Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blocking Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Ad Blocker Programs, Ad Blocking Programs, Blocking Software, Ad Blockers, Ad Blocker Software
DEFINITION: Software programs that block ads while Web browsing.
Ad Blocking SoftwareReports
76 - 100 of 935 Matches Previous Page  | Next Page
Apps for Business: Basics
sponsored by Apple Inc.
WEBCAST: Access this on-demand webinar to learn about the powerful built-in apps on the iPad, which every business professional can rely on for work. Join Apple Business experts for a free short on-demand seminar to learn more.
Posted: 28 Aug 2014 | Premiered: Aug 28, 2014

Apple Inc.

Are You Prepared for a Software Audit?
sponsored by CDW Corporation
WHITE PAPER: Access this white paper to uncover the key elements of a software End User License Agreements (EULA) audit. Click through to explore 5 ways software asset management (SAM) can help you ensure compliance.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

CDW Corporation

Are your DNS Servers as Secure and Available as the Rest of Your Network?
sponsored by Infoblox
WHITE PAPER: Did you know that DNS is probably a hole in your security? Fortunately, this white paper gives you information about how to protect your servers. Read on to learn what you can do to protect your organization.
Posted: 03 Dec 2013 | Published: 30 Sep 2013

Infoblox

Avoiding Unpleasant ERP Surprises
sponsored by IFS
WHITE PAPER: Prepare your organization for a successful ERP implementation and find out about the consequences of ERP gone wrong.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

IFS

Backup Software: Nine Must-Ask Questions
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for 9 key questions to ask when shopping for backup software solutions. Learn how to accurately define your needs and expectations, and know what to look for to determine if a particular solution will meet them or not. Read on to learn more.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Iron Mountain

Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation
sponsored by Intel
WEBCAST: This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks.
Posted: 14 Feb 2011 | Premiered: Oct 13, 2010

Intel

ArcSight Case Study: BMW
sponsored by ArcSight, an HP Company
CASE STUDY: Watch this video case study to learn how ArcSight helped BMW drastically decrease incidence response times.
Posted: 22 Sep 2010 | Published: 17 Nov 2009

ArcSight, an HP Company

ArcSight Case Study: Vodafone
sponsored by ArcSight, an HP Company
VIDEOCAST: Vodafone, the world's leading mobile communications group, uses ArcSight Enterprise Threat and Risk Management platform to get a consolidated global view of security, increase the efficiency in security operations and increase the reaction time to cyberattacks or security breaches.
Posted: 10 Mar 2011 | Premiered: Mar 10, 2011

ArcSight, an HP Company

ArcSight Case Study: Experian
sponsored by ArcSight, an HP Company
CASE STUDY: Experian is committed to ensuring the integrity and safety of its data. The company sought an enterprise solution that would allow it to monitor threats and vulnerabilities in an automated fashion. ArcSight ESM enables Experian to monitor and analyze security event data from all its systems within a single view. Learn more in this case study.
Posted: 11 May 2010 | Published: 11 May 2010

ArcSight, an HP Company

Are you Agile Enough?
sponsored by IBM
WEBCAST: If you are using Open Source, doing Agile but not able to consistently meet project goals, and aren't sure what tools you need -- check out how Rational Team Concert can help. See how Rational Team Concert automates core Agile practices -- like consistent team collaboration, rapid response to change, and frequent delivery of [...]
Posted: 09 Sep 2009 | Premiered: Sep 9, 2009

IBM

ASG's metaCMDB™ Master or "Citizen" CMDB Containing Critical Enterprise Configuration Information
sponsored by ASG Software Solutions
WHITE PAPER: The sound understanding and visibility of configuration information provided by ASG’s metaCMDB™ is critical for ITIL initiatives and business service management (BSM) implementations, service desk support, and the integration of disparate technologies. Read this paper to find out more.
Posted: 25 May 2010 | Published: 25 May 2010

ASG Software Solutions

Assuring Software Security Through Testing
sponsored by (ISC)2 UK Ltd
WHITE PAPER: This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

(ISC)2 UK Ltd

Attachment Spam - The Latest Trend
sponsored by GFI Software
WHITE PAPER: This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software.
Posted: 18 Mar 2008 | Published: 01 Jan 2007

GFI Software

Auto-Snapshot Manager/ VMware® Edition: Automated, Integrated, And Scalable Protection Of Virtual Machines
sponsored by Dell, Inc.
PRODUCT LITERATURE: Auto-Snapshot Manager/VMware Edition (ASM/VE) is a unique and innovative data protection feature of the Dell EqualLogic™ PS Series iSCSI SAN that enables fast online backups and quick restores of VMware virtual machines and VMFS file systems.
Posted: 10 Nov 2008 | Published: 10 Nov 2008

Dell, Inc.

Automating System i Message and Resource Management
sponsored by Help/Systems
WHITE PAPER: Automated, centralized message control and resource monitoring can help you manage your System i more easily and with fewer staff. This white paper describes some of the tasks you’ll face, some tips to help you get started, and the benefits of automating your system management with Robot/CONSOLE.
Posted: 25 May 2010 | Published: 25 May 2010

Help/Systems

Automating Your Code Review: Moving to a SaaS Model for Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security.
Posted: 07 Jun 2010 | Published: 10 Feb 2009

Veracode, Inc.

AVG Anti-Virus Network Edition Delivers Rock Solid, Easy to Manage Protection for US Construction Firm
sponsored by AVG Technologies USA, Inc.
CASE STUDY: R&O Construction was having difficulty managing their mostly mobile network. With so many laptops and mobile devices in use remotely, the company was seeing an increase in security threats infecting the IT infrastructure. Their existing solution was overtaxing both system and human resources. Read on to learn how they overcame these challenges.
Posted: 31 Mar 2010 | Published: 31 Mar 2010

AVG Technologies USA, Inc.

Avoiding 7 Common Mistakes of IT Security Compliance
sponsored by Qualys, Inc.
EGUIDE: This guide describes seven typical mistakes of IT security compliance and how you can use these lessons to help your organization achieve its compliance goals.
Posted: 21 Oct 2009 | Published: 01 Apr 2009

Qualys, Inc.

B.F. Saul Company Finds Flexibility in Sharing and Securing Information with TITUS
sponsored by TITUS
WHITE PAPER: This brief white paper details a SharePoint security system that provides high-level security for important content while also allowing end-users to easily access the documents they need.
Posted: 19 Mar 2012 | Published: 19 Mar 2012

TITUS

Bailing Out Your Budget: How Websense Lowers Your TCO
sponsored by Websense, Inc.
WHITE PAPER: The unfortunate reality for today’s enterprises is that IT security risks continue to escalate at the same time that the resources available to mitigate them are diminishing or, at best, remaining constant.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

Websense, Inc.

Balancing Risk and Complexity with Quality Management
sponsored by IBM
WHITE PAPER: This white paper shows you how a combined IBM and Wind River quality management solution can help you deliver higher-quality products to the marketplace faster.
Posted: 21 Mar 2011 | Published: 21 Mar 2011

IBM

Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett-Packard Company
WHITE PAPER: In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013

Hewlett-Packard Company

Battling Modern Botnets in the Enterprise
sponsored by FireEye
WHITE PAPER: The prevalence of botnets is growing at an alarming rate. The FBI ranked cybercrime as one of it's top priorities and noted that it cost businesses $67.2 billion in 2005 alone. Learn how to keep botnets out of your business.
Posted: 29 Sep 2008 | Published: 01 Sep 2008

FireEye

Becoming More Energy Efficient
sponsored by IBM Software Group
WHITE PAPER: Watch this short video to learn what defines a true green data center. This initial Business First investigation report will help answer these questions -- what is a green data center and why do I need one?
Posted: 15 Feb 2008 | Published: 14 Feb 2008

IBM Software Group

Best practices for implementing 2048-bit SSL
sponsored by Citrix
WHITE PAPER: Ready for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

Citrix
76 - 100 of 935 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement