Unsolicited Commercial e-Mail Reports

Symantec Intelligence Report - August 2013
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, get the most recent analysis on cybersecurity threats and trends, and gain insight on what to expect in the future.
Posted: 21 Oct 2013 | Published: 31 Aug 2013

Symantec Corporation

Symantec Mail Security for SMTP 5.0
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the filtering capabilities, threat protection, and message management capabilities available in Symantec Mail Security for SMTP 5.0. Learn how to prevent rapid email virus outbreaks and respond to evolving email securi...
Posted: 15 May 2007 | Published: 01 Jan 2006

Symantec Corporation

Why Bayesian Filtering Is the Most Effective Anti-spam Technology
sponsored by GFI Software
PRODUCT LITERATURE: This white paper describes how Bayesian filtering works and explains why it is the best way to combat spam.
Posted: 02 May 2006 | Published: 01 May 2006

GFI Software

Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER: Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013

Symantec Corporation

Death and Taxes...and Hackers
sponsored by Imperva
VIDEO: View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.
Posted: 01 Apr 2011 | Premiered: 01 Apr 2011

Imperva

McAfee Total Protection for Secure Business
sponsored by Insight
WHITE PAPER: Medium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business.
Posted: 31 Aug 2010 | Published: 31 Aug 2010

Insight

A Guide to Evaluating Email Security Solutions
sponsored by SonicWALL
WHITE PAPER: E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.
Posted: 15 Nov 2007 | Published: 01 Jan 2005

SonicWALL

Presentation Transcript: Rogue Security Software - An In-Depth Look And The Challenges For Business
sponsored by Sunbelt Software
PRESENTATION TRANSCRIPT: In this presentation transcript, Chris Boyd, GFI Software’s Senior Threat Researcher, provides an in-depth look into Rogue antivirus. He details the damage it can cause and how they have been tailored to look like legitimate products. You will also learn what businesses can do to better protect their network and end users from these threats.
Posted: 03 Dec 2010 | Published: 03 Dec 2010

Sunbelt Software

Information Security Magazine November 2009: Stay in Control
sponsored by Information Security Magazine
EZINE: Unmanaged changes to IT systems and networks can recklessly increase risk to enterprises. The key is rolling out an accepted change management process, and sticking to it. Read this magazine and find out how a consistent change management process puts you in charge.
Posted: 16 Nov 2009 | Published: 16 Nov 2009

Information Security Magazine

Presentation Transcript: Is SaaS the Future of Enterprise Security?
sponsored by Webroot
PRESENTATION TRANSCRIPT: This presentation transcript discusses how The Web has become a primary attack vector most businesses are not yet prepared for. Compliance and data leakage are a growing concern, and the economic downturn is causing every organization to re-evaluate its spending on personnel and IT resources and how SaaS may just be the answer to these
Posted: 04 Jun 2009 | Published: 04 Jun 2009

Webroot