Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blocker Software

RSS Feed   
Ad Blocker Software Reports
 
Report: State of SDN: If You Think SDN Is the Answer, You're Asking the Wrong Question
sponsored by VMware
ANALYST REPORT: Software-defined networking (SDN) has been touted as the answer to all of the challenges of managing your network infrastructure. Gartner has developed a set of recommendations designed to help infrastructure and operations (I&O) leaders deliver on the promise of SDN. Read this Gartner report to gain their valuable insights.
Posted: 29 Oct 2018 | Published: 24 Aug 2017

VMware

Global Internationalized Domain Name Homograph Report
sponsored by Farsight Security
RESEARCH CONTENT: Internationalized Domain Names (IDNs) are often abused by cybercriminals to conduct malicious activities, such as phishing or malware distribution. In this new research report, Farsight Security Global Internationalized Domain Name Homograph Report, examine the prevalence and distribution of IDN homographs across the Internet.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

Farsight Security

IP Intelligence Improves Company Efficiency, Customer Experience, and Security
sponsored by Neustar
WHITE PAPER: Successful brands are the ones that identify and connect with their customers – and that's why IP Intelligence (IPI) is so critical. IPI helps companies sort out the good actors from the bad, improving the customer experience while keeping security systems safe. In this white paper, learn how different companies have implemented Neustar's IPI.
Posted: 13 Feb 2019 | Published: 19 Jul 2017

Neustar

"Bro" Open-Source Framework with Alan Saldich
sponsored by Corelight
WEBCAST: In this webcast, listen to Chief Marketing Officer at Corelight, Alan Saldich, talk about the open source software Bro, now known as Zeek. Learn how CoreLight's sensors help enable the large-scale usage of Bro by retrieving and organizing the data you need to track network traffic and performance.
Posted: 05 Feb 2019 | Premiered: Feb 5, 2019

Corelight

Defending Your Network from Cryptomining
sponsored by Cisco Umbrella
WHITE PAPER: Threat actors increasingly look toward cryptomining, the production of virtual currency, as an easy source of income. Learn how to defend your organization from malicious cryptomining with a security portfolio, today.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Cisco Umbrella

The Network Leaders' Guide to Secure SD-WAN
sponsored by Fortinet, Inc.
WHITE PAPER: Provide the right level of service for every application, while ensuring effective protection from advanced evolving threats across your distributed enterprise.Find out how you can ensure a secure network within your enterprise with SD-WAN.
Posted: 13 Aug 2018 | Published: 13 Aug 2018

Fortinet, Inc.

The Forrester New Wave™: Cybersecurity Risk Rating Solutions, Q4 2018
sponsored by Security Scorecard
RESEARCH CONTENT: According to Forrester's survey, only 14% of respondents are confident that they effectively track all of their third parties. Cybersecurity risk rating solutions can help by automating the collection and analysis of third-party risk data. In this report, Forrester identifies the 9 most significant cybersecurity risk rating solution providers.
Posted: 11 Feb 2019 | Published: 13 Nov 2018

Security Scorecard

Case Study: Expanding a Network of Global Collaboration
sponsored by Egnyte
CASE STUDY: Download this case study to learn how partnering with Egnyte allowed Aerohive Networks to empower worldwide collaboration, while keeping content safe and secure with backups.
Posted: 04 Mar 2019 | Published: 04 Mar 2019

Egnyte

Don't Confuse Low-Code with No-Code
sponsored by OutSystems
WHITE PAPER: Explore the differences between low-code vs. no-code, with a particular focus on the users these tools are designed for and what they're designed to help these users do. Learn how to properly outfit your development projects with low-code and no-code tools so you can enable rapid development for cloud and mobile.
Posted: 27 Sep 2018 | Published: 27 Sep 2018

OutSystems

Top 10 IT security stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement