
Posted: 10 Feb 2016 | Published: 10 Feb 2016

Fortinet, Inc.

After Antimalware: Moving Toward Endpoint Antivirus Alternatives
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com outlines why - although endpoint antimalware has become ineffective - organizations today cannot live without it. In addition, learn about alternative methods available to protect your network and endpoints.
Posted: 06 May 2013 | Published: 06 May 2013

SearchSecurity.com

Agile Development with Red Hat Consulting
sponsored by Red Hat
BROCHURE: Read this brochure to learn about some of Red Hat Consulting's agile practice services.
Posted: 20 May 2015 | Published: 20 May 2015

Red Hat

Amazon EC2 vs. Google's App Engine
sponsored by IT Central Station
ESSENTIAL GUIDE: With the amount of PaaS solutions out there, sometimes it can be hard to decide which one is the best fit for your organization. Find out what verified IT experts say about many PaaS products in this IT Central Station guide.
Posted: 05 Dec 2014 | Published: 05 Dec 2014


An Executive Guide to IBM’s Strategy and Roadmap for its Integrated Operating Environment for Power Systems
sponsored by TechData Corporation
WHITE PAPER: As the integrated operating environment for IBM Power Systems server, IBM i is used by companies of all sizes in all regions of the world. Explore this white paper to understand IBM's strategy and roadmap for the IBM i operating system.
Posted: 24 May 2016 | Published: 29 Apr 2016

TechData Corporation

An Integrated Approach to Reducing Detection and Response Times
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this white paper to learn about an integrated set of tools that provide a holistic view across the ever-expanding attack surface, and apply big data analytics to detect patterns of concerning behavior faster.
Posted: 03 Mar 2016 | Published: 03 Mar 2016

LogRhythm, Inc.

An Introduction to Software Defined Networks
sponsored by Citrix
WHITE PAPER: This white paper serves as an introduction to SDN as a solution that can serve your enterprise, but only after you parse the competitive landscape of networking suppliers.
Posted: 02 Sep 2015 | Published: 31 Dec 2014

Citrix

Analyst's take: Force.com application drives faster development
sponsored by ComputerWeekly.com
WHITE PAPER: Nucleus analyzed existing Force.com application deployments and found an average of 4.9 times faster development.  End customers, developers, and ISVs experience more rapid time to value, lower cost, and greater ongoing flexibility.
Posted: 21 Oct 2011 | Published: 18 Feb 2011

ComputerWeekly.com

Analytics Deliver Good User Experience for DevOps and End-Users
sponsored by CA Technologies
EGUIDE: Analytics can measure user satisfaction with enterprise mobile apps, but what about day-to-day maintenance? Learn from experts which metrics help with heavy lifting, and are more than just a pretty interface.
Posted: 18 Feb 2016 | Published: 14 Feb 2016

CA Technologies

Anatomy of a Cyber-Attack
sponsored by Dell Software
WHITE PAPER: You need to understand the enemy -- and their malware -- before you can defeat them. Discover a comprehensive strategy to counter every stage of cyber-attacks and eliminate every type of malware from disrupting your network.
Posted: 20 May 2016 | Published: 20 May 2016

Dell Software

Acronis Backup & Recovery® 11.5 Virtual Edition for Hyper-V®
sponsored by Acronis
WHITE PAPER: Check out this exclusive white paper to find out the ins and outs of Acronis Backup and Recovery 11.5 Virtual Edition for Hyper-V, and how it will provide top-notch protection for your Hyper-V environment.
Posted: 24 Feb 2014 | Published: 31 Dec 2013

Acronis

Adobe Flash Builder 4
sponsored by Adobe Systems, Inc.
SOFTWARE DOWNLOAD: Enterprises are challenged to create easy to use rich Internet applications that enable users and customers to access and interact with data and content in more intuitive and visual ways. Download this trial software to learn more.
Posted: 04 Jan 2011 | Premiered: 04 Jan 2011

Adobe Systems, Inc.

Advanced Authentication Methods: Software vs Hardware
sponsored by CA Technologies.
WEBCAST: View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.
Posted: 01 Jul 2011 | Premiered: Jun 30, 2011, 10:00 EDT (14:00 GMT)

CA Technologies.

Agile Testing Quadrants: Guiding Managers and Team in Test Strategies
sponsored by IBM
EGUIDE: Read this e-guide to discover why a testing taxonomy such as the Agile testing quadrants is an effective tool for software teams undertaking this task.
Posted: 27 Dec 2012 | Published: 27 Dec 2012

IBM

Agility in the Data Center
sponsored by SearchDataCenter.com
EBOOK: This expert guide offers all the information you need to discover whether or not SDN is a good fit for your organization. Learn how the pros and cons of SDN and how you should go about implementing it.
Posted: 06 Apr 2015 | Published: 06 Apr 2015

SearchDataCenter.com

Alegent Health Implements Courion Solutions to Deliver Access Assurance
sponsored by Courion Corporation
CASE STUDY: This case study describes how Alegent, a large healthcare system in Nebraska, implemented Courion Solutions to assist with their access assurance needs. Read on to learn what was changed and the benefits that were attained.
Posted: 15 Apr 2010 | Published: 01 Dec 2009

Courion Corporation

Analyst Report: Forrester - Product innovation demands more flexible software delivery
sponsored by IBM
ANALYST REPORT: In September 2010, the IBM Corporation commissioned the Forrester Consulting group to conduct a study whose aim was to better understand the critical role software innovation plays in product development. Download the report to see the results.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

IBM

Analyst: Gartner Report - Magic Quadrant for Integrated Quality Suite
sponsored by IBM
ANALYST REPORT: According to Gartner, vendors must demonstrate both "completeness of vision" and an "ability to execute" to be evaluated as a leader. Gartner's 2011 Magic Quadrant for Integrated Software Quality Suites evaluates IBM as a leader. Read the report to learn more.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

IBM

Anittel Simplifies Managed Antivirus Service Case Study
sponsored by Webroot
CASE STUDY: This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.
Posted: 14 May 2013 | Published: 14 May 2013

Webroot

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems
sponsored by Dell, Inc.
WHITE PAPER: Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.
Posted: 12 May 2014 | Published: 12 May 2014

Dell, Inc.

Antivirus Evaluation Guide
sponsored by Threat Track Security
WHITE PAPER: In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.
Posted: 13 Sep 2013 | Published: 31 Dec 2012

Threat Track Security

Antivirus: The Hippest New Apple Accessory
sponsored by Threat Track Security
WHITE PAPER: For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security
51 - 75 of 976 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement