Software  >   Systems Software  >   Server Software  >  

Security Proxies

RSS Feed    Add to Google    Add to My Yahoo!
Security Proxies Reports
 
Power of Proxy in Security
sponsored by Symantec & Blue Coat Systems
WEBCAST: With defense in depth vital to protecting your enterprise, discover how a proxy system can tackle advanced threats, combat the "too many devices" problem, ensure compliance, and more.
Posted: 19 Jun 2017 | Premiered: Jun 6, 2017

Symantec & Blue Coat Systems

Understanding and Selecting a Data Loss Prevention Solution
sponsored by Websense, Inc.
WHITE PAPER: Data Loss Prevention has matured considerably since the release of the first version of this report three years ago. Back then, the market was dominated by startups with only a couple major acquisitions by established security companies.The entire market was probably smaller than the leading one or two providers today.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

Websense, Inc.

How to Gain Visibility and Control of Encrypted SSL Web Sessions
sponsored by BlueCoat
WHITE PAPER: Blue Coat's SSL proxy functionality enables organizations to extend the power of the intelligent and secure proxy appliances to all SSL traffic. Read about how a proxy gives visibility and control of SSL communications.
Posted: 20 Sep 2007 | Published: 01 Jan 2006

BlueCoat

A Technical Review of Caching Technologies
sponsored by BlueCoat
WHITE PAPER: The goal of this white paper is to discuss the role of caching, describe in detail how object caching and byte caching works, and show how these caching technologies work together to deliver true performance differentiation.
Posted: 29 Jun 2009 | Published: 17 Dec 2007

BlueCoat

Toward an Identity & Context Virtualization Service: A Buyer’s Guide to Virtual Directories
sponsored by Radiant Logic, Inc.
WHITE PAPER: This paper is a practical guide to choosing the best virtual directory solution to meet your needs, both now and in the future. Check out this white paper for a blueprint on how to evaluate virtual directories, from use cases and technical parameters to the five questions you should ask yourself before choosing a virtualization solution.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

Radiant Logic, Inc.

A New Take on Managing the Virtualized Data Center
sponsored by VMware
RESOURCE: Download this resource to gain the most value from your virtualized data center with an integrated platform that includes intelligent operations. You'll learn how to diagnose and resolve issues before they affect performance, identify capacity shortages, and more.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

VMware

Availability and Risk Avoidance for the Software-Defined Data Center
sponsored by Veeam Software
WHITE PAPER: Users demand access to information and applications at any given time from anywhere and any device, without tolerance for downtime or data loss. Access this white paper to learn how to keep your software-defined data center up and running at all times with backup and replication that won't leave you in the dark like legacy tools.
Posted: 01 Jun 2017 | Published: 16 Aug 2016

Veeam Software

Continuous Delivery: Deliver Software More Quickly with Jenkins Pipeline
sponsored by Cloudbees
WHITE PAPER: The path to continuous delivery (CD) starts by modeling and automating the software delivery pipeline. Learn how to map the complex flows of CD and foster a DevOps culture with Jenkins Pipeline.
Posted: 17 Jul 2017 | Published: 31 Dec 2016

Cloudbees

Secure Apps at the Speed of DevOps
sponsored by Veracode, Inc.
RESEARCH CONTENT: This Forrester Research report explores the importance of uniting security pros with Dev and Ops to deliver on accelerated secure app development. Uncover the report's key findings to learn how to build security into earlier stages of the app lifecycle to remediate vulnerabilities without sacrificing speed.
Posted: 04 May 2017 | Published: 16 Dec 2016

Veracode, Inc.

Secure DevOps Survival Guide
sponsored by Veracode, Inc.
WHITE PAPER: If you're embarking on a DevOps journey, traditional methods for ensuring app security just won't be able to keep up. This DevOps survival guide explores the elements of accelerated but secure app development. No matter where you are in your journey, uncover critical tactics for implementing secure DevOps.
Posted: 04 May 2017 | Published: 04 May 2017

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement