Software  >  

Mobile Malware

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Malware Reports
 
Symantec Data Loss Prevention for Cloud
sponsored by Symantec Corporation
DATA SHEET: Not only can you keep total visibility of your enterprise data, but also gain new capabilities to increase workflow. Access now to discover how data loss prevention can secure your cloud data and automate incident response processes and remediation.
Posted: 13 May 2016 | Published: 31 Dec 2015

Symantec Corporation

Stop Data Exfiltration
sponsored by Intel Security
RESOURCE: Gain insight into hackers' motivations and understand which pieces of information are most valuable for them to steal (chances are they're the same ones most valuable to you). Go in depth into data exfiltration secrets to better understand the complexities of how a network is breached and robbed of personal, corporate, and customer information.
Posted: 13 May 2016 | Published: 01 Apr 2016

Intel Security

The Impacts of Organizations Not Keeping Up with Cybercriminals
sponsored by Proofpoint, Inc.
EGUIDE: Organizations are struggling to keep up with rapid changes in security techniques by cybercriminals. In this expert guide, explore the 4 main threats that occurred in 2015, how social media is increasing as a source of brand and compliance risk, and receive a product overview of Proofpoint Enterprise Protection.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Proofpoint, Inc.

An Operational Model for Breach Analytics and Intelligence
sponsored by Anomali
WHITE PAPER: In the face of this situation, a new approach to security strategy and operations must be adopted. Discover an approach that focuses on operational relevance, reducing adversary dwell time and speeding incident response activities.
Posted: 06 Jun 2016 | Published: 01 May 2016

Anomali

Fortinet Secure Access Solutions for Flawless Wireless Performance
sponsored by Fortinet, Inc.
WHITE PAPER: Wireless healthcare operations means greater vulnerabilities to healthcare networks. With patient records such a hot commodity for cybercriminals, healthcare organizations must be airtight with their remote management. Learn how to deploy end-to-end cybersecurity to ensure uninterrupted care at any sized healthcare facility.
Posted: 25 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

Future Risks Be Prepared
sponsored by Kaspersky Lab
EBOOK: An increasingly sophisticated threat landscape calls for a multi-layered security approach, in which a combination of integrated technologies provides comprehensive detection and protection against known, unknown and advanced malware and other threats. This report is designed to help you to be better prepared to fight APTs.
Posted: 25 May 2016 | Published: 31 Dec 2015

Kaspersky Lab

The Breach Detection Gap and Strategies to Close It
sponsored by Infocyte
WHITE PAPER: What's needed is a layered approach to breach discovery that includes looking for threats which have slipped past the perimeter. Discover how to catch what prevention technologies miss. Reduce the breach detection gap and learn now to mitigate the possible damage caused by prolonged unauthorized access.
Posted: 15 Jun 2016 | Published: 01 May 2016

Infocyte

Practical Guide to IT Security Breach Prevention Part II
sponsored by Kaspersky Lab
EBOOK: With users connecting to unsecured public networks and social media platforms on both company-owned and personal devices, sensitive data can now be accessed--and lost--from more endpoints than ever before. Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task.
Posted: 16 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

There Will Be Attacks: Prepare Your Email Defenses
sponsored by Mimecast
WEBCAST: Your organization can't tolerate any email downtime. Learn how to prevent damages to money, your reputation, and business operations with the right arsenal of email security tools.
Posted: 02 Jun 2016 | Premiered: Jun 2, 2016

Mimecast

Gartner Magic Quadrant for Mobile Data Protection Solutions
sponsored by Intel Security
ANALYST REPORT: Access now to learn the pros and cons of mobile security vendors as Gartner's Magic Quadrant for Mobile Data Protection Solutions dissects the current MDP vendor landscape so you can best understand which company can most effectively help you out if you're looking to bolster your mobile data protection initiatives.
Posted: 12 May 2016 | Published: 01 Oct 2015

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement