Software  >   Malware  >  

Kernel Rootkits

RSS Feed   
Kernel Rootkits Reports
 
Sophos Computer Security Scan
sponsored by Sophos
TRIAL SOFTWARE: Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.
Posted: 07 Apr 2010 | Premiered: 07 Apr 2010

Sophos

Sophos Virus Removal Tool: Free virus detection and removal
sponsored by Sophos
TRIAL SOFTWARE: Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.
Posted: 09 May 2013 | Premiered: 09 May 2013

Sophos

Kaspersky Internet Security 7.0
sponsored by Kaspersky Lab
TRIAL SOFTWARE: Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
Posted: 16 Nov 2007 | Premiered: 01 Nov 2007

Kaspersky Lab

Worry-Free Business Security Standard
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.
Posted: 26 Oct 2010 | Premiered: 26 Oct 2010

Trend Micro, Inc.

Securing Office 365 Email with Isolation
sponsored by Menlo Security
EBOOK: An isolation platform can address many of the gaps in email and web security, that are currently left unaddressed by attackers in Office 365. Read on to learn about the benefits of an isolation platform and how it can help protect users from web-borne malware attacks via drive-by downloads, watering-hole attacks, malvertising, and much more.
Posted: 05 Jun 2019 | Published: 05 Jun 2019

Menlo Security

How Spear Phishing Targets the C-Suite
sponsored by Inky Technology
RESOURCE: In this resource, learn more about the costs of spear phishing as well as anti-phishing solutions to help protect you from email phishing and malware concerns.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Inky Technology

5 Ways Ransomware Attacks Backup Software
sponsored by Cohesity
RESOURCE: It's important to keep five critical considerations in mind when you're strategizing how best to prevent, detect, and rapidly respond to a ransomware attack on your backups. View them in this resource.
Posted: 18 Apr 2019 | Published: 18 Apr 2019

Cohesity

Cybersecurity Benchmarking & Security Performance Management
sponsored by BitSight
WHITE PAPER: A new, data-driven security performance management approach is required to maintain security, minimize risk, and reduce costs. The key component of this new data-driven approach is the security rating. In this white paper, explore how the approach can be applied to security performance management, benchmarking and reporting.
Posted: 22 May 2019 | Published: 22 May 2019

BitSight

What Is Phishing and What Are Top CISOs Doing About It?
sponsored by Inky Technology
RESOURCE: In the last year, different types of phishing attacks have begun to emerge. One example is a wire transfer scam in which attackers steal money from companies after suggesting an overdue bill or unpaid invoice. Download this blog to explore different types of phishing attacks and see what businesses can do to prevent them.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Inky Technology

Lincoln Memorial University Case Study
sponsored by Proofpoint
CASE STUDY: There was an increasing amount of students and faculty members at Lincoln Memorial University targeted by phishing attacks. After realizing the problem, the IT team began looking for a spam filter replacement to deliver better email protection. In this case study, learn about why Lincoln Memorial University decided to implement Proofpoint.
Posted: 06 Jun 2019 | Published: 06 Jun 2019

Proofpoint
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement