Website Monitoring Reports

Web Threats 2010: The Risks Ramp Up
sponsored by CSC
WHITE PAPER: In the face of unprecedented web threat level growth, CSC CloudProtection for Mail and Web delivers protection of the very highest quality for thousands of businesses worldwide. Read this white paper to learn more about today's web threats and how your business can protect itself against them comprehensively and cost-effectively.
Posted: 17 Nov 2010 | Published: 17 Nov 2010

CSC

Transaction Tracing through Complex Web Applications
sponsored by Dell Software
WHITE PAPER: To ensure that application slowdowns and other revenue-impeding application issues are isolated, diagnosed and fixed quickly, sometimes it’s necessary to trace transactions from their source across all of the technology domains that contribute to transaction response time. Read this paper now to learn more.
Posted: 27 Dec 2010 | Published: 27 Dec 2010

Dell Software

Increase Your Web Performance Now
sponsored by Limelight Networks, Inc.
WHITE PAPER: The following white paper addresses the issues with website performance and how you can ensure that you deliver only the fastest content to your consumers.
Posted: 07 Nov 2013 | Published: 07 Nov 2013

Limelight Networks, Inc.

Executive Brief: OpenText Web Experience Management
sponsored by OpenText
WHITE PAPER: Building and maintaining a comprehensive website has recently become a primary area of focus for many organizations. This white paper outlines expectations and what you need to create a compelling and meaningful conversation between website, brand and user across a myriad of devices and platforms.
Posted: 23 Aug 2013 | Published: 23 Aug 2013

OpenText

Web Content Control: Five Steps to a Successful Implementation
sponsored by Untangle, Inc.
WHITE PAPER: Implementing Web Content Control can seem intimidating. It represents the uneasy marriage of network administration and human resource management. With a little forethought, however, it becomes straightforward and very effective. Read this whitepaper for a step-by-step overview of a successful web content control implementation.
Posted: 18 Nov 2009 | Published: 30 Oct 2009

Untangle, Inc.

Webinar: Best Practices in Managing and Monitoring Mobile End User Experiences
sponsored by Correlsense
WEBCAST: Watch this webcast to discover best practices for managing and monitoring your mobile end-user experiences. Learn common technical issues businesses are facing in today's mobile environment and see case studies of different techniques organizations are using to monitor mobile web devices.
Posted: 20 Feb 2012 | Premiered: Feb 17, 2012

Correlsense

Web Browser Security Features Make Attacks Harder
sponsored by TechTarget Security
EGUIDE: This e-guide from SearchSecurity.com explores the features Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome are developing that are making the job of the attacker much harder.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

TechTarget Security

Protecting User from Firesheep and Sidejacking Attacks with SSL
sponsored by VeriSign EMEA
WHITE PAPER: This paper addresses the problems of unsecured Wi-Fi including recent security concerns such as the Firesheep and sidejacking, and how to protect against these attacks. Learn how public websites can provide security with TLS/SSL by not only harden against many attacks, but also assure users of that security.  
Posted: 29 Jul 2011 | Published: 29 Jul 2011

VeriSign EMEA

Running Secure Drupal Websites with Acquia and AWS
sponsored by Acquia, Inc.
PRESENTATION TRANSCRIPT: Hosting your website in the cloud offers agility and scalability benefits, but most businesses have reservations about security. Access this exclusive podcast to learn about an innovative cloud platform that is built in accordance with security best practices to ensure your Web content is hosted in a highly secure and reliable environment.
Posted: 22 Aug 2012 | Published: 01 Aug 2012

Acquia, Inc.

Advanced Identity Tracking for Social Networking Sites
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This resource details the methods used to assist social networking sites in identifying online predators and thwarting potentially serious attacks. View now to learn more!
Posted: 22 Apr 2013 | Published: 31 May 2012

Hewlett Packard Enterprise