Software  >   Applications Software  >   Internet Applications Software  >  


RSS Feed    Add to Google    Add to My Yahoo!
Bots Reports
Adjustments to Make for Mobile Application Development Processes
sponsored by Oracle Corporation
EGUIDE: In this expert guide, you'll learn how to enable timely mobile app push notifications to ensure end user trust and satisfaction. In addition, read on to learn how to leverage Java for server-side mobile development processes.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

Oracle Corporation

BlackBerry® Push Service SDK documentation
sponsored by BlackBerry
INFORMATION CENTER: BlackBerry® Push Service SDK contains a set of Java® libraries you can use to develop push applications. Access this information center, with technical overviews, guides and more to start developing BlackBerry® Push Services.
Posted: 11 Jun 2010 | Published: 11 Jun 2010


GoAnywhere: Mutual Bank Finds Secure Data Transfer Solution with Fast Implementation
sponsored by Linoma Software
CASE STUDY: In this case study Think a mutual bank, implemented GoAnywhere software. They chose this product because of the database conversion, the database push, the secure FTP, and the support staff at Linoma.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

Linoma Software

Mobile Learning with BlackBerry Smartphones
sponsored by BlackBerry
CASE STUDY: This study looks at the University of Waterloo's pilot project to test the impact of mobile learning using BlackBerry smartphones on their educational experience. The project utilized Chalk Pushcast software which allows organizations to create, deliver and track impactful content, which can include text, graphics, audio voiceover, video, and more.
Posted: 21 Jan 2011 | Published: 21 Jan 2011


Leveraging the Right Cloud Solution for Your Toughest Data Challenges
sponsored by Dell, Inc. and Intel®
WHITE PAPER: In this white paper, learn about new developments in the cloud space, and the factors to consider before setting up a cloud implementation model. Furthermore, learn how to strategize effectively so that you can make an informed choice when selecting a path to cloud adoption.
Posted: 05 Oct 2015 | Published: 30 Jun 2015

Dell, Inc. and Intel®

ROI Analysis: Red Hat Jboss BPM Suite 6 Versus Community Projects
sponsored by Red Hat
WHITE PAPER: This white paper explains how moving from jBPM and Drools to JBoss BPM Suite can result in a significant return on investment. Read now to learn about JBoss BPM Suite features.
Posted: 30 Jul 2015 | Published: 31 Mar 2014

Red Hat

DevOps For Dummies - New Edition with SAFe
sponsored by IBM
WHITE PAPER: In this "DevOps for Dummies" guide, get an introduction to DevOps from a holistic business perspective. Also learn about key DevOps topics, including principles and best practices, four paths to DevOps adoption, and more.
Posted: 17 Nov 2015 | Published: 31 Dec 2014


CW Buyer's Guide: SaaS Management
sponsored by
EZINE: Computer Weekly looks at how organisations should evolve their SaaS selection criteria to focus on newer metrics that are better indicators of supplier performance; the number of compliance issues that come with SaaS; and how CIOs believe SaaS providers must better meet their needs in terms of simplicity and flexibility.
Posted: 11 Sep 2015 | Published: 11 Sep 2015

Challenges of SaaS Application Integration
sponsored by Oracle Corporation
EGUIDE: In this expert e-guide, learn best practices for developing new strategies to face cloud application integration challenges head on. Learn about SaaS providers' app integration capabilities, common hurdles of cloud and enterprise application integration, and more.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

Oracle Corporation

2015 Global DDoS Threat Landscape Report
sponsored by Imperva
WHITE PAPER: DDoS attacks against network infrastructures continue to grow in size and duration. Download this report and learn what to expect and how you can protect your website from such attacks.
Posted: 06 Oct 2015 | Published: 06 Oct 2015


Device Fingerprinting: A New Tool for Enhanced Application Protection
sponsored by Radware
WHITE PAPER: This white paper outlines the 5 common factors challenging IP-based identification and presents an overview of device fingerprinting to gather IP-agnostic information to detect malicious sources and users. View now and discover how to mitigate today's top app threats including, web scraping, bots, DDoS, and more.
Posted: 19 Nov 2015 | Published: 05 Jan 2015


10 Features Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER: This paper explains in detail the 10 features that every Web application firewall must provide.
Posted: 01 Oct 2015 | Published: 01 Oct 2015


Global profiles of the fraudster
sponsored by
ESSENTIAL GUIDE: Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

NH Hotel Group Enhances Network Access and Performance
sponsored by Akamai
CASE STUDY: In this white paper, learn how NH Hotel Group, a multinational hotel, boosted site performance and ensured uptime by bolstering cybersecurity to stop malicious network threats. View now to learn how to improve UX through better network traffic access monitoring and management.
Posted: 18 Nov 2015 | Published: 18 Mar 2015


Network Intrusion Prevention Systems Product Analysis Report
sponsored by Dell Software
WHITE PAPER: This analyst white paper takes an in-depth look at the strengths and weaknesses of one firewall. View now to examine the analyst's scorecard for the product's performance and what you need to know about it.
Posted: 29 May 2015 | Published: 18 Dec 2013

Dell Software

Enterprise Security in Asia 2015: The Ugly, The Bad & The Good
sponsored by F5 Networks
WHITE PAPER: This white paper reveals the truth about cybersecurity in Asia including a 52% surge in breaches and the emerging sophisticated schemes from hackers. View now to learn which attacks are most popular and how to avoid being the next data breach victim.
Posted: 01 Oct 2015 | Published: 13 Jan 2015

F5 Networks

How Boston Properties Stays One Step Ahead of Advanced Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this case study to discover how Boston Properties, a real estate company, found a security tool that could catch any cybersecurity threat, even unknown ones.
Posted: 12 Nov 2015 | Published: 12 Nov 2015

Check Point Software Technologies Ltd.

10 Cyber Threats Outside the Firewall
sponsored by Neustar®
WHITE PAPER: Examine a list of 10 current threats that exist outside of perimeter network security measures in this exclusive white paper. View now to learn how to stop these threats.
Posted: 09 Oct 2015 | Published: 17 Sep 2015


Malware Attacks Demand a New Malware Defense Approach
sponsored by
EGUIDE: Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from offers advice on protecting your organization from these new threats. View now to learn more!
Posted: 19 Jun 2013 | Published: 19 Jun 2013

Unknown Malware - What You Can't See Can Hurt You
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This infographic provides some essential statistics on the rise of unknown malware and gives advice for defeating it. Discover how you can fight the unknown and keep your organization secure.
Posted: 17 Nov 2015 | Published: 31 Dec 2014

Check Point Software Technologies Ltd.

Improve Organizational Security with End-to-End Mobile Protection
sponsored by MXN Corporation
WHITE PAPER: In this brief white paper, you will learn about a mobile operating system with built in end-to-end security that will transform your enterprise mobility. Learn how to prevent unauthorized access to your networks without the need for Network Access Control (NAC) software.
Posted: 16 Nov 2015 | Published: 31 Jul 2013

MXN Corporation

How to Choose Your Next Sandboxing Solution
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper for a look at the eight essential qualities of effective sandboxing solutions and advice from Gartner on preventing the most sophisticated unknown malware from compromising your systems and networks.
Posted: 12 Nov 2015 | Published: 13 Jul 2015

Check Point Software Technologies Ltd.

How to Stop Today's Advanced Hackers
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This white paper discusses how you can protect against any threat today's advanced hackers throw at you.
Posted: 13 Nov 2015 | Published: 19 Aug 2015

Check Point Software Technologies Ltd.

Information Security Magazine – May 2015 Issue
sponsored by
EZINE: In this issue of Information Security magazine, we study perimeter network security in the mobile and cloud era, and strategies to secure access from application-layer protection to single sign-on technologies.
Posted: 01 May 2015 | Published: 30 Apr 2015

How Traditional Firewalls Fail Today's Networks — And Why Next-Generation Firewalls Will Prevail
sponsored by Dell, Inc.
WHITE PAPER: Learn exactly where traditional firewalls fall short, and discover how next-generation firewalls provide excellent network performance without compromising security. Read this e-book and uncover where traditional firewalls fall short, and how next-generation firewalls fill those gaps.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

Dell, Inc.

Network-Wide Targeted Attack Detection
sponsored by Trend Micro
WHITE PAPER: This white paper explores holistic network security and how to detect and respond to targed attacks no matter where malware may be hiding
Posted: 01 Oct 2015 | Published: 26 Aug 2015

Trend Micro

Website Security Threat Report Part 1
sponsored by Symantec Corporation
WHITE PAPER: This website security threat report will give enterprises, small businesses and consumers essential information to help secure their systems from threat vulnerabilities. Continue reading to access emerging trends in attacks, malicious code activity, phishing, and spam.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

Symantec Corporation

Secure Tablet Use in the Enterprise: What You Need to Know
sponsored by MXN Corporation
PRODUCT OVERVIEW: In this brief white paper, you will discover a tablet operating system and corresponding hardware that are optimized to maintain a reliable, secure connection to your data center. Read on to learn how to harness the power of enterprise tablets without the unnecessary burden of additional VPN software.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

MXN Corporation

Achieve Enterprise-wide Network Visibility with Monitoring Tool
sponsored by LogRhythm, Inc.
PRODUCT LITERATURE: True enterprise security intelligence requires real-time awareness and an understanding of all data traversing the network. The LogRhythm Network Monitor provides both application level awareness and rich network session details, delivering enterprise-wide network visibility. View this datasheet to learn more about this network monitoring tool.
Posted: 25 Jul 2014 | Published: 31 Mar 2014

LogRhythm, Inc.

Concern for Accidental and Malicious Data Breaches for Data Stored in New Zealand
sponsored by Unisys
WHITE PAPER: In this specific study, Unisys focused on New Zealand and uncovered the fact that most New Zealanders were just as concerned about accidental security breaches as they were with malicious attacks. What other key concerns were there? Download today and find out the facts.
Posted: 29 Sep 2015 | Published: 31 Dec 2014


Network Vulnerabilities Defended: Fighting Today’s Advanced Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper reveals the three phase strategy to defending your network against determined cybercriminals.  Read on to take a look into hackers' minds and learn how to improve data protection.
Posted: 04 May 2015 | Published: 22 Apr 2015

Fortinet, Inc.

Exposing The Unknown: How Sandboxing Technology Fights Modern Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper to learn how sandboxing has evolved to fight modern cybercrime and how the technology could secure your business.
Posted: 13 Nov 2015 | Published: 30 Jun 2015

Check Point Software Technologies Ltd.

Clustering to counter Android malware
sponsored by
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis Series looks at how the rapid growth of new Android malware calls for automated tools to help malware analysts.
Posted: 11 Mar 2015 | Published: 11 Mar 2015
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement