Spam Research
-
About to Buy Guide: Spam/virus protection for Exchange
Sponsored by: TechTarget SecurityThis expert e-guide explores the value of a comprehensive email security strategy, and compares the pros and cons of various approaches. Discover how you can gain the antispam and antivirus protection you need to keep email threats at bay and productivity high.
-
Threat Management: Devising a new strategy to tackle today's cyberattacks
Sponsored by: TechTarget SecurityThis Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
-
Enterprise Device Management: A Brave New World
Sponsored by: TechTarget SecurityLearn how implementing a strong mobile device management solution can help you avoid security risks and compliance violations while allowing access by your users personal devices.
-
The Bot Threat
Sponsored by: Hewlett Packard EnterpriseIn this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
-
The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
Sponsored by: IBMThis report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
-
The Bot Threat
Sponsored by: Hewlett-Packard EnterpriseIn this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defence-in-depth security system to prevent these attacks from compromising your networks.
-
Mitigating Email Virus Attacks
Sponsored by: CiscoAccess this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
-
IBM X-Force 2013 Mid-Year Trend and Risk Report
Sponsored by: IBMIn this detailed white paper, explore this year's report on the latest risks and security challenges organizations are facing today, and offers best practices to boost security fundamentals and policies to meet these advanced persistent threats (APTs).
-
Symantec Intelligence Report - August 2013
Sponsored by: Symantec CorporationIn this white paper, get the most recent analysis on cybersecurity threats and trends, and gain insight on what to expect in the future.
-
Symantec Intelligence Report - June 2013
Sponsored by: Symantec CorporationThis Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
-
Symantec Intelligence Report – May 2013
Sponsored by: Symantec CorporationKeeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
-
Symantec Internet Security Threat Report
Sponsored by: Symantec CorporationThis report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
-
GlobalSign Malware Monitoring: Protecting your website from distributing hidden malware
Sponsored by: GlobalSignThis paper gives you a solution to keeping your websites safe, protecting your customers and securing the reputation of your company.
-
Death and Taxes...and Hackers
Sponsored by: ImpervaView this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.
-
Mail Security for Microsoft Exchange Server
Sponsored by: ESETESET Mail Security for Microsoft Exchange Server blocks all types of email-borne malware and spam. It scans your email traffic with industry-leading precision, low system footprint and high scanning speed - so slowdowns will be a thing of the past
-
Fortune 200 Firm Achieves Global Email Protection
Sponsored by: WatchGuard Technologies, Inc.Eaton Corporation, a premier industrial manufacturer, is an industry leader in diversified power management and ranks in the Fortune 200.
-
Sophos Security Threat Report 2011
Sponsored by: SophosLet our new 2011 Security Threat Report be your weapon in the battle against malware. It describes the significant threats of 2010, what to watch for in 2011, and more importantly, what you need to do to get ahead of them.
-
E-Guide: Enterprise UTM Security: The Best Threat Management Solution?
Sponsored by: NETGEAR Inc.If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information security. However, I've never met a security professional who believes everything they read. UTM provides decent network security for small to midsized businesses, but probably has no place in the enterprise.
-
Presentation Transcript: Rogue Security Software - An In-Depth Look And The Challenges For Business
Sponsored by: Sunbelt SoftwareIn this presentation transcript, Chris Boyd, GFI Software’s Senior Threat Researcher, provides an in-depth look into Rogue antivirus. He details the damage it can cause and how they have been tailored to look like legitimate products. You will also learn what businesses can do to better protect their network and end users from these threats.
-
Exchange Insider E-Zine - Volume 5: When Disaster Strikes in Exchange Server 2010
Sponsored by: GoogleVolume 5 of the Exchange Insider e-zine looks at how Exchange Server 2010’s database availability groups can ease an administrator’s backup and disaster recovery stress. Also learn how Forefront Protection 2010 can help defend Exchange 2010 servers from spam and malware attacks, and best practices for email archiving and e-discovery.
-
Slipping Through The Cracks Of Web Services To Serve Malware
Sponsored by: Trend Micro, Inc.Today's generation of cybercriminals continue to find more ways to abuse commonly used Web services for spamming and to spread malware. Leveraging the ever-growing number of Web 2.0 and computing platforms to facilitate operations, cybercriminals have moved away from simple and so much more.
-
Worry-Free Business Security Services
Sponsored by: Trend Micro, Inc.Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.
-
E-Book: Driving Profitability through Information Security
Sponsored by: AstaroWhile recognizing the need for security is a positive step, many of these organizations are missing an opportunity to improve their operations by using the same tools. In this document you will find some tactics you can add to your security playbook to help make your employees more productive and to help improve your organization’s efficiency.
-
McAfee Total Protection for Secure Business
Sponsored by: InsightMedium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business.
-
Trend Micro Hosted Email Security
Sponsored by: Trend MicroTrend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version.