Software  >   Malware  >  

Kernel Root Kits

RSS Feed   
Kernel Root Kits Reports
 
Sophos Computer Security Scan
sponsored by Sophos
TRIAL SOFTWARE: Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.
Posted: 07 Apr 2010 | Premiered: 07 Apr 2010

Sophos

Kaspersky Internet Security 7.0
sponsored by Kaspersky Lab
TRIAL SOFTWARE: Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
Posted: 16 Nov 2007 | Premiered: 01 Nov 2007

Kaspersky Lab

Sophos Virus Removal Tool: Free virus detection and removal
sponsored by Sophos
TRIAL SOFTWARE: Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.
Posted: 09 May 2013 | Premiered: 09 May 2013

Sophos

Worry-Free Business Security Standard
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.
Posted: 26 Oct 2010 | Premiered: 26 Oct 2010

Trend Micro, Inc.

Who needs malware? How Adversaries use Fireless Attacks to Evade your Security
sponsored by CrowdStrike
WHITE PAPER: According to CrowdStrike, 8 out of 10 attack vectors that resulted in a successful breach used fileless attack techniques. Access this white paper to learn how fileless attacks work and why traditional techniques fail to protect your organization.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

Why Your Company Needs Third-Party Security for Office 365
sponsored by Symantec
RESEARCH CONTENT: Office 365 is a robust platform; however it has some significant security limitations. This Osterman Research Report indicates that many third-party security technologies often present a better alternative to some of the native security capabilities. In this report, learn how third-party vendors can help to bridge Office 365's security gaps.
Posted: 24 Apr 2019 | Published: 28 Feb 2019

Symantec

Verizon Risk Report
sponsored by Verizon
RESOURCE: Find out how you can measure your risk and security posture with comprehensive visibility and daily updates that address gaps and maximize ROI through actionable data.
Posted: 18 Apr 2019 | Published: 18 Apr 2019

Verizon

Secure DevOps Brings Better, Faster, Safer Software
sponsored by SearchSecurity.com
EBOOK: In the rush to implement DevOps, security is too often overlooked. But DevSecOps is essential in these hack-filled days. Learn how you can add security to software development today.
Posted: 03 May 2019 | Published: 03 May 2019

SearchSecurity.com

Exploring the Past, Present, And Future of Blockchain Technology
sponsored by Armor
WHITE PAPER: Since its early applications in cryptocurrency, blockchain implementations have focused on keeping data secure. But the journey of blockchain technology now stretches beyond Bitcoin. For businesses, blockchain implementations can provide a secure way to store and track transactions. In this white paper, learn more about blockchain technology.
Posted: 07 May 2019 | Published: 07 May 2019

Armor

Proper Backup: The Last Line of Defense Against Ransomware and Cybercrime
sponsored by Unitrends
WHITE PAPER: This paper examines how different backup approaches cope, or fail to cope, with recovering from ransomware. Download it now to examine them for yourself and to ensure your customers' data is fully protected.
Posted: 01 May 2019 | Published: 01 May 2019

Unitrends
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement