Software  >   Malware  >  

Internet Chain Letters

RSS Feed    Add to Google    Add to My Yahoo!
Internet Chain Letters Multimedia (View All Report Types)
Webroot Enterprise Spy Audit
sponsored by Webroot
TRIAL SOFTWARE: Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.
Posted: 16 Oct 2006 | Premiered: 16 Oct 2006


Kaspersky Internet Security 7.0
sponsored by Kaspersky Lab
TRIAL SOFTWARE: Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
Posted: 16 Nov 2007 | Premiered: 01 Nov 2007

Kaspersky Lab

Data Access Governance Solutions Demo
sponsored by STEALTHbits
PRODUCT DEMO: StealthAUDIT for DAG is an auditing, compliance, and governance framework for unstructured data and critical applications that provides comprehensive data collection, analysis, remediation workflows, and reporting. Click on the download now button to request a live demonstration of the Data Access Governance solutions.
Posted: 28 Sep 2016 | Premiered: 28 Sep 2016


SAN 2016 Incident Response Survey: The Current Threat Landscape and Survey Results
sponsored by Intel Security
WEBCAST: A SANS survey was conducted to assess the current state of incident response (IR), polling 591 respondents on metrics such as: dwell time, automation, and more. Explore the survey's results in this webcast to uncover critical findings about the current threat landscape, the rise of ransomware, and "smash and grab" attack vectors.
Posted: 26 Sep 2016 | Premiered: Jun 8, 2016

Intel Security

Assess Your Open File Shares to Combat Security, Compliance Risk
sponsored by STEALTHbits
SOFTWARE DEMO: Even the best security is powerless in the face of a file share that nearly everyone has access to, especially one that contains sensitive data you didn't even know was out there. Discover inappropriate access before it's too late. Get an open share assessment and make sure your data is safe.
Posted: 27 Sep 2016 | Premiered: 31 Aug 2016


Targeted Attack Detection and Remediation Security School
sponsored by
VIRTUAL ENVIRONMENT: In this Security School, you'll learn how the latest targeted attacks are developed, where your soft spots may be, how attackers are infiltrating data from your networks and what you can do to keep your critical data locked down.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

How Do You Select ERP for Defense Manufacturing? – Podcast
sponsored by IFS
PODCAST: Find out how the unique characteristics of defense manufacturing operations affect their needs in the area of enterprise resource planning (ERP).
Posted: 13 Aug 2014 | Premiered: Aug 13, 2014


How user experience is a business differentiator
sponsored by Hewlett-Packard Enterprise
WEBCAST: In this brief on-demand video, John McCarthy – Vice President and Principal Analyst at Forrester Research – explains how organizations can increase their value by delivering a great user experience.
Posted: 07 Mar 2014 | Premiered: Feb 21, 2013

Hewlett-Packard Enterprise

HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013


Maximum-Strength Threat Detection for Mid-Size Enterprises
sponsored by EMC Corporation
WEBCAST: This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.
Posted: 14 Apr 2014 | Premiered: Dec 31, 2012

EMC Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement