IT Management  >   Systems Operations  >   Security  >  

e-Mail Virus Protection

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Virus Protection White Papers (View All Report Types)
 
Recognizing Five Sources of High-Profile Data Security Breaches
sponsored by Mimecast
WHITE PAPER: This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

Mimecast

ZeuS: A Persistent Criminal Enterprise
sponsored by Trend Micro
WHITE PAPER: This research paper, presented by Trend Micro, examines the ZeuS botnet; a cyber-criminal tool primarily used to steal money. Access this paper now to learn how ZeuS works, who is behind this crimeware, ZeuS variants now emerging and more.
Posted: 11 May 2010 | Published: 24 Mar 2010

Trend Micro

The True Cost of Protection: Five Ways Your Anti-Malware Solution is Draining your Budget
sponsored by Kaspersky Lab
WHITE PAPER: This paper uncovers five ways your current anti-malware is draining your budget and offers a new approach to take when evaluating new anti-malware solutions.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

Kaspersky Lab

2012 Bit9 Cyber Security Research Report
sponsored by Bit9, Inc.
WHITE PAPER: Bit9 conducted a survey on 1,861 IT and security professionals worldwide to examine their current views on today’s evolving threat landscape and their stance against them. View this report for a summary of the overall results as well as key findings, and find out how you compare to your peers.
Posted: 23 May 2012 | Published: 23 May 2012

Bit9, Inc.

A Buyer's Guide to Endpoint Protection Platforms
sponsored by Intel Security
WHITE PAPER: This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012

Intel Security

Managed Office Protection: Switching from AV to SaaS
sponsored by Panda Security
WHITE PAPER: Antivirus products require too much time and effort for small and mid-sized companies. Security as a Service (SaaS) means delivering traditional security applications as an Internet-based service to customers. Now you can focus on your core business, switch from Antivirus to Security as a Service and start enjoying the benefits of SaaS.
Posted: 24 Jun 2009 | Published: 01 Mar 2008

Panda Security

Guide: Patch Authority Ultimate
sponsored by ScriptLogic Corporation
WHITE PAPER: With exploits for known vulnerabilities unleashed on the Internet within as little as 5 days from the release of new patches from Microsoft, it is imperative your desktops and servers be regularly updated to keep them safe from attack.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies
sponsored by ArcSight, an HP Company
WHITE PAPER: The purpose of this benchmark study is twofold. First, we wanted to quantify the economic impact of a cyber attack. Second, we believed a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

ArcSight, an HP Company

Online Enemy #1: Blackhole Exploit Kit
sponsored by Threat Track Security
WHITE PAPER: This short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

Threat Track Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement