All resources sponsored by:

Sophos UK

10 Matches
Ponemon Institute - Seven Tips for Securing Mobile Workers
sponsored by Sophos UK
WHITE PAPER:This paper offers practical guidance on dealing with one of the fastest growing threats to the security of sensitive and confidential information. It is the increasing sophistication and convenience of mobile devices that contribute to both their popularity in the workplace and their risk to an organisation's networks, data and reputation.
Posted: 07 Jun 2011 | Published: 02 May 2011
Get This Now


What is FakeAV?
sponsored by Sophos UK
WHITE PAPER:Fake AntiVirus, also known as Rogue AntiVirus, Rogues, or ScareWare, is a class of malware that displays false alert messages to the victim concerning threats that do not really exist. This paper provides insight into where FakeAV comes from, what happens when a system is infected with FakeAV, and how users can protect themselves from FakeAV.
Posted: 07 Jun 2010 | Published: 07 Jun 2010
Get This Now


A practical guide to keeping your virtual data centre safe
sponsored by Sophos UK
WHITE PAPER:This whitepaper will focus on the best practices for the protection of virtual servers running in the data centre.
Posted: 07 Jun 2010 | Published: 07 Jun 2010
Get This Now


Security Threat Report: 2010
sponsored by Sophos UK
ANALYST REPORT:The first decade of the 21st century saw a dramatic change in the nature of cybercrime. Hackers have evolved from teenage boys spreading graffiti for kicks and notoriety to organised, financially motivated gangs. Read this white paper for a better understanding of the history of malware and learn to craft a better, safer future for internet users.
Posted: 25 May 2010 | Published: 25 May 2010
Get This Now


Solving Four Primary Security Challenges of Microsoft SharePoint
sponsored by Sophos UK
WHITE PAPER:This white paper examines SharePoint's benefits and risks and recommends best practices for protecting an organisation's digital assets.
Posted: 25 May 2010 | Published: 01 Nov 2009
Get This Now


Threatsaurus: The A-Z of Computer and Data Security Threats
sponsored by Sophos UK
BOOK:Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
Posted: 25 May 2010 | Published: 01 Dec 2009
Get This Now


Presentation Transcript: The Economics of Endpoint Security
sponsored by Sophos UK
PRESENTATION TRANSCRIPT:Check out this presentation transcript to learn about a great endpoint security solution while balancing budgetary requirements.
Posted: 25 Jun 2009 | Published: 24 Jun 2009
Get This Now


Laws, regulations and compliance: Top tips for keeping your data under your Control
sponsored by Sophos UK
WHITE PAPER:The challenges of complying with government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology can provide the solution.
Posted: 20 Mar 2009 | Published: 01 Dec 2008
Get This Now


Is virtualization a black hole in your security? 5 ways to ensure it isn't
sponsored by Sophos UK
WHITE PAPER:The ease with which virtual computer image files can now be downloaded means there is a much higher risk of end users running unauthorized applications in a virtual environment. This paper describes the hidden threats raised by unauthorized, unsecured desktop virtualization and gives five effective ways to secure yourself against them.
Posted: 16 Mar 2009 | Published: 16 Mar 2009
Get This Now


Stopping data leakage: Making the most of your security budget
sponsored by Sophos UK
WHITE PAPER:This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefits of encryption in securing data in the event that it does get stolen or lost.
Posted: 16 Mar 2009 | Published: 16 Mar 2009
Get This Now


10 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement