Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blocker Programs

RSS Feed   
Ad Blocker Programs Reports
 
Continuous Testing in Micro Focus
sponsored by Micro Focus_Infosys
WHITE PAPER: Download this guide for tips on how to achieve success with continuous testing, through a combination of process and technical enablers – from testing baked into user stories, to manual testing and automated infrastructure.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Micro Focus_Infosys

Get Started with Mobile Application Testing
sponsored by Perfecto Mobile
WHITE PAPER: Save this 6-step guide to get started with mobile app testing and discover testing tips along the way.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

Perfecto Mobile

An Introduction to Selenium Testing with 4 Tips from the Pros
sponsored by Perfecto Mobile
WHITE PAPER: Save this e-book to take a brief look at where Selenium came from, where it's headed and learn four tips from the pros on how to get the most out of your testing platform.
Posted: 23 Aug 2018 | Published: 23 Aug 2018

Perfecto Mobile

Buyer's Guide: Security Orchestration, Automation, & Response
sponsored by Splunk
RESOURCE: This buyer's guide outlines the important criteria you should consider when evaluating security orchestration, automation, and response platforms, including core components, platform attributes and business considerations. Plus, find a checklist you can print out, read over, and mark up as you evaluate platform options.
Posted: 17 Oct 2018 | Published: 17 Oct 2018

Splunk

To SIEM or Not to SIEM, Find Out Your Options
sponsored by Arctic Wolf
VIDEO: With the growing complexity of SIEM solutions increasing and a shortage of people with cybersecurity skills, many organizations are looking for alternatives to SIEM. This webcast compares SIEM to security operations centers (SOCs).
Posted: 06 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

Secure Collaboration That Teams Love Using
sponsored by Dropbox
WEBCAST: Collaboration tools are essential to your organization, and you're constantly using them to share important documents, but how secure are they? Download this webcast to learn about Dropbox, and how the collaboration tool can encourage teamwork while complying with security requirements.
Posted: 26 Sep 2018 | Premiered: Sep 26, 2018

Dropbox

The Essential Guide to Security
sponsored by Splunk
WHITE PAPER: With recent high-profile breaches, global ransomware attacks and the scourge of cryptomining, you need to defend your organization, adopt the right processes and procedures early on, and hunt down new adversaries. Inside, learn about the 6 stages of a security journey and more.
Posted: 02 Aug 2018 | Published: 02 Aug 2018

Splunk

Manage Risk by Protecting the Apps and Data That Drive Business Productivity
sponsored by Citrix
WHITE PAPER: Download this infographic to learn about Citrix's Secure Digital Workspace, a software defined perimeter that combines secure access to apps and data with contextual control, visibility and behavior analytics across devices, networks and clouds.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Citrix

VxRail Cybersecurity Solutions Overview
sponsored by Dell EMC and VMware
PRODUCT OVERVIEW: Access this sheet for an overview of a resilient hyper-converged infrastructure option ideal for keeping virtualization environments secure. The system includes extensive levels of encryption to protect the confidentiality of data in use, in motion, and at rest; safeguard the entire data store, and protect VMs.
Posted: 24 Oct 2018 | Published: 24 Oct 2018

Dell EMC and VMware

Firewall Cleanup Recommendations
sponsored by FireMon
WHITE PAPER: Download this white paper to learn about FireMon, which provides specialized tools and features to clean up firewalls enterprise-wide efficiently and thoroughly.
Posted: 19 Nov 2018 | Published: 19 Nov 2018

FireMon
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement