Malware White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR

Malware

MORE SPECIFIC TOPICS:  Rootkits |  Software Viruses |  Spyware |  Trojan Horses |  Worms
 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 542 Matches
Vantage Point Solutions Group Cut Costs and Strengthens Client Relationships with Webroot
sponsored by Webroot
Case Study: | Posted: 18 Apr 2014
Published:28 Feb 2014
Summary:This brief case study shows how one organization deployed a standardized single endpoint security solution and saw improved efficiency and performance.
Get This Now
Webroot

Taking Managed Security Services To The Next Level
sponsored by Webroot
White Paper: | Posted: 18 Apr 2014
Published:31 Oct 2013
Summary:This white paper outlines the changing landscape of security; the importance of a high-security posture; the elements of effective Web, endpoint, user and mobile protection; and the ways in which Webroot helps partners increase the value and profitability of their security practices.
Get This Now
Webroot

Retail Cyber Crime
sponsored by LogRhythm, Inc.
White Paper: | Posted: 18 Apr 2014
Published:18 Apr 2014
Summary:This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Get This Now
LogRhythm, Inc.

The State of APT Preparedness: Enterprises Struggle to Adapt to Changing IT Security Risks
sponsored by Lumension
White Paper: | Posted: 18 Apr 2014
Published:31 Dec 2013
Summary:This informative guide explores the current struggles enterprises face when adapting to changing security risks and what you can do to prepare for APTs.
Get This Now
Lumension

The 5 Key Tactics for Dealing with Advanced Persistent Threats
sponsored by Lumension
White Paper: | Posted: 18 Apr 2014
Published:31 Dec 2013
Summary:This guide explores 5 key tactics for dealing with APTs and how to prevent potential APT attacks.
Get This Now
Lumension

Websense 2014 Threat Report, Websense Security Labs
sponsored by Websense
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:In preparing the Websense® 2014 Threat Report, Websense Security Labs™ researchers examined cybersecurity through the lens of a seven-stage kill chain and attack model. Learn how to apply the seven-stage "kill chain" and attack model to your cybersecurity.
Get This Now
Websense

Transforming Information Security: Future-Proofing Processes
sponsored by RSA, The Security Division of EMC
White Paper: | Posted: 17 Apr 2014
Published:31 Dec 2013
Summary:Adapting your security strategy to today's expanding threat landscape can be a daunting task. This guide explores strategies for enhancing your security strategy and how to adapt to the current threat landscape.
Get This Now
RSA, The Security Division of EMC

The APT Lifecycle and its Log Trail
sponsored by LogRhythm, Inc.
White Paper: | Posted: 17 Apr 2014
Published:31 Dec 2013
Summary:This guide explores the APT lifecycle and helps you understand the motives behind these attacks, making it easier to prevent them.
Get This Now
LogRhythm, Inc.

Cisco 2014 Annual Security Report
sponsored by Cisco Systems, Inc.
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Get This Now
Cisco Systems, Inc.

What Businesses Need to Know About Cyber Security - Vendor Webcast
sponsored by Lumension
Webcast: | Posted: 17 Apr 2014
Premiered:Apr 17, 2014
Summary:Access this resource and witness 4 security experts discuss today's threat landscape and how cyber security is being dealt with across the world.
Get This Now
Lumension

Defending Your Corporate Endpoints: How to Go Beyond Anti-Virus
sponsored by Lumension
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:Malware is the most common type of cyber-threat and businesses are struggling when it comes to stopping its growing complexity. This informative resource explores some strategies for preventing these sophisticated malware attacks.
Get This Now
Lumension

NSS Labs: Breach Detection System Comparative Analysis
sponsored by Sourcefire
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:This informative analysis tests some top breach detection technologies and compares the standards of their security and performance.
Get This Now
Sourcefire

Is Your AV Keeping Up? - Vendor Webcast
sponsored by Lumension
Webcast: | Posted: 16 Apr 2014
Premiered:Apr 16, 2014
Summary:This informative resource takes a look at anti-virus technology and outlines how businesses can prevent sophisticated malware from infiltrating their system.
Get This Now
Lumension

Top 9 Mistakes of APT Victims: What They Are and What You Can Do To Prevent Them - Vendor Webcast
sponsored by Lumension
Webcast: | Posted: 16 Apr 2014
Premiered:Apr 16, 2014
Summary:This informative resource explores the role of APTs in today's current threat landscape and what you can do to prevent them.
Get This Now
Lumension

A New Threat-Centric Security Model for Before, During, and After an Attack
sponsored by Sourcefire
White Paper: | Posted: 16 Apr 2014
Published:16 Apr 2014
Summary:This guide explores a threat-centric security model designed to prevent, detect and remediate any potential cyber-attacks.
Get This Now
Sourcefire

1 - 15 of 542 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com