Software  >   Systems Software  >   Server Software  >  

Security Proxies

RSS Feed    Add to Google    Add to My Yahoo!
Security Proxies Reports
 
Toward an Identity & Context Virtualization Service: A Buyer’s Guide to Virtual Directories
sponsored by Radiant Logic, Inc.
WHITE PAPER: This paper is a practical guide to choosing the best virtual directory solution to meet your needs, both now and in the future. Check out this white paper for a blueprint on how to evaluate virtual directories, from use cases and technical parameters to the five questions you should ask yourself before choosing a virtualization solution.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

Radiant Logic, Inc.

Understanding and Selecting a Data Loss Prevention Solution
sponsored by Websense, Inc.
WHITE PAPER: Data Loss Prevention has matured considerably since the release of the first version of this report three years ago. Back then, the market was dominated by startups with only a couple major acquisitions by established security companies.The entire market was probably smaller than the leading one or two providers today.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

Websense, Inc.

How to Gain Visibility and Control of Encrypted SSL Web Sessions
sponsored by BlueCoat
WHITE PAPER: Blue Coat's SSL proxy functionality enables organizations to extend the power of the intelligent and secure proxy appliances to all SSL traffic. Read about how a proxy gives visibility and control of SSL communications.
Posted: 20 Sep 2007 | Published: 01 Jan 2006

BlueCoat

A Technical Review of Caching Technologies
sponsored by BlueCoat
WHITE PAPER: The goal of this white paper is to discuss the role of caching, describe in detail how object caching and byte caching works, and show how these caching technologies work together to deliver true performance differentiation.
Posted: 29 Jun 2009 | Published: 17 Dec 2007

BlueCoat

Putting Security Into DevOps
sponsored by Veracode, Inc.
WHITE PAPER: This white paper explores how DevOps helps you weave security testing, validation, and monitoring into each stage of the app lifecycle. Find out how to enable secure DevOps app development, and pave the way for continuous integration and continuous deployment.
Posted: 03 May 2017 | Published: 30 Oct 2015

Veracode, Inc.

Ad Hoc Mobile Apps for Crisis Management: Cincinnati Responds to Storm Disaster
sponsored by Flowfinity
CASE STUDY: This case study explores how the city of Cincinnati responded to extreme flash floods in 2016 by enabling field services teams with on-demand mobile apps that required little to no coding to build. Learn about the fast app development approach that empowered them to increase their mobility and uncover 4 key takeaways from the city's experience.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

Flowfinity

Mobilizing Legacy Apps: Help IT Tackle a Complex Challenge with a Simple Solution
sponsored by PowWow
WHITE PAPER: This white paper explores how to achieve rapid mobile app development (RMAD). Find out how to leverage a mobile-first platform with automated tools to transform any app for mobile and create native apps that run on any device and on any OS.
Posted: 03 May 2017 | Published: 03 May 2017

PowWow

How to Build Mobile Apps in the Enterprise, Faster and Smarter
sponsored by Flowfinity
WHITE PAPER: This white paper explores how to meet the demand for mobile apps with a fully declarative approach. Find out how to avoid the costs and delays of coding, and enable both developers and LOB users to build apps quickly.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

Flowfinity

How to Automate Security into Your DevOps Pipeline
sponsored by Veracode, Inc.
WHITE PAPER: Manual penetration testing and on-premise tools help prevent breaches, but they're too slow for an increasingly fast-paced, mobile-first world. Discover how to accelerate time-to-market without sacrificing app compliance by integrating security into your existing toolchains and DevOps pipelines.
Posted: 01 May 2017 | Published: 01 May 2017

Veracode, Inc.

Legacy App Modernization: Bring Business Critical Apps to the Cloud
sponsored by Apcera
WHITE PAPER: This white paper explores how to modernize legacy apps to resolve the issues that stem from running and maintaining them. Learn about 7 different approaches to modernization and how to bring business critical apps to the cloud.
Posted: 24 Apr 2017 | Published: 31 Dec 2016

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement