All resources sponsored by:

M86 Security

13 Matches
Android security settings and controls for Android enterprise security
sponsored by M86 Security
EGUIDE:With all the security gaps in the Android platform, is it possible to achieve enterprise-level security? In this resource, gain expert insight into enabling effective Android enterprise security. View now to explore Android security settings and control, battling Android malware, and much more.
Posted: 01 Feb 2012 | Published: 01 Feb 2012
Get This Now


Modern Cyber Threats and Government Agencies
sponsored by M86 Security
WHITE PAPER:View this paper to explore how and why targeted attacks work, modern cyber attacks in the real world, the rise in public sector attacks, Web and email security solutions and more.
Posted: 18 Nov 2011 | Published: 18 Nov 2011
Get This Now


Lowering IT Costs: How to Reduce the Need for Desktop Remediation and Shave Millions off IT Expenses
sponsored by M86 Security
WHITE PAPER:The average malware attack can cause significant damage, forcing organizations to exceed their budgets. In this paper, gain a better understanding of how much the next-generation threats impact remediation costs and discover a solution to minimize those cost, while maximizing efficiency.
Posted: 18 Nov 2011 | Published: 18 Nov 2011
Get This Now


How to prevent phishing attacks: User awareness and training
sponsored by M86 Security
EGUIDE:This expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing.
Posted: 26 Oct 2011 | Published: 26 Oct 2011
Get This Now


E-Guide: How antivirus software works: Virus detection techniques
sponsored by M86 Security
EGUIDE:Antivirus software uses several different virus detection techniques, as described in this tip by expert Lenny Zeltser.
Posted: 05 Oct 2011 | Published: 05 Oct 2011
Get This Now


How to Avoid Targeted Web and Email Attacks
sponsored by M86 Security
WHITE PAPER:This white paper uncovers the dangers of targeted attacks, how and why cybercriminals have been so successful at exploiting traditional security technologies, and what your company can do to avoid becoming the next victim of a targeted attack.
Posted: 19 Jul 2011 | Published: 19 Jul 2011
Get This Now


How to collect Windows Event logs to detect a targeted attack
sponsored by M86 Security
EGUIDE:Targeted attacks are growing, and eventually your enterprise will be a target. In this e-guide, expert Richard Bejtlich covers how to collect Windows Event logs to detect an intrusion.
Posted: 13 Jul 2011 | Published: 13 Jul 2011
Get This Now


Technical guide on Web Security Gateways
sponsored by M86 Security
EBOOK:Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.
Posted: 28 Apr 2011 | Published: 28 Apr 2011
Get This Now


Is Your Acceptable Use Policy Social Media-proof?
sponsored by M86 Security
WHITE PAPER:This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization. It provides guidance on how to update an AUP to accommodate the increasing popularity and use of social media in the business environment.
Posted: 11 Feb 2011 | Published: 11 Feb 2011
Get This Now


Data Loss Prevention: Email and Web Gateway Best Practices
sponsored by M86 Security
WHITE PAPER:This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them. Read this paper to learn more about single-channel DLP at the email and Web gateways.
Posted: 08 Oct 2010 | Published: 07 Oct 2010
Get This Now


E-Guide: How to build a toolset to avoid Web 2.0 security issues
sponsored by M86 Security
EGUIDE:Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network.
Posted: 17 Sep 2010 | Published: 17 Sep 2010
Get This Now


Web Exploits: There’s an App for That
sponsored by M86 Security
WHITE PAPER:The main motivation driving the cybercrime industry is the possibility of monetary gain. Savvy, knowledgeable individuals with skills in developing Web applications and basic knowledge in hacking have filled a niche by creating exploit kits. Read this white paper to learn the basics about exploit kits, what they do, and why the bad guys use them.
Posted: 27 May 2010 | Published: 27 May 2010
Get This Now


Today’s Blended Threats: Identifying and Stopping Web-based Email Attacks
sponsored by M86 Security
WHITE PAPER:Organizations of all sizes continue to be challenged by increasingly sophisticated security threats. Attackers are constantly finding new ways to access valuable data. They use various tools and methods to evade traditional security products. This brief white paper presents a new security solution that can stop new threats quickly and effectively.
Posted: 27 May 2010 | Published: 30 Oct 2009
Get This Now


13 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement