Endpoint Threat Management: The Benefits of Cloud-Based Security Services
sponsored by Trend Micro, Inc.
EZINE:
Read this short paper to learn how your organization can use a hybrid approach to acquire an endpoint security solution that consumes less CPU time, memory, disk, and network bandwidth.
Posted: 12 Jan 2009 | Published: 12 Jan 2009
|
|
|
Presentation Transcript: Phishing and the Underground Economy
sponsored by MarkMonitor
PRESENTATION TRANSCRIPT:
This document describes the risks of the new Underground Economy, phishing types, malware and how to combat phishing exploitation.
Posted: 06 Jan 2009 | Published: 06 Jan 2009
|
|
|
eBook: Priorities: Despite Economic Uncertainty, Spending on Information Security Remains Strong
sponsored by TechTarget ComputerWeekly.comĀ
EBOOK:
Check out this expert eBook and learn about the security issues that are receiving increased focus in the UK for 2009 and get tips for addressing these challenges.
Posted: 18 Dec 2008 | Published: 18 Dec 2008
|
|
|
eBook: Mobile Security: Protecting Mobile Devices, Data Integrity and Your Corporate Network
sponsored by TechTarget Mobile Computing
EBOOK:
Structured in four in-depth chapters, this E-Book will provide an objective perspective into the key defenses against device and data loss, network compromise and mobile malware.
Posted: 09 Dec 2008 | Published: 09 Dec 2008
|
|
|
eBook: Software as a Service: What You Should Consider When Moving to SaaS
sponsored by TechTarget Security
EBOOK:
Check out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.
Posted: 13 Nov 2008 | Published: 13 Nov 2008
|
|
|
Security Threat Report: July 2008
sponsored by Sophos
WHITE PAPER:
This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008
|
|
|
Total E-mail Security
sponsored by Sunbelt Software
WHITE PAPER:
Malware is becoming ever more sophisticated every day. Only through effective tools that incorporate fast responses against all categories of malware will organizations be able to maintain the health of their critical business systems.
Posted: 11 Nov 2008 | Published: 11 Nov 2008
|
|
|
IBM Internet Security Systems X-Force® 2008 Mid-Year Trend Statistics
sponsored by IBM
WHITE PAPER:
Read this white paper to discover the implications, so you can enhance information security for the rest of 2008 and beyond.
Posted: 27 Oct 2008 | Published: 27 Oct 2008
|
|
|
Endpoint Security and Control
sponsored by Sophos
TRIAL SOFTWARE:
Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
Posted: 03 Oct 2008 | Premiered: 02 Oct 2008
|
|
|
Stopping data leakage: Exploiting your existing security investment
sponsored by Sophos
WHITE PAPER:
This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.
Posted: 01 Oct 2008 | Published: 01 Jun 2008
|
|
|
Productivity, Internet Abuse, and How to Improve One by Eliminating the Other
sponsored by Bloxx, Inc.
WHITE PAPER:
This white paper explains the effect of Internet abuse on employee productivity, which is huge and not fully appreciated.
Posted: 05 Sep 2008 | Published: 05 Sep 2008
|
|
|
Why Your URL Filter, Firewall, and Desktop Antivirus are all Failing You
sponsored by Aladdin Knowledge Systems
WHITE PAPER:
This white paper will cover current and emerging Web-based malware exploits, their methodologies, and their vectors of infection.
Posted: 18 Mar 2008 | Published: 18 Mar 2008
|
|
|
A Closer Look at Windows Vista
sponsored by National Instruments
WHITE PAPER:
One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative...
Posted: 19 Feb 2008 | Published: 19 Feb 2008
|
|
|
Increase Productivity and Reduce Security Risks for Teleworkers
sponsored by SonicWALL
WHITE PAPER:
This paper provides an overview of how teleworking helps meet today's productivity demands. It discusses additional network security risks that anywhere access can create, and how SonicWALL addresses these concerns while offering additional benefits.
Posted: 23 Jan 2008 | Published: 22 Jan 2008
|
|
|
A Guide to Evaluating Email Security Solutions
sponsored by SonicWALL
WHITE PAPER:
E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.
Posted: 15 Nov 2007 | Published: 01 Jan 2005
|
|
|
Stratecast: An SSL VPN Selection Framework: One Size Does Not Fit All
sponsored by SonicWALL
WHITE PAPER:
SSL VPN is an important layer of protection for your company. This paper details an SSL VPN selection framework to help you evaluate the best option for your organization and how to save time and money when selecting your next SSL VPN.
Posted: 14 Nov 2007 | Published: 01 Nov 2007
|
|
|
Symantec Mail Security for SMTP
sponsored by Symantec Corporation
TRIAL SOFTWARE:
Try this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway.
Posted: 14 May 2007 | Premiered: 14 May 2007
|
|
|
Darik's Boot and Nuke (DBAN)
sponsored by Sourceforge.net
TRIAL SOFTWARE:
Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007
|
All resources sponsored by Sourceforge.net
|
|
Achieving NAC Now and in the Future: The Role of SSL VPNs
sponsored by Aventail
WHITE PAPER:
Network Access Control solutions are immature, with complex integration, inadequate inspection capabilities, and weak policy management. Read this white paper to learn how SSL VPNs allow for an effective dose of NAC with far fewer complicat...
Posted: 24 Oct 2006 | Published: 01 May 2006
|
|
|
Protecting Web Applications from Attack and Misuse
sponsored by Citrix
WHITE PAPER:
Application-layer attacks against business-critical web applications are the most serious IT security threat facing enterprises today. Read this white paper to learn how to improve web application security for your enterprise.
Posted: 27 Jul 2006 | Published: 01 Jul 2006
|
|
|
Why You Need an Email Exploit Detection Engine
sponsored by GFI Software
PRODUCT LITERATURE:
This white paper explains what email exploits are, provides examples of common email exploits, and discusses why a non signature-based approach (i.e., not a virus engine) is needed to protect against email exploits.
Posted: 02 May 2006 | Published: 01 May 2006
|
|