Software  >   Malware  >  

Hoaxes

RSS Feed    Add to Google    Add to My Yahoo!
HoaxesMultimedia (View All Report Types)
 
Webroot Enterprise Spy Audit
sponsored by Webroot
TRIAL SOFTWARE: Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.
Posted: 16 Oct 2006 | Premiered: 16 Oct 2006

Webroot

Kaspersky Internet Security 7.0
sponsored by Kaspersky Lab
TRIAL SOFTWARE: Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
Posted: 16 Nov 2007 | Premiered: 01 Nov 2007

Kaspersky Lab

Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn more about how targeted attacks are developed, where your soft spots may be, how attackers are moving data off your networks and what you can do about it.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

CDW Software Solutions Solve Problems
sponsored by CDW Corporation
VIDEO: Access this video to learn how you can build a solid strategy for software purchases now and into the future by partnering with CDW. You'll get insight into how you validate your software selections and ensure that your current and future investments deliver optimal benefits.
Posted: 22 Oct 2014 | Premiered: 20 Oct 2014

CDW Corporation

Acronis Backup & Recovery® 11.5 for Workstation
sponsored by Acronis
TRIAL SOFTWARE: This is a free trial download for a software backup solution from Acronis that offers an array of unique features
Posted: 25 Feb 2014 | Premiered: 25 Feb 2014

Acronis

Monitor and Protect Critical Web Applications with a Web Application Firewall
sponsored by Imperva
VIDEO: While the growth of business applications has grown, corporate resources have become more exposed to security threats. This resource takes a look at the growing risk of application attacks via SQL injection.
Posted: 19 Feb 2014 | Premiered: 19 Feb 2014

Imperva

SearchSecurity.com University
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: With the Web the top threat vector, organizations need to ramp up their gateway protection. However, it seems as though the number of antimalware solutions is getting out of hand. In this university, you'll learn about the different features available in Web security gateways and the evolution of antimalware to meet the changing threat landscape.
Posted: 22 Jan 2013 | Premiered: 23 Jan 2013

SearchSecurity.com

Introducing Red Hat CloudForms 3.0
sponsored by Red Hat
WEBCAST: Did you know that the number one challenge people face when making the shift to cloud is management? Take a look at this brief webcast to learn about the software that will help you organization management.
Posted: 05 Dec 2013 | Premiered: Nov 5, 2013

Red Hat

Why DevOps should be your new best practice
sponsored by CA Technologies.
VIDEO: Tune into this brief video to learn about the future potential of DevOps and how by utilizing the right technology in conjunction with a DevOps strategy, you can make your business more software-enabled, deliver faster higher-quality software, and facilitate a stronger enterprise overall.
Posted: 11 Nov 2014 | Premiered: 11 Nov 2014

CA Technologies.

Tips for Expediting Incident Response
sponsored by Threat Track Security
WEBCAST: This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.
Posted: 02 Jun 2014 | Premiered: Jun 2, 2014

Threat Track Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement