All resources sponsored by:

FireEye

1 - 25 of 31 Matches
What's Your Next Security Move?
sponsored by FireEye
WHITE PAPER:This quick self-assessment will help you navigate to your next big security decision and create better protection against advanced attackers.
Posted: 06 Apr 2015 | Published: 31 Dec 2014
Get This Now


Security Reimagined: An Adaptive Approach for the Digital Age
sponsored by FireEye
WHITE PAPER:It's time to reimagine how we do security. This white paper shows you how with tips on creating an integrated, proactive security system designed for the cybercrime of today.
Posted: 03 Apr 2015 | Published: 31 Dec 2014
Get This Now


Prepare Yourself for the Cybercrime of 2015
sponsored by FireEye
WHITE PAPER:This 2015 cybercrime report analyzes the threats of 2014 and makes predictions for what you need to be prepared for in the upcoming year.
Posted: 02 Apr 2015 | Published: 31 Dec 2014
Get This Now


Self-Assessment: How Prepared Are You for Advanced Attacks?
sponsored by FireEye
WHITE PAPER:Take this brief self-assessment for an estimate on how prepared you are and suggestions on how to improve.
Posted: 01 Apr 2015 | Published: 31 Dec 2014
Get This Now


Create a Business Case for Better Security
sponsored by FireEye
VIRTUAL TRADESHOW:The white paper presents tips for creating a persuasive business case for better security investment.
Posted: 30 Mar 2015 | Premiered: Dec 31, 2014
Get This Now


Cybercriminals Exploit New Weaknesses in Retailers’ Networks
sponsored by FireEye
WHITE PAPER:In this informative white paper, discover how you can protect your retail business and your customers by implementing smart security strategies, including increased endpoint security and privileged account management.
Posted: 08 Aug 2014 | Published: 08 Aug 2014
Get This Now


A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER:This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted: 05 Jun 2014 | Published: 05 Jun 2014
Get This Now


Beyond the Breach
sponsored by FireEye
WHITE PAPER:This informative whitepaper takes a look at today's threat landscape and outlines the unfortunate news – security breaches are inevitable.
Posted: 04 Jun 2014 | Published: 04 Jun 2014
Get This Now


Analyzing Four Widely Exploited Java Vulnerabilities
sponsored by FireEye
WHITE PAPER:This informative guide explores the technical details of the 4 most common Java vulnerabilities and outlines each step of the infection flow.
Posted: 03 Jun 2014 | Published: 03 Jun 2014
Get This Now


DLL Side-loading: A Thorn in the Side of the Anti-Virus Industry
sponsored by FireEye
WHITE PAPER:This informative whitepaper explores the history of DLL side-loading and its role in the malware arena – affecting your enterprise security.
Posted: 30 May 2014 | Published: 30 May 2014
Get This Now


How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER:This white paper explores the widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers.
Posted: 10 Mar 2014 | Published: 31 Dec 2013
Get This Now


World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER:This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.
Posted: 05 Mar 2014 | Published: 31 Dec 2013
Get This Now


The Definitive Guide to the Next Generation of Threat Protection
sponsored by FireEye
EBOOK:This in-depth eBook examines the next generation of threat protection and provides key insights into critical topics, such as advanced persistent threats and zero-day attacks.
Posted: 04 Mar 2014 | Published: 31 Dec 2013
Get This Now


Advanced Attacks Require Federal Agencies to Reimagine IT Security
sponsored by FireEye
WHITE PAPER:This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
Get This Now


Supply Chain Analysis: From Quartermaster to Sunshop
sponsored by FireEye
WHITE PAPER:This in-depth guide explores the current threat landscape and the role of APTs. Read now for more information on how APTs are being used for wide-scale cybercrime campaigns.
Posted: 27 Feb 2014 | Published: 27 Feb 2014
Get This Now


Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
sponsored by FireEye
WHITE PAPER:This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
Posted: 26 Feb 2014 | Published: 31 Dec 2013
Get This Now


Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
sponsored by FireEye
WHITE PAPER:With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
Posted: 26 Feb 2014 | Published: 31 Dec 2013
Get This Now


FireEye Advanced Threat Report - 2H 2011
sponsored by FireEye
WHITE PAPER:This FireEye Advanced Threat report provides key insight into the current threat landscape, the evolution of advanced persistent threat (APT) tactics and the level of infiltration seen in networks today. View now to gain an in-depth look into key findings to help you build and improve your security strategies to tackle today's security issues.
Posted: 01 May 2012 | Published: 01 May 2012
Get This Now


FireEye 1H 2011 Advanced Threat Report
sponsored by FireEye
ANALYST REPORT:This FireEye Advanced Threat report offers a global view into the cyber attacks that routinely bypass traditional defenses, using the threat data shared by thousands of FireEye Malware Protection Systems (MPS) deployments. View now to explore key findings in this analysis that uncover the real security issues enterprises face today.
Posted: 14 Nov 2011 | Published: 14 Nov 2011
Get This Now


The New Status Quo: Zero-Day and Targeted APT Attacks
sponsored by FireEye
VIDEO:During the webcast, Dr. Wang of Forrester Research and Ashar Aziz of FireEye will provide insight on data breach incidents and how to protect your company from cybercrime.
Posted: 11 Jul 2011 | Premiered: 08 Jul 2011
Get This Now


CISO Guide to Next Generation Threats
sponsored by FireEye
WHITE PAPER:The only way to protect yourself against next generation threats is to have next generation protection. Traditional firewalls, IPS, anitivirus, and signature based systems are still useful against known threats, but they don't stand a chance against new ones
Posted: 17 May 2011 | Published: 16 May 2011
Get This Now


Case Study: Providence College Captures Previously Undetected Attacks with FireEye Web Malware Protection System
sponsored by FireEye
CASE STUDY:This case study will show how Providence College was able to keep there network secure from advanced malware attacks, and how this security solution could do the same for you.
Posted: 10 May 2011 | Published: 10 May 2011
Get This Now


Case Study: A Large Multi–Program National Laboratory Stays Ahead of Next-Generation Malware By Deploying FireEye Web Malware Protection System
sponsored by FireEye
CASE STUDY:This case study will outline how one company trusted FireEye's Web Malware Protection System to guard their highly sensitive information and how well the system performed. You will also learn about the features the security solutions contains and how it could be perfect for your business.  
Posted: 10 May 2011 | Published: 10 May 2011
Get This Now


CISO Guide to Next Generation Threats
sponsored by FireEye
WHITE PAPER:This white paper will tell you about a new security solutions and the need to your business to update it's security solutions to a Next-Generation security system.
Posted: 09 May 2011 | Published: 09 May 2011
Get This Now


Protecting Data from the Cyber Theft Pandemic
sponsored by FireEye
WHITE PAPER:Malware-related data breaches have reached pandemic proportions as criminals discover Internet crime is easy to commit, highly lucrative, and largely under-policed. Learn about advances in security technologies that use multi-phase heuristic and virtual machine analysis to detect and mitigate damages that result from malware-related data thefts.
Posted: 01 Sep 2009 | Published: 20 Apr 2009
Get This Now


1 - 25 of 31 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement