Infographic: 4 types of ransomware
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC:
Ransomware is one of the most effective strategies for attacking critical infrastructures. This type of malware infects computers and prohibits or severely restricts users from accessing entire systems until ransom demands have been met. In this infographic, we take a look at the four types of ransomware and their effect on the security landscape.
Posted: 16 Nov 2021 | Published: 16 Nov 2021
|
|
|
Cisco ASA 5500 Series Adaptive Security Appliances
sponsored by Cisco Systems, Inc.
DATA SHEET:
Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.
Posted: 28 Aug 2017 | Published: 09 Jun 2009
|
|
|
The SonicWALL Approach to Consolidating Network Security Infrastructure and Cutting Costs
sponsored by SonicWALL
BROCHURE:
This brochure identifies the substantial benefits available to organizations that elect to replace their network security point products with UTM devices. It explains the combination of innovative features/functions and robust, platform-level capabilities that enable customers of SonicWALL UTM products to maximize their gains due to consolidation.
Posted: 24 Jul 2009 | Published: 24 Jul 2009
|
|
|
Presentation Transcript: Endpoint security fundamentals
sponsored by Sophos
PRESENTATION TRANSCRIPT:
This presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight.
Posted: 25 Jun 2009 | Published: 25 Jun 2009
|
|
|
Information Security Magazine, May 2009: Automating Compliance
sponsored by Information Security Magazine
EZINE:
This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.
Posted: 11 May 2009 | Published: 01 May 2009
|
|
|
Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER:
The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
Posted: 26 Mar 2009 | Published: 01 Apr 2008
|
|
|
Data Breach Case Study: Heartland Payment Systems
sponsored by Sourcefire
CASE STUDY:
Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
Posted: 18 Mar 2009 | Published: 01 Jan 2009
|
|
|
Demo: Tivoli Identity Manager Express - Highlighting Security and Identity Management
sponsored by IBM
SOFTWARE DEMO:
This multi-part demonstration highlights the security and identity management functions, features, and value of IBM Tivoli Identity Manager Express, including how it can benefit your organization's endpoint security.
Posted: 13 Mar 2009 | Premiered: 13 Mar 2009
|
|
|
Symantec Endpoint Protection 11.0.3
sponsored by Symantec Corporation
WHITE PAPER:
In this Tolly Group competitive performance evaluation, learn how Symantec Endpoint Protection 11.0.3 consistently delivered faster response time than competing products tested.
Posted: 10 Mar 2009 | Published: 10 Mar 2009
|
|
|
Security Appliances: New Strides in Preventing Intrusions
sponsored by IBM
WHITE PAPER:
According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.
Posted: 18 Feb 2009 | Published: 18 Feb 2009
|
|
|
IBM Security Event and Log Management Service
sponsored by IBM
SERVICE LISTING:
With Security Event and Log Management Service, you can assemble the collective mindshare of your organization's network applications and operating systems along with disparate security technologies into one platform. You can archive, analyze, correlate and trend security and network events, while managing response and remediation workflow.
Posted: 18 Feb 2009 | Published: 18 Feb 2009
|
|
|
Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER:
This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008
|
|
|
Nationwide Foils Phishers with Markmonitor: Financial Services Giant Achieves ROI with Antiphishing Solutions in Three Months
sponsored by MarkMonitor
CASE STUDY:
Nationwide Building Society, a leading financial institution, has seen a dramatic increase in phishing attacks. By using MarkMonito's AntiPhishing solutions they've been able to quickly shut down phishing sites, saving thousands of pounds per month.
Posted: 10 Oct 2008 | Published: 09 Oct 2008
|
|
|
Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST:
Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008
|
|
|
Cisco ASA 5500 Series Adaptive Security Appliance
sponsored by Cisco Systems, Inc.
WEBCAST:
In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.
Posted: 07 Aug 2008 | Premiered: Aug 1, 2008
|
|
|
Managed SSL VPN Remote Access
sponsored by Virtela Communications, Inc.
DATA SHEET:
Virtela's SSL VPN Remote Access Services provide end-users the security of a completely encrypted network with the flexibility to access resources from any SSL enabled browser.
Posted: 03 Mar 2008 | Published: 01 Feb 2008
|
|
|
Cisco PIX 501 Security Appliance
sponsored by Cisco Systems, Inc.
SOFTWARE LISTING:
The Cisco® PIX® 501 Security Appliance delivers enterprise-class security for small office and teleworker environments, in a reliable, easy-to-deploy purpose-built appliance.
Posted: 28 Feb 2008 | Published: 01 Jan 2007
|
|
|
The Cybercrime Arms Race
sponsored by Kaspersky
WHITE PAPER:
Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008
|
|
|
Drive business value with innovation for security defense
sponsored by IBM
WHITE PAPER:
This white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.
Posted: 06 Dec 2007 | Published: 01 Apr 2007
|
|
|
7 Key Factors to Software Protection
sponsored by Arxan
WHITE PAPER:
This white paper explores the magnitude and types of software piracy threats and details the seven key application security factors that must be considered during the development process.
Posted: 08 Jun 2007 | Published: 01 Jun 2007
|
|
|
GFI LANguard Security Event Log Monitor - Downloads
sponsored by GFI Software
TRIAL SOFTWARE:
GFI LANguard S.E.L.M. ships with a security event analysis engine which takes into account the type of security event, security level of each computer, when event occurred, role of computer and its operation system.
Posted: 02 May 2006 | Premiered: 01 May 2006
|
|
|
Deploying GFI LANguard S.E.L.M.
sponsored by GFI Software
PRODUCT LITERATURE:
This white paper gives an overview of how GFI LANguard S.E.L.M. works and discusses installation and deployment issues, enabling you to choose the best way to deploy the product on your network.
Posted: 02 May 2006 | Published: 01 May 2006
|
|