ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Symantec

  • Cryptojacking

    Cryptojacking can be a nuisance to your employees but, more importantly, these attacks can result in unexpected increases in your business costs. There are two types of cryptojacking attacks: file-based and browser-based attacks. In this webcast, walk through how a typical browser-based cryptojacking scenario might play out.

  • Malicious Power Shell Usage

    In living-off-the-land attacks, attackers take advantage of common tools living in your network. One common type of a living-off-the-land attack is a PowerShell attack. This webcast shows how PowerShell attacks take place and how your organization can avoid being a target.

  • Internet Security Threat Report: February 2019

    Understanding the latest facts, figures and trends is essential when making adjustments and improvements to your enterprise security strategy. This 2019 research report looks at topics such as formjacking, cryptojacking and ransomware to see how they have trended over the last year.

  • 2019 Internet Security Threat Report: Executive Summary

    Like flies to honey, miscreants swarm to the latest exploits that promise quick bucks with minimal effort. Ransomware and cryptojacking had their day; now it's formjacking's turn. In the Symantec Internet Security Threat Report, discover the latest insights into global threat activity, cybercriminal trends, and attacker motivations.

  • Internet Security Threat Report: Big Numbers

    In this infographic, discover key findings from the Internet Security Threat Report. Also, learn about the state of many threats including malicious URLs, ransomware and malware.

  • Protect Against a Perfect Storm of Cyber Threats

    Fresh digital security threats are continually emerging from new and unexpected sources. Cyber criminals adapt to your defenses by designing new malware variants to evade network and endpoint security. In this report, discover the enormous number of malware variants that Symantec detects daily.

  • Deploy Symantec Cloud Workload Protection for Storage

    As organizations generate increasing amounts of information, they need to securely collect, store, and rapidly analyze this data. In this eBook, learn how Cloud Workload Protection for Storage can help your organization implement a robust security strategy that will enhance the protection of your stored data from malware and threats.

  • Isolate Advanced Email Attacks

    Traditional email security platforms can sometimes be ineffective against suspicious links that use techniques such as multiple redirects, shortened URLs, or time-based delays to evade detection. In this product brief, learn about a platform that can help isolate advanced email attacks like these today.

  • How to Bolster Endpoint Security Protection

    This expert e-guide examines a Symantec platform that is designed to protect its users with security for both physical and virtual endpoints. Learn how to enhance endpoint security with key features like anti-malware, firewalls, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.