Software  >   Malware  >  

Kernel Root Kits

RSS Feed    Add to Google    Add to My Yahoo!
Kernel Root Kits White Papers (View All Report Types)
 
The New Reality of Stealth Crimeware
sponsored by Intel Security
WHITE PAPER: This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.
Posted: 31 May 2013 | Published: 31 May 2013

Intel Security

McAfee Initiative to Fight Cybercrime
sponsored by Intel Security
WHITE PAPER: Fighting Cybercrime requires a three-pronged approach: technology & innovation, education, and legal frameworks.
Posted: 15 Dec 2008 | Published: 15 Dec 2008

Intel Security

Putting Security in a Positive Light - A Guide to Proactively Managing Endpoint Risk
sponsored by Lumension
WHITE PAPER: This white paper outlines the importance of adopting a positive security model that combines the power of vulnerability management, automated remediation, whitelist application and device control to eliminate the risk of the unknown.
Posted: 29 Oct 2007 | Published: 10 Sep 2007

Lumension

Fighting Rootkits: Protecting against stealthy malware by flying under the operating system
sponsored by Intel
WHITE PAPER: Discover why rootkits are so harmful to your organization and uncover the innovative and dramatically different approach you should take to protect your organization from these harmful intruders.
Posted: 27 Dec 2012 | Published: 31 Jan 2012

Intel

Heuristic Analysis- Detecting Unknown Viruses
sponsored by ESET
WHITE PAPER: The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

ESET

Unified Threat Management (UTM) Solutions
sponsored by SonicWALL
WHITE PAPER: This series of technical briefs examines the key factors you need to consider regarding unified threat management (UTM) solutions as they impact security, performance, management, and consolidation.
Posted: 05 Dec 2007 | Published: 01 Dec 2007

SonicWALL

The New Reality of Stealth Crimeware
sponsored by Intel Security
WHITE PAPER: The new reality of crimeware consists of the stealth, creativity and patience of stuxnet, and the commercialism, wide distribution and easy-to-use toolkits of Zeus, making it even more challenging to detect and protect against. Organisations must go beyond the traditional security to ensure their intellectual property is safe.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

Intel Security

Value Chain Disruption In Insurance: The Road To Insurance As A Platform
sponsored by MuleSoft
WHITE PAPER: This white paper explores how to keep up with the need for speed in today's insurance market. Discover how API-led connectivity enables Insurance-as-a-Service and helps deliver on the accelerated promise of multichannel strategies and partnerships.
Posted: 29 Mar 2017 | Published: 29 Mar 2017

MuleSoft

6 Tips to Increase DevOps Collaboration and Improve Performance
sponsored by dynaTrace software, Inc.
WHITE PAPER: This white paper explores what it takes to create good DevOps teams and prevent communication breakdowns. Uncover 6 tips for building your DevOps performance pipeline and delivering heightened value to you end users.
Posted: 30 Mar 2017 | Published: 25 Oct 2016

dynaTrace software, Inc.

Mobile-Enabling Field Service Teams for Immediate Financial Impact
sponsored by Capriza
WHITE PAPER: This white paper explores how to mobile-enable key workflows and business apps for smartphones and other devices field services personnel use on site. Discover real world examples of how to extend apps out to mobile in a cost-effective, expedient, and secure way.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

Capriza
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement