IT Management  >   Systems Operations  >   Security  >  

e-Mail Virus Detection

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Virus Detection White Papers (View All Report Types)
 
VARs: Gain More Reliable Revenue from Endpoint Security
sponsored by Webroot
WHITE PAPER: This white paper discusses the challenges VARs face when providing endpoint security and suggests offering cloud-based options as an alternative.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

Webroot

Ten Ways to Dodge CyberBullets: Reloaded
sponsored by ESET
WHITE PAPER: In this paper, ESET research teams revisit their top ten list on what people can do to protect themselves against malicious activity, and offers key advice based on today’s changing environments, while still applying the basic principles.
Posted: 26 Jan 2012 | Published: 26 Jan 2012

ESET

A Hack Attack: Six Steps to Recovery
sponsored by Cisco Systems, Inc.
WHITE PAPER: It’s startling when malware hits your network, or an intruder enters by password cracking. You’ve been hacked—now what? Don’t panic. Read about the six steps that your business can take to respond and protect itself.
Posted: 21 Jan 2011 | Published: 21 Jan 2011

Cisco Systems, Inc.

Remote Vendor Access: Not All Access Should Be Treated Equally
sponsored by Dell Software
WHITE PAPER: This white paper explains why Remote Vendor Access (RVA) should not be treated the same as traditional remote access for employees. Explore how a new set of remote access requirements can ensure that your enterprise remains in step with both compliance regulations and security expectations.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

Dell Software

What is FakeAV?
sponsored by Sophos, Inc.
WHITE PAPER: FakeAV, or Fake AntiVirus, is a class of malware that display false alert messages concerning threats that do not really exist. The alerts prompt users to visit a website where they will be asked to pay for these non-existent threats to be cleaned up. Read on to learn where FakeAV comes from, how they act, and how to protect yourself.
Posted: 25 Jun 2010 | Published: 24 May 2010

Sophos, Inc.

Maintaining Trust: Protecting Your Web Site Users from Malware
sponsored by IBM
WHITE PAPER: This paper explores the problem of malware and how it is increasingly being delivered through legitimate Web sites. It also introduces new techniques from IBM that are designed to go beyond standard security measures to help organizations proactively defend against threats.
Posted: 31 Dec 2009 | Published: 02 Nov 2009

IBM

Global Threat Trends - March 2010
sponsored by ESET
WHITE PAPER: Read this analysis of ESET’s ThreatSense.Net®, a sophisticated malware reporting and tracking system, which shows that the highest number of detections this month, with almost 10.32% of the total, was scored by the Win32/Conficker class of threat.
Posted: 16 Apr 2010 | Published: 16 Apr 2010

ESET

Androids in the Enterprise
sponsored by McAfee, Inc.
WHITE PAPER: McAfee is expanding its support for Android use, and keeping pace with the maturation of enterprise features in the underlying platform, such as remote management, encryption, and other crucial minimum requirements.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

McAfee, Inc.

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM

Running A Fully Controlled Windows Desktop Environment with Application Whitelisting
sponsored by Bit9, Inc.
WHITE PAPER: Getting control over desktop PCs is fast becoming a major strategic objective of CIOs and IT departments. This whitepaper will discuss “The Five Elements of Desktop Control” and how each are required in order to fully realize the benefits of a controlled environment.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement