ComputerWeekly.com Research Library

Powered by Bitpipe.com

Internet Security Research

  • Presentation Transcript: Protecting Against Malware with Web Security Gateways and Services

    Sponsored by: TechTarget Security

    Many organizations are moving malware protection to the Web and investing in Secure Web Gateways. This  transcript will help sort the different feature options and deployment challenges and help you bring efficiency to your threat management programs by centralizing Web-based security and stop managing numerous standalone Web security products.

  • The various ways to fight new and emerging cybercrime

    Sponsored by: TechTarget Security

    Cybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company.

  • The real need for distributed denial-of-service protection: How to stop DDoS attacks

    Sponsored by: TechTarget Security

    This expert E-Guide discusses the immediate need for DDoS protection services and what you put at risk by not protecting your organization today. Uncover how these attacks work, the damage they can cause and best practices to stop them.

  • Best Practices for Preventing Malware

    Sponsored by: TechTarget Security

    Preventing malware has been a constant issue for both consumers and businesses since the beginning. Malware can often present itself in all areas of an industry, including both new and old methods. Check out this E-Guide to discover the best practices for inhibiting malware from affecting both your business and your customers.

  • Next Generation Firewalls: Assessing the Business/Technology Issue

    Sponsored by: Dell SonicWALL

    In the first of SearchSecurity.com's three-part guide on selecting Next Generation Firewall products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of Next Generation Firewall solutions.

  • Presentation Transcript: Threat Update: Top Trends to Focus on for 2012

    Sponsored by: Symantec Corporation

    In this presentation transcript, Kevin Haley, one of Symantec's security experts from the Security Technology and Response organization, discusses the Symantec's Internet Security Threat Report (ISTR), detailing the latest security research and the top trends for 2012. Find out how the security landscape will affect your organization.

  • Kaspersky Endpoint Security 8 for Windows

    Sponsored by: Kaspersky

    Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.

  • Simplify SSL Certificate Management Across the Enterprise

    Sponsored by: Symantec Corporation

    Managing SSL Certificates has become a complex task especially for organizations with multiple locations, divisions and increasing Web-based services. In this resource, uncover a five (5) step guide to help you take control on SSL Certificates across the enterprise and key recommendations.

  • FireEye Advanced Threat Report - 2H 2011

    Sponsored by: FireEye

    This FireEye Advanced Threat report provides key insight into the current threat landscape, the evolution of advanced persistent threat (APT) tactics and the level of infiltration seen in networks today. View now to gain an in-depth look into key findings to help you build and improve your security strategies to tackle today's security issues.

  • Solution Note: Enabling the Secure Use of Facebook

    Sponsored by: Palo Alto Networks

    With millions of users, Facebook offers significant opportunities for organizations to conduct research, execute targeted marketing, increase awareness and more. But enabling the use of Facebook introduces a number of security risks. In this paper, uncover how to reap the benefits of social networking while doing it in a safe and secure manner.

  • Five tips to reduce risk from modern web threats

    Sponsored by: Sophos

    To meet the challenges to your security, you need to put in place user education and awareness, preventive measures and a modern web security solution. This guide covers five essential preventive measures you should implement to reduce your risk and keep ahead of the threats.

  • Imperva's Web Application Attack Report

    Sponsored by: Imperva

    Imperva’s Application Defense Center (ADC), as part of its ongoing Hacker Intelligence Initiative, studied web application attacks across 40 applications over a six month period. View this report to explore key findings and gain recommendations to help you better prioritize vulnerability remediation and web application projects.

  • Akamai Shields Leading Retailer from Ddos Attacks During Critical Holiday Shopping Period - and Protects $10 Million in Revenues

    Sponsored by: Akamai Technologies

    In this case study, learn how one online retailer was able to maintain online operations and protect $10 million in revenue by implementing Akamai’s DDoS Defender Security Solution and utilizing Akamai Intelligent Platform to deflect and reflect malicious attacks.

  • GFI WebMonitor 2012

    Sponsored by: GFI Software

    Having Internet in the workplace – while a necessary feature – can cause two serious challenges: employee inefficiency and security threats. Rather than revoking Internet privileges, discover how you can properly manage and monitor Internet use, preventing these two issues.

  • The four rules of complete web protection

    Sponsored by: Sophos

    As an IT manager you’ve always known the web is a dangerous place. But with infections growing and the demands on your time and budget rising, it’s time to revisit your strategy. This whitepaper discusses the major web threats and provides four rules to help you stay protected. When you follow them, these rules will also save you time and money.

  • How to prevent cross-site scripting attacks: Expert tactics

    Sponsored by: TechTarget Security

    This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks.

  • Social Networking malware: The dangers facing SMBs

    Sponsored by: GFI Software

    View this paper to explore the rise of social networking, the types of malware targeting social platforms, how SMBs can protect themselves against today’s social threats, and more.

  • Messaging and Web Security Best Practices for 2011 and Beyond

    Sponsored by: GFI Software

    This paper discusses the threats organizations face from spam, malware and other threats directed at messaging and Web capabilities. View now to explore these threats and learn best practices for addressing these challenges.

  • Keeping Networks safe from Social Networking

    Sponsored by: BlueCoat

    Social Networking has provided attackers with an innovative way to gain information from within your corporate networks. This expert E-Guide will provide you with the information needed to keep your organization safe from the threats of social networking.

  • The Business Case for Managed DDos Protection

    Sponsored by: Neustar®

    This whitepaper provides a snapshot of the evolving DDoS threat, provides guidance on what to look for in a managed DDoS solution and presents a financial cash-flow analysis scenario of an investment in a managed DDoS protection service.

  • FireEye 1H 2011 Advanced Threat Report

    Sponsored by: FireEye

    This FireEye Advanced Threat report offers a global view into the cyber attacks that routinely bypass traditional defenses, using the threat data shared by thousands of FireEye Malware Protection Systems (MPS) deployments. View now to explore key findings in this analysis that uncover the real security issues enterprises face today.

  • State of DNS Availability Report

    Sponsored by: Verisign, Inc.

    This domain name system (DNS) availability report illustrates the risks and impact that site downtime can have on revenue generation, business continuity, customer loyalty and more.

  • Security-In-Depth Using Integrated Risk-Conscious Controls

    Sponsored by: Tripwire, Inc.

    Most organizations seem stuck in the traditional castle-and-moat approach to security. This approach assumes there's a clear boundary between what's inside and outside the organization and that attacks come from external sources. Clearly today's threat environment requires a new approach.

  • Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers.

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now.

  • WebPulse Collaborative Defense

    Sponsored by: BlueCoat

    Malware is constantly evolving, so you need a dynamic security defense that can keep up with the latest web-based threats. Learn how the Blue Coat WebPulse™ collaborative defense powers Blue Coat's web security portfolio, delivering fast and effective Web 2.0 threat protection for 75 million users worldwide.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.