Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blocking Programs

RSS Feed   
Ad Blocking Programs Reports
 
Computer Weekly – 29 January 2019: A vintage digital transformation for Majestic Wines
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the digital transformation of retailer Majestic Wines and find out how buying rival Naked Wines led to a cloud overhaul of the firm's IT. We look at the challenges for IT managers as they prepare for the end of Windows 7 support. And our buyer's guide discusses deep learning technology. Read the issue now.
Posted: 25 Jan 2019 | Published: 25 Jan 2019

ComputerWeekly.com

Say Hello to the Software-Defined Perimeter (SDP)
sponsored by Zscaler
ANALYST REPORT: ESG predicts that the challenge of using legacy methods will serve as a catalyst for a new user and application-centric approach to secure internal applications – software-defined perimeter (SDP). In this ESG report, explore the rise of software-defined perimeters and its many use cases.
Posted: 10 Oct 2018 | Published: 31 May 2018

Zscaler

The Importance of a Common Distributed Data Services Layer
sponsored by Gigamon
RESEARCH CONTENT: Read this research report to learn about distributed data services layers, and the critical role they play in enabling a secure distributed network environment, regardless of whether they are physical or virtual.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

Gigamon

Top 10 IT security stories of 2018
sponsored by ComputerWeekly.com
EGUIDE: The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

ComputerWeekly.com

An Introduction to Threat Hunting with Bro Zeek
sponsored by Corelight
PRODUCT DEMO: Watch this webcast to hear from Richard Chitamitre, Jonathon Hall, and Andrew Pease—3 elite threat hunters with years of military service fighting on the cyberwarfare frontlines—on how to start using Zeek to hunt down attackers.
Posted: 05 Feb 2019 | Premiered: 05 Feb 2019

Corelight

Insider Threats Part 1: Identifying and Responding with Fidelis EDR Technology
sponsored by Fidelis
WEBCAST: Sometimes the biggest threat to your sensitive data is one of your own employees. In this webcast, Fidelis' Lucas Chumley and Louis Smith will demonstrate how to minimize the risk posed by an insider threat. Also, see how Fidelis technology can help identify and provide initial notification of a probable threat and then automate response.
Posted: 20 Feb 2019 | Premiered: Feb 20, 2019

Fidelis

AI-Driven Cyber Crime Puts Network Engineering in the Hot Seat
sponsored by Fortinet, Inc.
WHITE PAPER: Cyber criminals are leveraging AI and agile development techniques to outpace human security analysts and outmaneuver even the newest network defenses. In this white paper, learn different ways to revamp your network security strategy to help keep you protected from an evolving threat landscape.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

Fortinet, Inc.

Corelight Webcast: New SIEM on the Block -- Meet Humio
sponsored by Corelight
WEBCAST: Bro network security monitoring is an open source tool. It turns raw network traffic into comprehensive network logs organized by protocol, with key fields extracted specifically for security use cases. In this webcast, watch a demo to see how Corelight's technical integration with Humio allows you to economically monitor all your network traffic.
Posted: 28 Jan 2019 | Premiered: Aug 21, 2018

Corelight

Scaling Network Security
sponsored by Gigamon
ANALYST REPORT: Network speeds continue to increase, putting a strain on security controls that can't scale at the same rate as the networks. Read this research paper to review different network architectures that were designed with security in mind. Also learn about current requirements for today's networks, as well as guidelines for the future.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

Gigamon

CW ANZ: Taming the data beast
sponsored by ComputerWeekly.com
EZINE: Software-defined storage (SDS), which promises greater transparency and control over data, is an increasingly important tool in the enterprise technology armoury. In this issue of CW ANZ, we look at how Australian enterprises are turning to SDS to improve data management and direct data to different tiers of storage or to applications.
Posted: 11 Oct 2018 | Published: 11 Oct 2018

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement