Software  >   Malware  >  

Rootkits

RSS Feed   
ALSO CALLED: Kernel Rootkits, Kernel Root Kits, Root Kits
DEFINITION: A collection of software tools that enable administrator-level access to a computer or computer network. Rootkits are installed on a computer after someone has obtained user-level access, either by exploiting a known vulnerability or cracking a password. Once installed, it allows the attacker to mask intrusion and gain root or privileged access to the computer and, possibly, other machines on the  … 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Rootkits White Papers (View All Report Types)
1 - 25 of 399 Matches Previous Page  |  Next Page
2017 Global EDR Research & Market Leadership Award
sponsored by Tanium
WHITE PAPER: The challenge for endpoint security professionals is to keep pace with the changing tactics of hackers. Ultimately, an endpoint security vendor needs to be adaptable. In this white paper, learn about how Tanium achieved a leadership position in the Endpoint Detect and Response Stand Alone market, according to Frost & Sullivan.
Posted: 04 Feb 2019 | Published: 31 Dec 2017

TOPICS: 
Tanium

2018 Cybersecurity Report Card: Organizations Rate their Security Posture and Share Best Practices
sponsored by DomainTools
WHITE PAPER: Responses from the 2018 Report Card survey shed light on how cybersecurity practices are evolving, and what the most successful organizations are doing to ensure they stay ahead of the ever-growing and changing threat landscape. This report outlines key findings from the survey and suggests how companies can improve their security efforts.
Posted: 10 Jan 2019 | Published: 31 Dec 2018

TOPICS: 
DomainTools

2018 State of Cybercrime
sponsored by Dell SecureWorks
WHITE PAPER: Find out the deep, dark truth behind the underground hacker economy in the 2018 State of Cybercrime report.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

TOPICS: 
Dell SecureWorks

2018 State of Cybercrime
sponsored by Dell SecureWorks
WHITE PAPER: Find out the deep, dark truth behind the underground hacker economy.
Posted: 28 Nov 2018 | Published: 28 Nov 2018

TOPICS: 
Dell SecureWorks

40 Questions You Should Have in Your Vendor Security Assessment
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn how to get started with your VRM security program and by accessing the most important questions to ask third-party businesses.
Posted: 02 Feb 2016 | Published: 30 Apr 2014

TOPICS: 
BitSight

Addressing the Threat Within: Rethinking Network Security Deployment
sponsored by Gigamon
WHITE PAPER: A structured and architectural approach to pervasive network visibility gives security solutions access while enabling them to scale cost effectively. Discover how the Security Delivery Platform is becoming a building block to deploying security solutions.
Posted: 27 May 2016 | Published: 01 Apr 2016

TOPICS: 
Gigamon

10 Ways You Can Improve Web App Performance
sponsored by SOASTA, Inc
WHITE PAPER: This resource counts down 10 issues that development and testing teams should consider in order to derive maximum performance from their Web applications.
Posted: 06 Jan 2014 | Published: 31 Dec 2013

TOPICS: 
SOASTA, Inc

2012 Endpoint Security Best Practices Survey Results
sponsored by Symantec Corporation
WHITE PAPER: This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.
Posted: 08 Apr 2013 | Published: 08 Apr 2013

TOPICS: 
Symantec Corporation

4 Questions to Ask When Evaluating Network Security Solutions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.
Posted: 21 Aug 2013 | Published: 21 Aug 2013

TOPICS: 
WatchGuard Technologies, Inc.

5 Ways IT Equipment Rentals Can Save Your Neck
sponsored by Canvas Systems
WHITE PAPER: Find out how renting pre-owned IT equipment can help your business succeed in completing projects.
Posted: 14 Dec 2007 | Published: 01 Dec 2007

TOPICS: 
Canvas Systems

9 Catastrophic Projects, And the Lessons They Teach
sponsored by AtTask
WHITE PAPER: This white paper considers 9 massive project failures, and analyzes where teams went wrong. Read on to see how mistakes, communication breakdowns, and destroyed budgets can obliterate your projects, and how you can avoid a similar fate.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

TOPICS: 
AtTask

A Closer Look at Windows Vista
sponsored by National Instruments
WHITE PAPER: One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative...
Posted: 19 Feb 2008 | Published: 19 Feb 2008

TOPICS: 
National Instruments

A Comprehensive Guide to the Latest Threat Detection Technologies
sponsored by SearchSecurity.com
WHITE PAPER: This TechGuide will provide analysis of APT and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

TOPICS: 
SearchSecurity.com

A Day in a Low Carbon Life: What Might It Be like to Lead a Business in 2012?
sponsored by IBM
WHITE PAPER: This entertaining paper describes a day in the life of a fictional Chief Executive Officer, preparing to face market analysts in 2012.
Posted: 14 May 2008 | Published: 01 May 2008

TOPICS: 
IBM

A Guide to Accelerating Business Value for Microsoft Environments
sponsored by EMC Corporation
WHITE PAPER: In this guide we'll learn how EMC can accelerate the business value of Microsoft environments of any size and scope.
Posted: 10 Mar 2008 | Published: 01 Oct 2007

TOPICS: 
EMC Corporation

A Guide to Evaluating Email Security Solutions
sponsored by SonicWALL
WHITE PAPER: E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.
Posted: 15 Nov 2007 | Published: 01 Jan 2005

TOPICS: 
SonicWALL

A Guide to Password Use in WebSphere Application Server
sponsored by Global Knowledge
WHITE PAPER: Learn about the different types of passwords used inside of the WebSphere Application Server and the recovery plans to help restore your server when passwords go awry.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

TOPICS: 
Global Knowledge

A Hack Attack: Six Steps to Recovery
sponsored by Cisco Systems, Inc.
WHITE PAPER: It’s startling when malware hits your network, or an intruder enters by password cracking. You’ve been hacked—now what? Don’t panic. Read about the six steps that your business can take to respond and protect itself.
Posted: 21 Jan 2011 | Published: 21 Jan 2011

TOPICS: 
Cisco Systems, Inc.

A Modern Approach To The Data Deluge
sponsored by Red Hat
WHITE PAPER: Find out how businesses are utilizing software-defined storage to manage the increasing levels of technology complexity.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

TOPICS: 
Red Hat

A Provocative Approach to Integrated Security Intelligence and Vulnerability Management
sponsored by IBM
WHITE PAPER: This informative guide explores an effective strategy and tool for vulnerability management and outlines the key benefits.
Posted: 01 May 2014 | Published: 31 Dec 2013

TOPICS: 
IBM

A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
sponsored by FireEye
WHITE PAPER: This informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

TOPICS: 
FireEye

A Tour of HP Sarbanes-Oxley IT Assessment
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper describes HP Sarbanes-Oxley IT Assessment Accelerator, a template of pre-defined information based on ITGI's COBIT, which is loaded into HP Quality Center to help your organization define and execute Sarbanes-Oxley testing, evaluate the results, and develop remediation plans.
Posted: 29 Apr 2009 | Published: 01 Apr 2009

TOPICS: 
Hewlett Packard Enterprise

A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a collaboration of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 30 Oct 2013 | Published: 30 Sep 2012

TOPICS: 
IBM

Achieving NAC Now and in the Future: The Role of SSL VPNs
sponsored by Aventail
WHITE PAPER: Network Access Control solutions are immature, with complex integration, inadequate inspection capabilities, and weak policy management. Read this white paper to learn how SSL VPNs allow for an effective dose of NAC with far fewer complicat...
Posted: 24 Oct 2006 | Published: 01 May 2006

TOPICS: 
Aventail

Acronis Backup & Recovery® 11.5 Virtual Edition for Hyper-V®
sponsored by Acronis
WHITE PAPER: Check out this exclusive white paper to find out the ins and outs of Acronis Backup and Recovery 11.5 Virtual Edition for Hyper-V, and how it will provide top-notch protection for your Hyper-V environment.
Posted: 24 Feb 2014 | Published: 31 Dec 2013

TOPICS: 
Acronis
1 - 25 of 399 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement