Software  >   Malware  >  

Kernel Rootkits

RSS Feed    Add to Google    Add to My Yahoo!
Kernel Rootkits White Papers (View All Report Types)
 
The New Reality of Stealth Crimeware
sponsored by Intel Security
WHITE PAPER: This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.
Posted: 31 May 2013 | Published: 31 May 2013

Intel Security

Unified Threat Management (UTM) Solutions
sponsored by SonicWALL
WHITE PAPER: This series of technical briefs examines the key factors you need to consider regarding unified threat management (UTM) solutions as they impact security, performance, management, and consolidation.
Posted: 05 Dec 2007 | Published: 01 Dec 2007

SonicWALL

The New Reality of Stealth Crimeware
sponsored by Intel Security
WHITE PAPER: The new reality of crimeware consists of the stealth, creativity and patience of stuxnet, and the commercialism, wide distribution and easy-to-use toolkits of Zeus, making it even more challenging to detect and protect against. Organisations must go beyond the traditional security to ensure their intellectual property is safe.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

Intel Security

Putting Security in a Positive Light - A Guide to Proactively Managing Endpoint Risk
sponsored by Lumension
WHITE PAPER: This white paper outlines the importance of adopting a positive security model that combines the power of vulnerability management, automated remediation, whitelist application and device control to eliminate the risk of the unknown.
Posted: 29 Oct 2007 | Published: 10 Sep 2007

Lumension

Heuristic Analysis- Detecting Unknown Viruses
sponsored by ESET
WHITE PAPER: The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

ESET

Fighting Rootkits: Protecting against stealthy malware by flying under the operating system
sponsored by Intel
WHITE PAPER: Discover why rootkits are so harmful to your organization and uncover the innovative and dramatically different approach you should take to protect your organization from these harmful intruders.
Posted: 27 Dec 2012 | Published: 31 Jan 2012

Intel

McAfee Initiative to Fight Cybercrime
sponsored by Intel Security
WHITE PAPER: Fighting Cybercrime requires a three-pronged approach: technology & innovation, education, and legal frameworks.
Posted: 15 Dec 2008 | Published: 15 Dec 2008

Intel Security

From Legacy to Agility: Leveraging Data Ontologies, Data-as-a-Service, and Microservices
sponsored by Metavine
WHITE PAPER: This white paper explores how establishing a data ontology, cultivating an internal data-as-a-service (DaaS) strategy, and implementing microservices can help create a more agile business. Discover how to enable a true zero-code development environment by bringing these elements together to unlock your company's ability to drive agility.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

Metavine

How to Choose the Right ERP Solution
sponsored by Sage (UK) Limited
WHITE PAPER: Picking the right ERP tool to manage your resources isn't easy. It's imperative that you research and find one that will meet your business needs. This guide takes you through a 6-step decision-making process to get the best ERP tool for your business.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

Sage (UK) Limited

Creating a Robust Data Ontology
sponsored by Metavine
WHITE PAPER: This paper explores how to regain control over your data in SaaS environments without compromising your hybrid or cloud app strategies. Learn how you can create an enterprise-level data ontology, leverage data-as-a-service (DaaS), build microservices, and achieve a true zero-code development environment to unlock greater levels of agility.
Posted: 28 Nov 2016 | Published: 23 Nov 2016

Metavine
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement