Software  >   Malware  >  

Tracking Software

RSS Feed    Add to Google    Add to My Yahoo!
Tracking Software Reports
 
Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risksĀ  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Blue Coat WebFilter
sponsored by BlueCoat
DATA SHEET: Review this brief data sheet to learn how WebFilter helps prevent Internet attacks from spyware, phishing, peer-to-peer (P2P) traffic, viral content and more. WebFilter also includes Dynamic Real-Time Rating (DRTR), a patented technology that can instantly categorize Web sites when a user attempts to access them.
Posted: 14 May 2009 | Published: 31 Dec 2008

BlueCoat

Magic Quadrant for Mobile Data Protection
sponsored by Sophos, Inc.
WHITE PAPER: This Magic Quadrant is a snapshot of the overall market that ranks vendors against each other, according to competitive criteria. Vendors in any quadrant, as well as those not ranked on the Magic Quadrant, may be appropriate for your enterprise's needs and budget.
Posted: 14 Apr 2011 | Published: 13 Apr 2011

Sophos, Inc.

McAfee Initiative to Fight Cybercrime
sponsored by McAfee, Inc.
WHITE PAPER: Fighting Cybercrime requires a three-pronged approach: technology & innovation, education, and legal frameworks.
Posted: 15 Dec 2008 | Published: 15 Dec 2008

McAfee, Inc.

Case Study: San Diego Gastroenterology Medical Associates
sponsored by ESET
CASE STUDY: Read this case to learn about one company's battle with virus protection and what they did to overcome it.
Posted: 06 Aug 2010 | Published: 06 Aug 2010

ESET

Putting Security in a Positive Light - A Guide to Proactively Managing Endpoint Risk
sponsored by Lumension
WHITE PAPER: This white paper outlines the importance of adopting a positive security model that combines the power of vulnerability management, automated remediation, whitelist application and device control to eliminate the risk of the unknown.
Posted: 29 Oct 2007 | Published: 10 Sep 2007

Lumension

Cyber Attacks on the Rise: IBM 2007 Report
sponsored by IBM
WHITE PAPER: This white paper shows how the IBM Internet Security Systems™ X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.
Posted: 19 Nov 2007 | Published: 01 Aug 2007

IBM

Protecting Organizations from Spyware
sponsored by Websense, Inc.
WHITE PAPER: The internet has become a critical resource employees rely on to get their jobs done. Employees use the web to perform research and gather information. Learn about the risks associated with these activities.
Posted: 04 Apr 2007 | Published: 29 Jan 2007

Websense, Inc.

Understanding and Detecting Malware Threats Based on File Size
sponsored by Fortinet, Inc.
WHITE PAPER: Malware is typically within files that are less than one megabyte(MB) in size. According to Fortine research, 97% of malware discovered since the beginning of 2006 is below one MB in size.
Posted: 18 Feb 2008 | Published: 01 Dec 2006

Fortinet, Inc.

Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett-Packard Company
WHITE PAPER: In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement