Web Site Performance Reports

Running Secure Drupal Websites with Acquia and AWS
sponsored by Acquia, Inc.
PRESENTATION TRANSCRIPT: Hosting your website in the cloud offers agility and scalability benefits, but most businesses have reservations about security. Access this exclusive podcast to learn about an innovative cloud platform that is built in accordance with security best practices to ensure your Web content is hosted in a highly secure and reliable environment.
Posted: 22 Aug 2012 | Published: 01 Aug 2012

Acquia, Inc.

Advanced Identity Tracking for Social Networking Sites
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This resource details the methods used to assist social networking sites in identifying online predators and thwarting potentially serious attacks. View now to learn more!
Posted: 22 Apr 2013 | Published: 31 May 2012

Hewlett Packard Enterprise

Hackers Open Malware Backdoor in Apache Webservers
sponsored by TechTarget Security
EGUIDE: A new threat is targeting Apache webservers, which are among the most widely used webservers in the world. Read this expert E-Guide to discover how to fight back against these hackers and secure your webserver.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

TechTarget Security

Increase Your Web Performance Now
sponsored by Limelight Networks, Inc.
WHITE PAPER: The following white paper addresses the issues with website performance and how you can ensure that you deliver only the fastest content to your consumers.
Posted: 07 Nov 2013 | Published: 07 Nov 2013

Limelight Networks, Inc.

Single Source of Truth
sponsored by SOASTA, Inc
WHITE PAPER: With real user measurement (RUM), you can measure perceived load time for your users at the exact point of engagement, so you know exactly where to improve performance for better outcomes. In this white paper, get an overview of the business and technical aspects of measuring performance with RUM.
Posted: 07 Jan 2014 | Published: 07 Jan 2014

SOASTA, Inc

Online Testing for Site Optimization: 101
sponsored by WebTrends
WHITE PAPER: Web site optimization can drastically help your business increase conversion rates and bring in revenue, but it is not a simple process. Turn to this informative white paper to learn about the different types and strengths of online testing for site optimization, and determine which process is most effective for your organization.
Posted: 16 Apr 2013 | Published: 16 Apr 2013

WebTrends

Vulnerability Assessment
sponsored by Symantec Corporation
WHITE PAPER: Access this whitepaper for the truth behind today's vulnerability assessment approaches, and why a clearer vision of the problem is needed for more successful security systems. Click now to find an opportunity to bridge the gap between vulnerability assessment and security management, and use actionable intelligence as effective defense.
Posted: 14 Oct 2013 | Published: 14 Oct 2013

Symantec Corporation

Web Content Control: Five Steps to a Successful Implementation
sponsored by Untangle, Inc.
WHITE PAPER: Implementing Web Content Control can seem intimidating. It represents the uneasy marriage of network administration and human resource management. With a little forethought, however, it becomes straightforward and very effective. Read this whitepaper for a step-by-step overview of a successful web content control implementation.
Posted: 18 Nov 2009 | Published: 30 Oct 2009

Untangle, Inc.

Hosting is Dead
sponsored by Pantheon
WHITE PAPER: When launching a website, many businesses invest in a hosting service but they still don't have the infrastructure needed to handle load spikes, fix bugs, and add features. If like many companies, you chose Drupal to remain agile, managing and changing your website should be no different -- but traditional hosting can hold you back.
Posted: 17 Feb 2014 | Published: 17 Feb 2014

Pantheon

Web Browser Security Features Make Attacks Harder
sponsored by TechTarget Security
EGUIDE: This e-guide from SearchSecurity.com explores the features Microsoft Internet Explorer, Mozilla Firefox, and Google Chrome are developing that are making the job of the attacker much harder.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

TechTarget Security