ComputerWeekly.com Research Library

Powered by Bitpipe.com

Malware Multimedia

  • Enterprise Security and your Technology

    Sponsored by: Hewlett Packard Enterprise

    This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.

  • Tips for Expediting Incident Response

    Sponsored by: Threat Track Security

    This informative resource explores the importance of malware analysis and outlines how to enhance your incident response strategy.

  • Symantec Endpoint Protection 12 Trialware

    Sponsored by: Symantec Corporation

    Access this trial software by Symantec and discover the benefits of effective endpoint security.

  • How to Limit the Risk of Attack on your XP Assets

    Sponsored by: AT&T Cybersecurity

    This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.

  • Web Security – Virtual Appliance

    Sponsored by: Cisco Systems, Inc.

    Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.

  • Maximum-Strength Threat Detection for Mid-Size Enterprises

    Sponsored by: EMC Corporation

    This on-demand webcast explains how RSA Security Analytics provides visibility, threat intelligence, and analytics – and how you can start small.

  • Unified Security Management: Real-time Threat Detection

    Sponsored by: AT&T Cybersecurity

    This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.

  • Hidden Lynx – Professional Hackers for Hire

    Sponsored by: Symantec Corporation

    This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.

  • HID Global's ActivID® Authentication: Online Banking

    Sponsored by: HID Global

    This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.

  • 2013 Cost of Cyber Crime – UK, France and Germany Findings

    Sponsored by: Hewlett-Packard Enterprise

    Click to view a Q&A session with Larry Ponemon, Founder of Ponemon Institute, as he unveils the results from a global survey on cybercrime, and how the UK, France, and Germany have specifically dealt with the costs of these IT security attacks.

  • Enhancing Security with Intel® Trusted Execution Technology

    Sponsored by: Dell, Inc. and Intel®

    This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!

  • Sophos EndUser Protection Overview

    Sponsored by: Sophos

    This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.

  • The Custom Defense - Your Answer to APTs

    Sponsored by: Trend Micro

    Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).

  • New Reality of Stealth Crimeware Video

    Sponsored by: Intel

    An overwhelming amount of new malware is created everyday and it puts your sensitive data at risk. View this informative webcast to learn more about the implications of stealth crimeware and the possible repercussions they could have on your business.

  • Symantec Web Gateway 5.0 Trialware

    Sponsored by: Symantec Corporation

    In an age of ever-changing Web practices, organizations need to be ready to protect themselves against a variety of attacks. By downloading this helpful trial, you can protect your important data against multiple types of Web-borne malware, data loss and increase its flexibility.

  • ESET Online Scanner

    Sponsored by: ESET

    ESET Online Scanner is designed only to detect and remove threats via on-demand scan and is not a permanent proactive antivirus solution. To receive complete proactive protection, get a free custom business trial and find out why IT pros worldwide recommend ESET for server-to-endpoint security.

  • Protecting Your Multi-Platform Network: The New Wave of Attacks

    Sponsored by: ESET

    Join us to examine some of the malware risks associated with heterogeneous computing environments and solutions to protect your valuable business assets.

  • SonicWALL SuperMassive E10000 Series video

    Sponsored by: SonicWALL

    This video talks about the various security threats that are threatening businesses today. With the increasing amount of worms, botnets, and malware the need to an advanced security solution that can scan for all of these things and eliminate potential harmful programs is essential for every business.

  • Webinar: Addressing ‘The Unlucky Seven’ - Security and Compliance Issues that Matter Most to the Mid-Market

    Sponsored by: ArcSight, an HP Company

    This webinar will go through the most critical challenges faced by mid-market companies, and illustrate how collecting and analyzing event data across the enterprise can address those challenges in the context of budget and staff constraints.

  • The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape

    Sponsored by: ESET

    In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more. 

  • Worry-Free Business Security Services

    Sponsored by: Trend Micro, Inc.

    Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.

  • Deep Security 7.5

    Sponsored by: Trend Micro, Inc.

    Protect your virtualized environment by learning what Deep Security 7.5 can do for you. Watch this video to learn so much more about Deep Security 7.5.

  • Lumension Endpoint Security: Device Control and Application Control

    Sponsored by: Lumension

    The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.

  • ESET: Threat Center

    Sponsored by: ESET

    IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.

  • Sophos Computer Security Scan

    Sponsored by: Sophos

    Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.