ComputerWeekly.com Research Library

Powered by Bitpipe.com

Malware Research

  • Put Time On Your Side: The Heavy Cost Of Putting Off Your Cybersecurity Decisions Enterprise

    Sponsored by: Kaspersky Lab

    A lot can happen in a business day. Deals close. Products launch. News items hit the airwaves. In fact, at Kaspersky Lab, we detect 310,000 new pieces of malware every day, which means that every day you put off the decision to upgrade your IT security system is a day that thousands of pieces of new malware can slip through.

  • The Threats From Within

    Sponsored by: Kaspersky Lab

    With a robust security education program in place, your company can protect its most sensitive information by ensuring that cybercriminals cannot break through your employee firewall.

  • Virtualization Security: Know Your Options

    Sponsored by: Kaspersky Lab

    Discover the top three options for delivering security to your virtual servers. Go in-depth on agent-based security, agentless security and light agent security to see which option fits your unique IT architecture.

  • LIFTING THE VEIL OF SECRECY ON CYBERCRIMINALS.

    Sponsored by: Kaspersky Lab

    In this eBook, we'll look closely at cybercrime trends to answer your most pressing questions about cybercriminals. Most important, we will answer what you can do to protect your business from this growing threat.

  • RANSOMWARE: ALL LOCKED UP AND NO PLACE TO GO

    Sponsored by: Kaspersky Lab

    In this e-book, you'll discover how exactly ransomware works, types of ransomware you'll encounter and how to best deal with being held victim by ransomware. Learn hard facts and dispel myths about ransomware vs. businesses.

  • Future Risks Be Prepared

    Sponsored by: Kaspersky Lab

    An increasingly sophisticated threat landscape calls for a multi-layered security approach, in which a combination of integrated technologies provides comprehensive detection and protection against known, unknown and advanced malware and other threats. This report is designed to help you to be better prepared to fight APTs.

  • Rethinking IT Security

    Sponsored by: Kaspersky Lab

    This eBook explores the features that make antivirus a critical component of an effective cybersecurity strategy to fight all hazards targeting businesses today — including known, unknown and advanced cyberthreats.

  • Fortinet Secure Access Solutions for Flawless Wireless Performance

    Sponsored by: Fortinet, Inc.

    Wireless healthcare operations means greater vulnerabilities to healthcare networks. With patient records such a hot commodity for cybercriminals, healthcare organizations must be airtight with their remote management. Learn how to deploy end-to-end cybersecurity to ensure uninterrupted care at any sized healthcare facility.

  • Gartner Research Paper Enterprise Firewall

    Sponsored by: Fortinet, Inc.

    This Gartner Report shows you how to take on a unified security posture for your entire borderless network. Automate your threat remediation actions and minimize breach intervals. With one universals network operating system, you don't need to choose between security or performance - have both and manage it all from one single pane of glass.

  • Complete Data Protection

    Sponsored by: Intel Security

    Discover how to stop data loss initiated by sophisticated malware that hijacks sensitive information. Implement and enforce organization-wide security policies that control how data is encrypted, monitored and protected from a central console.

  • When App is the Business, the Business is the App Vol. 2

    Sponsored by: IBM MaaS360

    Empower your organization with a mobile application strategy that advances your business while providing scalability, sustainability and security. Learn how to design your business around applications without putting enterprise data at risk.

  • Is data leaking out on your watch?

    Sponsored by: Intel Security

    Learn more about where threats initiate and the tactics cyber criminals use to steal your data. Discover what measures you can take to make sure your organization isn't the next highly publicized breach victim (whether it be from external threats or your very own employees).

  • 2015 the Year Data Breaches Got Personal

    Sponsored by: Gemalto

    Data breaches continue to be a large and growing threat for organizations in all industries. Many are clinging to conventional ways of looking at cyber security rather than taking a newer approach. With this cybercrime data, you'll be able to formulate a modern security strategy to stay ahead of evolving threats and hackers.

  • Mobile is the New Playground for Thieves

    Sponsored by: IBM MaaS360

    You need to modernize your security with a robust way to proactively detect, analyze and remediate new mobile threats. Learn the true cost of a data breach and how to best implement your own BYOD policy.

  • SB Enterprise Firewall

    Sponsored by: Fortinet, Inc.

    Network firewall security must evolve to secure the extended enterprise. You need end-to-end network security that protects the entire attack surface from IoT to cloud. Take a more collaborative approach across your entire network infrastructure to deploy a dynamic, long term defense strategy.

  • Security essentials for CIO's enabling mobility - their device, your data

    Sponsored by: IBM MaaS360

    Your goal is to make BYOD policies feasible by seamlessly securing corporate data on the device while providing logical separation from personal activities. Learn five key steps you should consider before putting your BYOD program in place.

  • Practical Guide to IT Security Breach Prevention Part II

    Sponsored by: Kaspersky Lab

    With users connecting to unsecured public networks and social media platforms on both company-owned and personal devices, sensitive data can now be accessed--and lost--from more endpoints than ever before. Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task.

  • Gartner Magic Quadrant for Enterprise Data Loss Prevention

    Sponsored by: Intel Security

    This report gives you strengths and weaknesses from some of today's best (and worst) integrated data loss prevention (DLP) vendors to help you choose the right DLP solution aligned with your organization's particular security pain points.

  • Stop Data Exfiltration

    Sponsored by: Intel Security

    Gain insight into hackers' motivations and understand which pieces of information are most valuable for them to steal (chances are they're the same ones most valuable to you). Go in depth into data exfiltration secrets to better understand the complexities of how a network is breached and robbed of personal, corporate, and customer information.

  • Keep Your Data Safe for Office 365

    Sponsored by: Intel Security

    Built in DLP capabilities aren't robust enough to stop advanced persistent threats. Access now to learn how you can enhance your cloud data protection and gain expansive, yet flexible policies that will help address threats to your data and risky employee behavior.

  • IT Guide: Protecting Corporate Data Beyond the Firewall

    Sponsored by: Druva Software

    24/7 data monitoring can ensure your important information stays on devices and on networks that you deem safe. Learn how to be proactive in your compliance requirements and stay on top of how your data is handled.

  • Symantec Data Loss Prevention for Cloud

    Sponsored by: Symantec Corporation

    Not only can you keep total visibility of your enterprise data, but also gain new capabilities to increase workflow. Access now to discover how data loss prevention can secure your cloud data and automate incident response processes and remediation.

  • Secur ing Productivity in the Border less Enterprise

    Sponsored by: Microsoft

    The combination of cloud and mobility can allow for great employee productivity and greater customer responsiveness. However, these new business opportunities mean nothing if you can't protect against the new security challenges they bring.

  • Office 365: Upgrading Enterprise Security

    Sponsored by: Symantec Corporation

    You must carefully evaluate the risks associated with adopting any platform that streamlines access to company information. Examine here the security features of Microsoft Office 365, and discover the cloud security gaps that could hinder its adoption.

  • Evaluating Hybrid Cloud Security Options to Control Network Security

    Sponsored by: MASERGY

    This e-guide helps you evaluate your hybrid cloud security options to best secure your data as it moves to the cloud. Learn what different organizations are implementing to help their situation, including host-based security tools, encryption and other security services.

Browse by Report Type: Malware White Papers | Malware Multimedia | Malware IT Downloads

See more topics related to: Malware

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.