Software  >   Malware  >  

Computer Worms

RSS Feed    Add to Google    Add to My Yahoo!
Computer Worms Multimedia (View All Report Types)
 
Microsoft Forefront Security for Exchange Server Beta
sponsored by Microsoft
TRIAL SOFTWARE: Forefront Security for Exchange helps protect your email infrastructure from infection and downtime through an approach that emphasizes layered defenses, optimization of Exchange Server performance and availability, and simplified management control.
Posted: 26 Sep 2006 | Premiered: 26 Sep 2006

Microsoft

Sophos Email Security Appliances
sponsored by Sophos, Inc.
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos, Inc.

Enhance Security with Intel® vPro™ Technology
sponsored by Intel Corporation
VIDEO: Security and compliance are strong values even in a down economy. Hear from a variety of clients that have used Intel® vPro™ Technology to identify problems, disable and enable the network, enhance patch management, and enabled them to isolate threats quickly and efficiently.
Posted: 08 Sep 2009 | Premiered: 08 Sep 2009

Intel Corporation

Battling Advanced Persistent Threats
sponsored by Threat Track Security
WEBCAST: In this webcast, discover exactly what you can do to implement more proactive security suitable for fighting advanced persistent threats.
Posted: 04 Jun 2015 | Premiered: Jun 4, 2015

Threat Track Security

Product Review: Business Process Framework & Calculated Fields
sponsored by Workday
WEBCAST: This demo looks at two features of a human capital management and financial management software vendor. With Configurable Business Processes and Calculated fields, processes can be configured to ensure adherence to your company's policies and needs. Watch now to learn more.
Posted: 16 Mar 2015 | Premiered: Aug 13, 2013

Workday

The Mid-Market Security Challenge
sponsored by Threat Track Security
WEBCAST: Recorded at the 2015 RSA conference, this video features a security expert's analysis of the specialized security needs of SMBs.
Posted: 04 Jun 2015 | Premiered: Apr 22, 2015

Threat Track Security

4 Anti-Malware Platforms Put Through an Anti-Exploit Test
sponsored by Malwarebytes Corporation
VIDEO: In this video, a series of anti-malware platforms are tested with an exploit simulator test to determine which product has the early detection capabilities required for effective security.
Posted: 06 May 2015 | Premiered: 14 Oct 2013


Ransomware Security Threats: Defending Against CryptoLocker & CryptoWall
sponsored by Trend Micro
WEBCAST: This webcast can help you keep yourself safe from ransomware and mitigate it if you do come under attack.
Posted: 11 May 2015 | Premiered: Jan 21, 2015

Trend Micro

IBM Spectrum Scale for Big Data & Analytics
sponsored by IBM
WEBCAST: Access this demo to see how you can draw quick insights from social media data using software-defined storage. Learn to analyze this data in near-real time and dynamically manage the data to keep storage costs low.
Posted: 28 Apr 2015 | Premiered: Feb 18, 2015

IBM

Enterprise Mobility: Security Strategies and Challenges
sponsored by Absolute Software
WEBCAST: In this webcast, you will uncover the top enterpise mobility challenges today.  View now to learn the four phases of BYOD to strengthen your security strategy and discover tips and best practices to minimize data loss risk.
Posted: 01 May 2015 | Premiered: Jan 2, 2014

Absolute Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement