Symantec Mail Security for SMTP 5.0
sponsored by Symantec Corporation
WHITE PAPER:
This white paper examines the filtering capabilities, threat protection, and message management capabilities available in Symantec Mail Security for SMTP 5.0. Learn how to prevent rapid email virus outbreaks and respond to evolving email securi...
Posted: 15 May 2007 | Published: 01 Jan 2006
|
|
|
Cyber Attacks on the Rise: IBM 2007 Report
sponsored by IBM
WHITE PAPER:
This white paper shows how the IBM Internet Security Systems™ X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.
Posted: 19 Nov 2007 | Published: 01 Aug 2007
|
|
|
Symantec Internet Security Threat Report: Trends for July-December 07
sponsored by Symantec Corporation
WHITE PAPER:
This summary of the Internet Security Threat Report will alert readers to current trends and impending threats that Symantec has observed for the six-month period from July 1 to December 31, 2007.
Posted: 18 Jun 2008 | Published: 01 Apr 2008
|
|
|
Top Benefits of Symantec Protection Suite
sponsored by Symantec Corporation
WHITE PAPER:
Anti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.
Posted: 09 Jun 2009 | Published: 09 Jun 2009
|
|
|
Symantec Endpoint Protection 11.0.3
sponsored by Symantec Corporation
WHITE PAPER:
In this Tolly Group competitive performance evaluation, learn how Symantec Endpoint Protection 11.0.3 consistently delivered faster response time than competing products tested.
Posted: 10 Mar 2009 | Published: 10 Mar 2009
|
|
|
The Impact of Messaging and Web Threats
sponsored by Trend Micro, Inc.
WHITE PAPER:
This Osterman Research white paper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks.
Posted: 09 May 2008 | Published: 01 Apr 2008
|
|
|
Symantec Internet Security Threat Report: Trends for 2008
sponsored by Symantec Corporation
WHITE PAPER:
This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.
Posted: 09 Jun 2009 | Published: 01 Apr 2009
|
|
|
A Guide to Evaluating Email Security Solutions
sponsored by SonicWALL
WHITE PAPER:
E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.
Posted: 15 Nov 2007 | Published: 01 Jan 2005
|
|
|
Ten Steps to Better Requirements Management
sponsored by IBM
WHITE PAPER:
Requirements definition and management is an activity that has the potential to deliver a high, fast ROI. This white paper explains the characteristics of a good requirement and presents ten steps to better requirements management. Read on to learn how better requirements translate into easier, higher quality projects.
Posted: 02 Apr 2009 | Published: 01 Oct 2008
|
|
|
Royal Holloway: Testing antivirus efficacy in Linux
sponsored by TechTarget ComputerWeekly.com
EZINE:
Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
Posted: 25 Mar 2021 | Published: 25 Mar 2021
|
|
|
Understanding behavioural detection of antivirus
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.
Posted: 08 Feb 2021 | Published: 12 Aug 2016
|
|
|
Buyer's guide to backup and recovery software
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.
Posted: 14 Jul 2022 | Published: 14 Jul 2022
|
|
|
The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 08 Feb 2021 | Published: 29 Jul 2016
|
|
|
Unified Communications: the key to prospering in the new working reality of Covid-19
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
The coronavirus is changing everything about how people work, and will do so permanently. It added that even though the working world was experiencing unprecedented uncertainty, there were two things that should be borne in mind: the virus will pass, and at the other side of the pandemic, the world of work will look very different.
Posted: 08 Feb 2021 | Published: 04 May 2020
|
|
|
Proactive Security: Software vulnerability management and beyond
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
Posted: 08 Feb 2021 | Published: 17 May 2019
|
|
|
Endpoint Protection Isn’t Enough: Defend Your Software Development Lifecycle from Open Source Malware
sponsored by Sonatype
EBOOK:
Open source malware infiltrates software development lifecycles, exploiting trusted components and bypassing protection. This e-book explores the dangers of open source malware, recent attacks, and strategies to protect your software supply chain. Learn why traditional security falls short and how to safeguard your development process.
Posted: 15 Mar 2025 | Published: 15 Mar 2025
|
|
|
Veeam Software Video
sponsored by Veeam Software
WEBCAST:
Watch this webinar which unveils Veeam Data Cloud for Microsoft 365 with Microsoft 365 Backup Storage, a cutting-edge solution designed to protect your critical Microsoft 365 data against any cyberattack or data loss scenario.
Posted: 13 Nov 2024 | Premiered: Nov 13, 2024
|
|
|
Escode Special Edition Software Escrow
sponsored by NCC Group
EBOOK:
Software escrow is a critical tool to mitigate risks from vendor failure or disruption. This e-book explains how escrow works, the benefits, and how to choose the right escrow agreement and verification level for your needs. Read the full e-book to learn how to protect your software investments.
Posted: 12 Dec 2024 | Published: 12 Dec 2024
|
|
|
Securing your software supply chain
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Organisations need to have a thorough understanding of software components and build security controls into development lifecycles to shore up the security of their software supply chains. Learn how software supply chain security can combine risk management and cybersecurity to help protect your organisation from potential vulnerabilities.
Posted: 15 May 2023 | Published: 15 May 2023
|
|
|
Software-defined Architecture Can Aid Your Business and The Big Value in Software-defined Storage
sponsored by IBM
EGUIDE:
A software-defined architecture can provide your enterprise with an empowered storage environment, protection against data loss, simple system management and low up-front cost. Access this expert Eguide that gives an in-depth look at software-defined architecture. And read on to discover the big value in software-defined storage.
Posted: 08 Feb 2021 | Published: 21 Jul 2016
|
|
|
Understanding Software Supply Chain Risks and How to Mitigate Them with Software Escrow
sponsored by NCC Group
WHITE PAPER:
Discover how to mitigate software supply chain risks with Software Escrow. Learn to identify critical dependencies, assess vendor reliability, and establish escrow agreements to ensure business continuity. Download this white paper to safeguard your digital assets and maintain operational resilience.
Posted: 12 Dec 2024 | Published: 12 Dec 2024
|
|
|
Software Supply Chain Security
sponsored by Reversinglabs
EBOOK:
Understand the why, the how — and what actions your organization should take — in the new era of security. Get this guide to learn about the landscape of supply chain risks & threats, 10 tips for a successful SSCS program and how to hunt for threats in your supply chain.
Posted: 24 Jan 2025 | Published: 24 Jan 2025
|
|
|
Security Products for Protection: Endpoint and Anti-Malware
sponsored by Carbon Black
EGUIDE:
Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.
Posted: 08 Feb 2021 | Published: 21 Aug 2017
|
|
|
IBM Software Defined Storage Services
sponsored by Covenco
PRODUCT OVERVIEW:
Discover how Covenco provides IBM Software-Defined Storage solutions for new and refurbished equipment. Modernize your storage and data protection with flexible, cost-effective options. Learn more about IBM SDS offerings.
Posted: 07 Feb 2025 | Published: 07 Feb 2025
|
|
|
6 Ways to Keep Your Endpoint Devices Secure
sponsored by Sentinel Labs, Inc.
EGUIDE:
Endpoint devices are often the root cause of data breaches but finding the best endpoint security for your enterprise is a complex, ever-changing task. In this e-guide, experts Kevin Tolly and Eric Cole uncover 6 ways to improve endpoint device security and what features to focus on in your search for an endpoint security tool.
Posted: 08 Feb 2021 | Published: 26 Jul 2017
|
|
|
7 Critical Reasons for Microsoft 365 Backup
sponsored by Veeam Software
WHITE PAPER:
You have 7 critical reasons to protect your Microsoft 365 data. This 5-minute easy-to-read document helps explain to your managers and peers why your organization should consider Microsoft 365 data protection.
Posted: 07 Jan 2025 | Published: 06 Sep 2024
|
|
|
Software Firewalls
sponsored by Palo Alto Networks
EBOOK:
In this free Software Firewalls for dummies e-book, discover everything you need to know about today’s demands for software firewalls and zero trust, and find out the 10 essential questions you need to ask your software firewall vendor.
Posted: 08 Apr 2024 | Published: 09 Apr 2024
|
|
|
Going Beyond the SBOM
sponsored by ReversingLabs
WHITE PAPER:
SBOMs alone are insufficient to protect against the evolving threat landscape. “Going Beyond the SBOM” highlights the limitations of traditional SBOMs and vendor risk assessments in identifying and mitigating software supply chain risks. Read on to manage third-party software security risk on your own terms.
Posted: 23 Jan 2025 | Published: 24 Jan 2025
|
|
|
Assess & Manage Commercial Software Risk
sponsored by Reversinglabs
WHITE PAPER:
How do you know the commercial software you bring into your organization is safe? Download this paper to understand new regulations targeting software supply chain security, learn why classic approaches won’t solve this issue, and discover how to identify malware and tampering in software before you deploy it.
Posted: 24 Jan 2025 | Published: 24 Jan 2025
|
|
|
Protecting Capital in Tech: Why Venture Capitalists and Private Equity Firms Must Prioritise Software Escrow
sponsored by NCC Group
BLOG:
In this blog post, you'll discover how software escrow enhances investment protection for venture capitalists and private equity firms by securing source code and mitigating risks in tech investments. Read on now to learn how you can preserve value and ensure resilience against disruptions.
Posted: 03 Jan 2025 | Published: 03 Jan 2025
|
|
|
How Do Vulnerabilities Get Into Software?
sponsored by Veracode, Inc.
WHITE PAPER:
Despite the best efforts of IT security teams, vulnerabilities in applications are bound to happen. In fact, research shows that 3 out of 4 apps produced by software vendors fail to meet security standards. Download this white paper to discover the 4 most common causes that lead to software vulnerabilities and ensure your readiness.
Posted: 08 Feb 2021 | Published: 01 Apr 2020
|
|
|
Going Beyond the SBOM Bring Control to Third-Party Software Security Risk with Spectra Assure SAFE
sponsored by Reversinglabs
WHITE PAPER:
Going Beyond the SBOM highlights the limitations of traditional SBOMs and vendor risk assessments in identifying and mitigating software supply chain risks. Further outlining how security and risk professionals can manage third-party software security risk on their own terms.
Posted: 23 Jan 2025 | Published: 23 Jan 2025
|
|
|
Computer Weekly – 19 May 2020: Ocado makes the friendly workplace robot a reality
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how Ocado is making robot-human collaboration a reality. Unified com-munications has become a must-have lockdown capability – we assess the key technologies. And as contact-tracing apps emerge to help deal with the Covid-19 pandemic, we exam-ine the data privacy challenges. Read the issue now.
Posted: 08 Feb 2021 | Published: 19 May 2020
|
|
|
Computer Weekly – 23 May 2023: How to secure your software supply chain
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, our latest buyer's guide looks at secure coding and examines the challenges of securing your software supply chain. Cyber law enforcement leaders are calling on firms to end the secrecy around ransomware attacks. And we find out how facial recognition technology is being adopted by retailers. Read the issue now.
Posted: 19 May 2023 | Published: 23 May 2023
|
|