Software  >   Malware  >  

Mass Mailing Worms

RSS Feed    Add to Google    Add to My Yahoo!
Mass Mailing Worms Multimedia (View All Report Types)
 
Microsoft Forefront Security for Exchange Server Beta
sponsored by Microsoft
TRIAL SOFTWARE: Forefront Security for Exchange helps protect your email infrastructure from infection and downtime through an approach that emphasizes layered defenses, optimization of Exchange Server performance and availability, and simplified management control.
Posted: 26 Sep 2006 | Premiered: 26 Sep 2006

Microsoft

Sophos Email Security Appliances
sponsored by Sophos, Inc.
PRODUCT DEMO: The Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.
Posted: 18 Apr 2006 | Premiered: 18 Apr 2006

Sophos, Inc.

Enhance Security with Intel® vPro™ Technology
sponsored by Intel Corporation
VIDEO: Security and compliance are strong values even in a down economy. Hear from a variety of clients that have used Intel® vPro™ Technology to identify problems, disable and enable the network, enhance patch management, and enabled them to isolate threats quickly and efficiently.
Posted: 08 Sep 2009 | Premiered: 08 Sep 2009

Intel Corporation

How to Protect Our Digital World from Cyber Attacks
sponsored by IBM
VIDEO: Our digital world is under attack. But you can fight back. Adaptive threat intelligence allows you to gather information from all your devices and develop countermeasures against malware for the future. It's not enough to be ready for yesterday's attacks; it's about staying one step ahead of the bad guys throughout the entire cybercrime arms race.
Posted: 13 Jun 2016 | Premiered: 14 May 2014

IBM

Technologies to Thwart Insider Threats
sponsored by Forcepoint
WEBCAST: Two factors drive the insider threat problem - user behavior and data movement. Technology that can monitor, record and replay unusual activity while defeating unsanctioned transfers of data best protect you from data loss. Learn how the right tools can keep your data and employees safe.
Posted: 01 Jul 2016 | Premiered: Jun 1, 2016

Forcepoint

Insider Threats: How to Spot Trouble Quickly with AlienVault USM
sponsored by AlienVault
WEBCAST: Join us for this technical demo showing how USM can help you detect malware infections on end-user machines, insiders misusing network resources, and users engaging in suspicious behaviors.
Posted: 25 Jul 2016 | Premiered: Jun 1, 2016

AlienVault

Take Control with Software Defined Networking
sponsored by Verizon
VIDEO: As technologies advance and become more heavily relied on, there is a need for increased bandwidth, performance and reliability. How do you keep up? Software-defined networking (SDN) is the answer to connection problems. Watch this video to learn about an SDN management solution that will grant you greater control over your network.
Posted: 06 May 2016 | Premiered: 07 Dec 2015

Verizon

Hidden Lynx – Professional Hackers for Hire
sponsored by Symantec Corporation
WEBCAST: This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Symantec Corporation

The Four Horsemen of Mobile Security
sponsored by Skycure
WEBCAST: In this webcast, hear from security professionals as they explore today's mobile threat landscape and describe alternative security strategies.
Posted: 03 Dec 2015 | Premiered: Jun 25, 2015

Skycure

Software Defined Infrastructure for HPC
sponsored by IBM
WEBCAST: Access this slidecast to hear Jay Muehoefer, Director of Software Defined Solutions at IBM, discuss the potential IT and business value of a software defined infrastructure.
Posted: 28 Apr 2015 | Premiered: Mar 9, 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement