Software  >   Malware  >  

IM Virus

RSS Feed    Add to Google    Add to My Yahoo!
IM Virus Multimedia (View All Report Types)
 
Webroot Enterprise Spy Audit
sponsored by Webroot
TRIAL SOFTWARE: Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.
Posted: 16 Oct 2006 | Premiered: 16 Oct 2006

Webroot

Kaspersky Internet Security 7.0
sponsored by Kaspersky Lab
TRIAL SOFTWARE: Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
Posted: 16 Nov 2007 | Premiered: 01 Nov 2007

Kaspersky Lab

Online Phishing
sponsored by Navex Global
WEBCAST: Through real world examples and quizzes throughout, learn how to spot phishing scams and enable your employees to do the same. Protect your organization from illegitimate emails with this short, interactive resource.
Posted: 20 Jul 2016 | Premiered: Jun 1, 2016

Navex Global

Detect Advanced Malware at the CPU-Level
sponsored by Check Point Software Technologies Ltd.
VIDEO: This brief video explores how you can detect advanced malware that hides in the CPU-level of an application. Read on to discover how you can stop even the most advanced and evasive threats.
Posted: 17 Nov 2015 | Premiered: 04 May 2015

Check Point Software Technologies Ltd.

Siemens Energy Management Takes an Agile, Integrated Approach to the App Lifecycle
sponsored by Hewlett Packard Enterprise
VIDEO: Watch this brief video to find out how Siemens switched to a smarter DevOps-centric methodology to become more agile and flexible. Discover how they accelerated software development by leveraging updated app lifecycle management for shortened requirements, engineering time and decreased risk.
Posted: 14 Sep 2016 | Premiered: 30 Nov 2015

Hewlett Packard Enterprise

Why mitigating risk remains difficult: Overview of GigaSECURE Security Delivery Platform
sponsored by Gigamon
VIDEO: Discover how to shift your security strategy from perimeter defenses towards a detect and protect framework gaining greater visibility in the process.
Posted: 23 Sep 2016 | Premiered: 04 Aug 2015

Gigamon

Specific Security Monitoring Lessons Learned from: Target, Nieman Marcus, Sony and Other Breaches
sponsored by LogRhythm, Inc.
WEBCAST: In this webcast, three cyber security veterans will discuss today's rapidly evolving cyber threat landscape and what new tools you need to survive. Learn how to address your current security intelligence maturity, and more.
Posted: 19 Aug 2016 | Premiered: Mar 19, 2015

LogRhythm, Inc.

Intelligent Endpoint Threat Defense
sponsored by Intel Security
PODCAST: Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.
Posted: 01 Jul 2016 | Premiered: Jun 1, 2016

Intel Security

Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
WEBCAST: Join Cisco's Cyber Security Specialist, Charles Herring, to learn how network behavioral anomaly detection (NBAD) and deep visibility through NetFlow can be used to quickly alert administrators to these violations.
Posted: 18 Feb 2016 | Premiered: Jan 27, 2016

Lancope

Up-to-the-Minute Global Threat Intelligence
sponsored by IBM
WEBCAST: In this webcast, you'll learn how stay informed with up to the minute cybercrime attack information.
Posted: 30 Jul 2015 | Premiered: Jul 17, 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement