IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

UCE

RSS Feed   
UCE White Papers (View All Report Types)
 
Security Threat Report: July 2009 Update
sponsored by Sophos
WHITE PAPER: Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
Posted: 28 Jul 2009 | Published: 01 Jul 2009

Sophos

What is FakeAV?
sponsored by Sophos UK
WHITE PAPER: Fake AntiVirus, also known as Rogue AntiVirus, Rogues, or ScareWare, is a class of malware that displays false alert messages to the victim concerning threats that do not really exist. This paper provides insight into where FakeAV comes from, what happens when a system is infected with FakeAV, and how users can protect themselves from FakeAV.
Posted: 07 Jun 2010 | Published: 07 Jun 2010

Sophos UK

Network Testing Labs Review: Make Internet Risks and Perils Disappear
sponsored by Intel Security
WHITE PAPER: Read this paper to learn how your organization can install a filtering device that blocks malware from your network. McAfee's Email and Web Security appliance is recognized as an effective tool for identifying "bad" URLs.
Posted: 23 Nov 2009 | Published: 30 Jun 2009

Intel Security

Symantec Intelligence Report - August 2013
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, get the most recent analysis on cybersecurity threats and trends, and gain insight on what to expect in the future.
Posted: 21 Oct 2013 | Published: 31 Aug 2013

Symantec Corporation

10 Questions to Ask Before You Buy an Anti‐Spam Solution
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: With so many anti-spam products on the market, how can you be sure you're getting the best solution for your business network? With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision.
Posted: 20 Oct 2010 | Published: 20 Oct 2010

WatchGuard Technologies, Inc.

The Seven Deadly Traps of IPv6 Deployment - And How to Avoid Them
sponsored by Infoblox
WHITE PAPER: The transition to IPv6 is unavoidable. How it will happen and the effects of it are the questions to ask now.
Posted: 25 Jan 2012 | Published: 25 Jan 2012

Infoblox

GlobalSign Malware Monitoring: Protecting your website from distributing hidden malware
sponsored by GlobalSign
WHITE PAPER: This paper gives you a solution to keeping your websites safe, protecting your customers and securing the reputation of your company.
Posted: 17 May 2011 | Published: 17 May 2011

GlobalSign

Best Practices in Using Reputation-based Anti-Spam Services for Email Security
sponsored by IronPort Systems
WHITE PAPER: This white paper discusses the origins of IP reputation services; test results on Cisco IronPort's own reputation service, SenderBase; best practices in using reputation services; and the ROI of reputation services.
Posted: 17 Mar 2009 | Published: 09 Feb 2009

IronPort Systems

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation

McAfee Total Protection for Secure Business
sponsored by Insight
WHITE PAPER: Medium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business.
Posted: 31 Aug 2010 | Published: 31 Aug 2010

Insight
 
Browse by Report Type:
UCE White Papers | UCE Multimedia | UCE IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement