Plan for the worst: Creating an effective cyber security incident response plan
sponsored by Verizon
RESOURCE:
Cyberattacks are now a matter of “when,” not “if” so as attacks become more sophisticated, it’s critical to have an incident response plan in place to deal with them. Access this resource to learn the 6 steps to include in your cyber security incident response plan to ensure your network is prepared for an attack.
Posted: 22 Jun 2020 | Published: 07 Jan 2020
|
|
|
A Computer Weekly buyer's guide to Threat Management
sponsored by ComputerWeekly.com
EGUIDE:
Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
Posted: 05 Apr 2019 | Published: 05 Apr 2019
|
|
|
Why Bayesian Filtering Is the Most Effective Anti-spam Technology
sponsored by GFI Software
PRODUCT LITERATURE:
This white paper describes how Bayesian filtering works and explains why it is the best way to combat spam.
Posted: 02 May 2006 | Published: 01 May 2006
|
|
|
Messaging and Collaboration Security: Microsoft's Multi-layer Approach
sponsored by Microsoft
WEBCAST:
Attend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
Posted: 05 Oct 2006 | Premiered: Oct 17, 2006, 14:00 EDT (18:00 GMT)
|
|
|
Buyer’s Guide to Antimalware
sponsored by Panda Security
EGUIDE:
Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products.
Posted: 30 Oct 2009 | Published: 27 Oct 2009
|
|
|
Putting Anti-spam Solutions to the Test . . . Before You Buy
sponsored by MailFrontier
WHITE PAPER:
This whitepaper will help you take the anxiety out of testing anti-spam solutions. By following our five-step plan, you can test anti-spam solutions quickly and easily. Most important, you will get results you can trust.
Posted: 10 Aug 2004 | Published: 01 Aug 2004
|
|
|
Threatsaurus: The A-Z of Computer and Data Security Threats
sponsored by Sophos UK
BOOK:
Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
Posted: 25 May 2010 | Published: 01 Dec 2009
|
|
|
Case Study: ORDISMATIC Uses Panda Cloud Email Protection to Protect Its Clients from Spam
sponsored by Panda Security
CASE STUDY:
Read this brief case study to learn how Panda Cloud Email Protection helped ORDISMATIC, an IT vendor, to simplify risk management, reduce operating costs, increase productivity, and achieve significant decreases in spam.
Posted: 02 Dec 2009 | Published: 20 Nov 2009
|
|
|
Trend Micro Hosted Email Security
sponsored by Trend Micro
PRODUCT DEMO:
Trend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version.
Posted: 14 Apr 2010 | Premiered: 14 Apr 2010
|
|
|
Shore Up Your Office 365 Attack Surface
sponsored by Proofpoint
EBOOK:
This exclusive e-guide reviews the Office 365 suite's security features, including how to take advantage of its benefits and what challenges you may encounter.
Posted: 18 Jun 2015 | Published: 15 Jun 2015
|
|
|
|
|