Software  >   Systems Software  >   Server Software  >  

Security Proxies

RSS Feed    Add to Google    Add to My Yahoo!
Security Proxies Reports
 
A Technical Review of Caching Technologies
sponsored by BlueCoat
WHITE PAPER: The goal of this white paper is to discuss the role of caching, describe in detail how object caching and byte caching works, and show how these caching technologies work together to deliver true performance differentiation.
Posted: 29 Jun 2009 | Published: 17 Dec 2007

BlueCoat

Understanding and Selecting a Data Loss Prevention Solution
sponsored by Websense, Inc.
WHITE PAPER: Data Loss Prevention has matured considerably since the release of the first version of this report three years ago. Back then, the market was dominated by startups with only a couple major acquisitions by established security companies.The entire market was probably smaller than the leading one or two providers today.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

Websense, Inc.

How to Gain Visibility and Control of Encrypted SSL Web Sessions
sponsored by BlueCoat
WHITE PAPER: Blue Coat's SSL proxy functionality enables organizations to extend the power of the intelligent and secure proxy appliances to all SSL traffic. Read about how a proxy gives visibility and control of SSL communications.
Posted: 20 Sep 2007 | Published: 01 Jan 2006

BlueCoat

Toward an Identity & Context Virtualization Service: A Buyer’s Guide to Virtual Directories
sponsored by Radiant Logic, Inc.
WHITE PAPER: This paper is a practical guide to choosing the best virtual directory solution to meet your needs, both now and in the future. Check out this white paper for a blueprint on how to evaluate virtual directories, from use cases and technical parameters to the five questions you should ask yourself before choosing a virtualization solution.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

Radiant Logic, Inc.

Getting Ready for Next-Gen Application Lifecycle Management
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This technical white paper explores the use of a next-generation app lifecycle management platform made for defining, managing, and automating activities. Discover how to implement and support a successful Agile transformation to optimize the speed, quality, and scale of your app development.
Posted: 16 Sep 2016 | Published: 31 Aug 2016

Hewlett Packard Enterprise

Intelligent Business Process Management for the Enterprise
sponsored by Red Hat
WHITE PAPER: By combining business process management, resource planning, and complex event processes into a single, integrated strategy, teams can experience the benefits of agile development. Uncover ways to achieve automated business operations and shorter development cycles with a cloud-ready architecture.
Posted: 16 Aug 2016 | Published: 16 Aug 2016

Red Hat

Key Features and Benefits of Agile Development
sponsored by CA Technologies
WHITE PAPER: Discover ways agility can help you synchronize development work with business priorities, so you can coordinate teams to deliver apps on a predictable cadence.
Posted: 23 Aug 2016 | Published: 23 Aug 2016

CA Technologies

Windows 10: A Guide for OS Migration
sponsored by Flexera Software
EGUIDE: Migrating to Windows 10 may seem like a daunting task, especially since there are organizations out there that haven't finished the move from Windows XP to Windows 7. But in this e-guide, we have assembled some useful advice about best practices, planning, and helpful tools to make your clients' OS migrations as simple and pain-free as possible.
Posted: 22 Jul 2016 | Published: 20 Jul 2016

Flexera Software

How to Evaluate SD-WAN, Hybrid WAN Products
sponsored by SearchNetworking.com
EBOOK: This guide helps IT professionals learn about software-defined wide area network options in order to select the best product for their enterprise.
Posted: 08 Sep 2016 | Published: 08 Sep 2016

SearchNetworking.com

Enterprise cloud applications – can we trust them?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement