Software  >  

Malicious Computer Code

RSS Feed    Add to Google    Add to My Yahoo!
Malicious Computer CodeReports
 
Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication
sponsored by HID
WHITE PAPER: In this white paper, explore how one authentication solution allows organizations to establish trust in their user identities when utilizing mobile device access.
Posted: 11 Jul 2014 | Published: 28 Mar 2014

HID

Technical Considerations for Selecting the Best Antimalware Technology
sponsored by Hexis Cyber Solutions Inc
EGUIDE: This informative e-guide discusses the evolution of malware and how today's antimalware products should handle detection and remediation.
Posted: 02 Jun 2014 | Published: 02 Jun 2014

Hexis Cyber Solutions Inc

Not Living Up to Expectations? Use Cases and Solutions for Common SCCM Issues
sponsored by Promisec
WHITE PAPER: This informative guide outlines 5 use cases and solutions for common SCCM issues.
Posted: 23 May 2014 | Published: 23 May 2014

Promisec

Enterprise Executives and Consumers Lack Confidence About Cybersecurity
sponsored by Threat Track Security
WHITE PAPER: This informative guide outlines the lack of confidence many executives and consumers have about their cybersecurity.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

Threat Track Security

NSS Labs Breach Detection System Product Analysis – FortiSandbox
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive white paper takes an in-depth look at a breach detection solution that identifies and mitigates any potential network threat or intrusion, allowing you to continue to provide the services your users need.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Fortinet, Inc.

HP TippingPoint Intrusion Prevention System halts threats at the door - Solution increases visibility to potential threats, attacks and policy violations against HP systems
sponsored by Hewlett-Packard Limited
WHITE PAPER: Prevent future cyber attacks from occurring by modifying your company's security infrastructure.
Posted: 11 Jun 2014 | Published: 01 Nov 2013

Hewlett-Packard Limited

Protecting Your Data and Network from Advanced Security Threats
sponsored by CDW Corporation
WHITE PAPER: This white paper discusses one company's approaches to mobile security, cloud security, and malware protection and detection, and also provides a number of recommendations for improving your business's productivity, security, and peace of mind.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

CDW Corporation

Easy-to-Manage Security Solutions for Today's Threats and Technologies
sponsored by CDW Corporation
WHITE PAPER: This informative white paper describes one company's easy-to-manage security solutions, which are prepared to confront today's evolving threats and emerging technologies.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

CDW Corporation

U.S. Defense Contractors Say They Remain Vulnerable to Cyber-Attacks
sponsored by Threat Track Security
WHITE PAPER: This informative whitepaper outlines the vulnerability of U.S. defense contractors and explores what that means for your business.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

Threat Track Security

Beyond the Breach
sponsored by FireEye
WHITE PAPER: This informative whitepaper takes a look at today's threat landscape and outlines the unfortunate news – security breaches are inevitable.
Posted: 04 Jun 2014 | Published: 04 Jun 2014

FireEye
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement