Software  >  

Mobile Malware

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Malware Reports
 
Six Steps to a Better Security Strategy
sponsored by Armor
ANALYST REPORT: This Forrester report provides you six essential steps to create an effective security strategy linked with key business interests and success factors.
Posted: 12 Jul 2016 | Published: 01 Jun 2016

Armor

Understand the Hype around Mobile Data Security Threats
sponsored by Check Point Software Technologies Ltd.
EGUIDE: In this expert e-guide, we explore some of the most effective security practices for assessing and managing mobile data security threats. Learn about the root cause for many big data breaches and gain access to 6 tips for radically improving endpoint device security.
Posted: 12 Jul 2016 | Published: 29 Jun 2016

Check Point Software Technologies Ltd.

Uncovering the Risk of SAP Cyber Breaches
sponsored by Onapsis
WHITE PAPER: The purpose of this Ponemon Institue study is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

Onapsis

Technologies to Thwart Insider Threats
sponsored by Forcepoint
WEBCAST: Two factors drive the insider threat problem - user behavior and data movement. Technology that can monitor, record and replay unusual activity while defeating unsanctioned transfers of data best protect you from data loss. Learn how the right tools can keep your data and employees safe.
Posted: 01 Jul 2016 | Premiered: Jun 1, 2016

Forcepoint

Stop Future Threats though Careful Examination of the Malware Lifecycle
sponsored by Check Point Software Technologies Ltd.
EGUIDE: This e-guide takes a look at the malware lifecycle and explores how advanced attacks have evolved. Learn how specific advanced attacks work and how you can benefit from studying malware lifecycles to detect and defend against future attacks.
Posted: 11 Jul 2016 | Published: 08 Jul 2016

Check Point Software Technologies Ltd.

6 Easy Ways to Advance Your Cybersecurity Program When You Have a Small Team
sponsored by ThreatConnect
WHITE PAPER: This paper outlines 6 steps you can take to prioritize threat data, automate manual tasks, and streamline your workflow. With the right tools in place, you can turn your small band of brothers into an army suited to take down all of today's sophisticated threats.
Posted: 20 Jul 2016 | Published: 01 Jun 2016

ThreatConnect

7 Modern Encryption Problems
sponsored by Blue Coat Systems
RESOURCE: This resource highlights 7 modern security issues as the use of SSL/TLS encrypted communication grows. Discover how to boost the capabilities of your network security infrastructure while effectively managing your SSL/TLS traffic.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Blue Coat Systems

Day in the Life of a Security Admin
sponsored by RSA Softcat
WHITE PAPER: Luckily for your CISO, it's now easier than ever to allow users full access to all network tools and data with a single username and password combination. Learn how to set precise security requirements directed by the CISO for each application for any user, from anywhere, to anything.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

Looking for a partner to provide Multi-Factor Authentication?
sponsored by RSA Softcat
WHITE PAPER: This infographic shows you what you should expect from your multifactor authentication solution vendor. Discover the solution that integrates with the simplest IT environment to the most complex out there so you don't have to choose between security and convenience.
Posted: 23 Aug 2016 | Published: 01 Jul 2016

RSA Softcat

Intelligent Endpoint Threat Defense
sponsored by Intel Security
WEBCAST: Learn how to address threats that leverage endpoints as the entry point into an environment and how endpoint security needs to evolve to be able to be sustainable and relevant in the future. Ensure that the next time an attack comes into your environment or attempts to penetrate, you're blocking it right up front.
Posted: 01 Jul 2016 | Premiered: Jun 1, 2016

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement