Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blocking Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Ad Blocker Programs, Ad Blocking Programs, Blocking Software, Ad Blockers, Ad Blocker Software
DEFINITION: Software programs that block ads while Web browsing.
Ad Blocking Software Reports
76 - 100 of 1169 Matches Previous Page  |  Next Page
Advanced Attacks are Catching On - Here's What you can Do
sponsored by Kaspersky Lab
EGUIDE: In this e-guide, Kaspersky Lab reports on how enterprises can upgrade their security programs against APT-style attacks. Uncover the effectiveness of network segmentation when it comes to detecting attacks that have bypassed your controls.
Posted: 02 Nov 2016 | Published: 27 Oct 2016

Kaspersky Lab

Advanced cyber-security intelligence
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

Advanced Threat Protection Buyer’s Guide
sponsored by Fortinet, Inc.
WHITE PAPER: To improve your network security, you must do more than augment the latest technology to your security repertoire. Discover 3 strategies for combating threats of varying sophistication.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Fortinet, Inc.

Advanced Threat Protection Checklist
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how to assess your current and proposed security posture against a baseline set of requirements to ensure you pick the right security option for your organization. Uncover 3 overarching recommendations for security.
Posted: 10 Feb 2016 | Published: 10 Feb 2016

Fortinet, Inc.

After Antimalware: Moving Toward Endpoint Antivirus Alternatives
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com outlines why - although endpoint antimalware has become ineffective - organizations today cannot live without it. In addition, learn about alternative methods available to protect your network and endpoints.
Posted: 06 May 2013 | Published: 06 May 2013

SearchSecurity.com

Agile Security for Virtualization, Software-DefinedNetworking, and Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how software-defined networking has changed security, and how some of the best policies can flourish when security is kept at the heart of the data center revolution.
Posted: 07 Nov 2016 | Published: 07 Nov 2016

Fortinet, Inc.

Agility in the Data Center
sponsored by SearchSDN.com
EBOOK: This expert guide offers all the information you need to discover whether or not SDN is a good fit for your organization. Learn how the pros and cons of SDN and how you should go about implementing it.
Posted: 06 Apr 2015 | Published: 06 Apr 2015

SearchSDN.com

Align Employee Performance and Strategic Workforce Planning
sponsored by MacroMicro
EGUIDE: Data grants insight into your talent's performance, but how can you use data from across the company to determine how an individual employee's performance assists in reaching your goals?
Posted: 29 Jul 2016 | Published: 26 Jul 2016

MacroMicro

Amazon EC2 vs. Google's App Engine
sponsored by IT Central Station
ESSENTIAL GUIDE: With the amount of PaaS solutions out there, sometimes it can be hard to decide which one is the best fit for your organization. Find out what verified IT experts say about many PaaS products in this IT Central Station guide.
Posted: 05 Dec 2014 | Published: 05 Dec 2014


An Integrated Approach to Reducing Detection and Response Times
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this white paper to learn about an integrated set of tools that provide a holistic view across the ever-expanding attack surface, and apply big data analytics to detect patterns of concerning behavior faster.
Posted: 03 Mar 2016 | Published: 03 Mar 2016

LogRhythm, Inc.

Analyst's take: Force.com application drives faster development
sponsored by ComputerWeekly.com
WHITE PAPER: Nucleus analyzed existing Force.com application deployments and found an average of 4.9 times faster development.  End customers, developers, and ISVs experience more rapid time to value, lower cost, and greater ongoing flexibility.
Posted: 21 Oct 2011 | Published: 18 Feb 2011

ComputerWeekly.com

API and Traffic Management: How Bazaarvoice Drove Brand Engagement
sponsored by TIBCO Software Inc.
CASE STUDY: Explore the API-led approach Bazaarvoice implemented, leveraging client side Javascript and mobile apps. Discover how this API grew richer and expanded, leading them to rely on an API management platform to unlock increased scalability, improve customer relationships, create new opportunities for innovation, and more.
Posted: 05 Dec 2016 | Published: 10 Aug 2016

TIBCO Software Inc.

API Portfolio Management: Setting Goals for API Success
sponsored by TIBCO Software Inc.
EGUIDE: In this e-guide, expert Tom Nolle explains how to improve API portfolio management by setting goals for development, operations and ALM, and compliance. Discover which tools can help build strong API portfolios and uncover useful tips about cloud-based API management.
Posted: 18 Nov 2016 | Published: 17 Nov 2016

TIBCO Software Inc.

APIs: Bridging the Bimodal IT Gap
sponsored by TIBCO Software Inc.
WEBCAST: This webcast explores the concept of bimodal IT examines how APIs can connect its two sides, aligning their different cultures, speeds, strategies, and governance. Discover how APIs help expose critical data and open up its availability, creating an interface for Agile development and IT services.
Posted: 18 Nov 2016 | Premiered: Nov 18, 2016

TIBCO Software Inc.

Advanced Authentication Methods: Software vs Hardware
sponsored by CA Technologies.
WEBCAST: View this webcast to discover the advantages of a software-based authentication solution and how it can help your organization extend strong authentication to all of your employees, partners and customers in a secure, convenient, cost effective manner.
Posted: 01 Jul 2011 | Premiered: Jun 30, 2011, 10:00 EDT (14:00 GMT)

CA Technologies.

Advanced Threat Detection with Machine-Generated Intelligence
sponsored by Prelert
RESEARCH CONTENT: In this resource, you will discover the research results from a survey of 614 IT security practitioners in the U.S., revealing a lack of confidence in their IT security team's ability to defend their organization. Read on to learn why adoption of a machine-generated intelligence will bolster your cyberdefense.
Posted: 29 Jan 2016 | Published: 31 Oct 2015

Prelert

Agile Testing Quadrants: Guiding Managers and Team in Test Strategies
sponsored by IBM
EGUIDE: Read this e-guide to discover why a testing taxonomy such as the Agile testing quadrants is an effective tool for software teams undertaking this task.
Posted: 27 Dec 2012 | Published: 27 Dec 2012

IBM

Alegent Health Implements Courion Solutions to Deliver Access Assurance
sponsored by Courion Corporation
CASE STUDY: This case study describes how Alegent, a large healthcare system in Nebraska, implemented Courion Solutions to assist with their access assurance needs. Read on to learn what was changed and the benefits that were attained.
Posted: 15 Apr 2010 | Published: 01 Dec 2009

Courion Corporation

Analyst Report: Forrester - Product innovation demands more flexible software delivery
sponsored by IBM
ANALYST REPORT: In September 2010, the IBM Corporation commissioned the Forrester Consulting group to conduct a study whose aim was to better understand the critical role software innovation plays in product development. Download the report to see the results.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

IBM

Analyst: Gartner Report - Magic Quadrant for Integrated Quality Suite
sponsored by IBM
ANALYST REPORT: According to Gartner, vendors must demonstrate both "completeness of vision" and an "ability to execute" to be evaluated as a leader. Gartner's 2011 Magic Quadrant for Integrated Software Quality Suites evaluates IBM as a leader. Read the report to learn more.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

IBM

Analytics Deliver Good User Experience for DevOps and End-Users
sponsored by CA Technologies
EGUIDE: Analytics can measure user satisfaction with enterprise mobile apps, but what about day-to-day maintenance? Learn from experts which metrics help with heavy lifting, and are more than just a pretty interface.
Posted: 18 Feb 2016 | Published: 14 Feb 2016

CA Technologies

Anittel Simplifies Managed Antivirus Service Case Study
sponsored by Webroot
CASE STUDY: This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.
Posted: 14 May 2013 | Published: 14 May 2013

Webroot

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems
sponsored by Dell, Inc.
WHITE PAPER: Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.
Posted: 12 May 2014 | Published: 12 May 2014

Dell, Inc.

Antivirus Evaluation Guide
sponsored by Threat Track Security
WHITE PAPER: In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.
Posted: 13 Sep 2013 | Published: 31 Dec 2012

Threat Track Security

Antivirus: The Hippest New Apple Accessory
sponsored by Threat Track Security
WHITE PAPER: For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security
76 - 100 of 1169 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement