malware

Results 1 - 25 of 625Sort Results By: Published Date | Title | Company Name
Published By: Lookout     Published Date: Dec 09, 2016
Learn what security threats matter to iOS and Android devices in the workplace. This report covers malware on Android, sideloaded applications on iOS, rooting on Android, jailbreaking on iOS, and OS vulnerabilities on both iOS and Android.
Tags : 
    
Lookout
Published By: Cyren     Published Date: Jan 03, 2017
By definition, a botnet is a series of Internet-connected computers, or bots, each infected with the same or different types of malware specific to the botnet’s operations. Download now to learn more about botnets and how to protect yourself from them.
Tags : 
botnet, malware, ddos attacks, internet threats, security
    
Cyren
Published By: Carbonite     Published Date: Feb 22, 2017
Refuse to surrender to cybercriminals—learn the best ways to prevent a ransomware infection, and what you can do in the event of an attack.
Tags : 
backup and recovery, business backup, cloud backup, computer backup, hybrid backup, data backup, data protection, data recovery
    
Carbonite
Published By: Carbonite     Published Date: Feb 22, 2017
Find out how a lack of preparation puts businesses at risk from ransomware—and get expert advice on how to protect your data.
Tags : 
backup and recovery, business backup, cloud backup, computer backup, hybrid backup, data backup, data protection, data recovery
    
Carbonite
Published By: IBM     Published Date: Jan 09, 2017
Download this interactive white paper describing the global threat intelligence provided by the IBM X-Force research team, including a look at its reputation scoring, vulnerability tracking and malware research - as well as details on its collaborative threat-intelligence site, IBM X-Force Exchange.
Tags : 
ibm, security, ibm x-force, threat intelligence, enterprise applications, business technology
    
IBM
Published By: Veeam Software     Published Date: Mar 09, 2017
This data availability solution is a best-practice for Health Care developed by HPE, Veeam®, and Comport Healthcare Solutions in response to increasing threats of Ransomware and other malware attacks.
Tags : 
    
Veeam Software
Published By: VMware AirWatch®     Published Date: Feb 24, 2017
Cloud datacenter security is becoming imperative in the new age of malware attacks. To stay competitive and secure, organizations are turning to smart networking in an effort to close the datacenter security gap. The combination of VMware NSX, AirWatch Tunnel and Horizon View helps close this gap and simplifies security management for IT professionals. With the upcoming prevalence of authentication and identity management in an organization’s infrastructure, the need to delegate and define network access continues to highlight the important role of hybrid cloud security that addresses all end-user devices.
Tags : 
    
VMware AirWatch®
Published By: Cisco     Published Date: Jul 08, 2016
This white paper can help you confirm that your small business or distributed enterprise needs to invest in an effective next-generation firewalls (NGFW) solution. For small businesses, the NGFW should provide an affordable and manageable entrée to advanced threat protection. In branch offices and the distributed enterprise, NGFWs should provide a detection and enforcement point, analyzing real-time threats and network traffic at scale and benefiting from an integrated and holistic view of the network of which it is a part. In both use scenarios, the NGFW should help your organization defend against targeted and persistent malware attacks, including emerging threats.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
When evaluating a next-generation firewall (NGFW) to determine whether the solution can give you comprehensive protection for your entire enterprise, you need to look for seven must-have capabilities. The NGFW should: 1. Integrate security functions tightly to provide effective threat and advanced malware protection 2. Provide complete and unified management 3. Provide actionable indications of compromise to identify malicious activity across networks and endpoints 4. Offer comprehensive network visibility 5. Help reduce complexity and costs 6. Integrate and interface with third-party security solutions 7. Provide investment protection This white paper explains this checklist in depth and provides examples of the benefits a truly effective NGFW solution can deliver.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: Over the years we’ve all heard claims of simple, seemingly magical solutions to solve security problems, including the use of sandboxing technology alone to fight advanced malware and targeted threats. This paper explores: • Where sandboxing technology stands today • Why it fails to meet the needs of organizations • What’s needed for effective malware analysis
Tags : 
    
Cisco
Published By: Cisco     Published Date: Feb 13, 2015
join Robb, Jimmy Ray, and their panel of guest experts as they show you how to protect your network with advanced threat defense across the entire attack continuum by combining Cisco’s proven ASA firewall skills with industry-leading Sourcefire next-generation IPS and advanced malware protection.
Tags : 
network environment, visibility, control, threat defense, advance malware protection
    
Cisco
Published By: Cisco     Published Date: Oct 11, 2016
The Cisco® 2016 Midyear Cybersecurity Report—which presents research, insights, and perspectives from Cisco Security Research—updates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.
Tags : 
cybersecurity, attackers, http, ransomeware, malware
    
Cisco
Published By: ESET     Published Date: Jun 08, 2011
ESET NOD32 Antivirus 4, ESET's Business Solution offers complete server-to-endpoint protection. Request a free trial today.
Tags : 
eset, free trial, nod32 antivirus 4, antivirus, malware, threats, productivity, endpoint protection
    
ESET
Published By: Dell     Published Date: Feb 02, 2015
Security breaches are expensive, costing U.S. businesses an average of $3.5 million per incident, which doesn’t include brand damage or other intangibles. Unfortunately, breaches are highly likely to happen, with 87% of organizations experiencing a breach in the past 12 months. Data, whether it’s intellectual property or personal data, needs to be protected. Dell Data Protection solutions provide encryption, malware protection, and authentication for Dell and non-Dell products, to equip businesses with a complete, easy-to-manage, end-user security solution.
Tags : 
dell, windows 8 pro, security, breaches, encryption, cost, compliance, malware
    
Dell
Published By: Alert Logic     Published Date: Aug 25, 2014
The Security Operations Center (SOC) is where security data is transformed into an effective response to attacks. From investigating threats and scanning for vulnerabilities, to reverse-engineering malware and developing new security content to identify the latest threats, the SOC is a critical piece of the security puzzle. Learn how Alert Logic’s SOC operates to protect IT infrastructure from on-premises data centers to the cloud.
Tags : 
    
Alert Logic
Published By: Cisco     Published Date: Oct 08, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming ever-weaker links in the security chain.
Tags : 
security, cisco, hacking, malware, attackers, security report, enterprise applications
    
Cisco
Published By: Webroot     Published Date: Nov 02, 2012
Download this information to familiarize yourself technically with the components and capabilities of Webroot® SecureAnywhereTM Business - Endpoint Protection.
Tags : 
endpoint security, endpoint protection, it security, malware solutions, malware, malware protection, security, business technology
    
Webroot
Published By: Webroot     Published Date: Nov 02, 2012
This paper looks at this problem and how Webroot, by going back to the drawing board on counering malware threats, is revolutionizing endpoint protection and solving the issues that hinder existing endpoint security solutions.
Tags : 
antivirus protection, endpoint protection, endpoint security, malware, security, business technology
    
Webroot
Published By: Webroot     Published Date: Nov 02, 2012
When IT administrator, Ty Smith deployed SecureAnywhere Business - Endpoint Protection, system wide, it quickly became clear that he had made the right choice, both from a security standpoint and a financial one.
Tags : 
endpoint security, endpoint protection, malware protection, antivirus software, case study, security, business technology
    
Webroot
Published By: Webroot     Published Date: Nov 02, 2012
FAQs for how to break the old trade-off between effectiveness against malware and speed.
Tags : 
faqs, virus detection, endpoint security, it security, malware detection, antivirus detection, security, business technology
    
Webroot
Published By: Webroot     Published Date: Nov 02, 2012
The experts agree that AV software is a must-have for business PC users, but it is necessary to take great care in choosing one. In this brief, you'll find that user experiences with AV solutions can vary widely.
Tags : 
malware attacks, antivirus security, endpoint solution, endpoint security, security solutions, security, business technology
    
Webroot
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, networking
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware, wireless
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile, malware, security, scams, bluecoat, data loss
    
Blue Coat Systems
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.