Rootkits White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR
Software  >  

Rootkits

 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
15 Matches
What's Wrong with Traditional Firewalls? (Edu)
sponsored by Dell Software
White Paper: | Posted: 24 Mar 2014
Published:20 Dec 2012
Summary:Did you know that your current firewall may be jeopardizing your network security? Traditional firewalls that only focus on stateful packet inspection and access control rules aren't effective in today's world. This e-book explains where traditional firewalls fall short – and what you can do about it.
Get This Now
Dell Software

Efficacy of Emerging Network Security Technologies
sponsored by ComputerWeekly.com
IT Briefing: | Posted: 29 Apr 2013
Published:29 Apr 2013
Summary:The report, which surveyed 4,774 global IT and IT security professionals across nine countries identifies the challenges enterprises are facing dealing with emerging security threats.
Get This Now
ComputerWeekly.com

How traditional firewalls fail
sponsored by Dell Software
White Paper: | Posted: 20 Dec 2012
Published:20 Dec 2012
Summary:Did you know that your current firewall may be jeopardizing your network security? Traditional firewalls that only focus on stateful packet inspection and access control rules aren't effective in today's world. This e-book explains where traditional firewalls fall short – and what you can do about it.
Get This Now
Dell Software

The New Reality of Stealth Crimeware
sponsored by McAfee, Inc.
White Paper: | Posted: 31 May 2013
Published:31 May 2013
Summary:This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.
Get This Now
McAfee, Inc.

Sophos Virus Removal Tool: Free virus detection and removal
sponsored by Sophos, Inc.
Trial Software: | Posted: 09 May 2013
Premiered:09 May 2013
Summary:Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.
Get This Now
Sophos, Inc.

McAfee Deep Defender: Hidden Malware Protection - Vendor Webcast
sponsored by Intel
Webcast: | Posted: 02 Jan 2013
Premiered:Jan 2, 2013
Summary:This webcast explores a security solution that operates beyond the OS, exposing and eliminating hidden malware and stealthy threats that traditional security solutions miss. Discover how this strategy can overcome the limitations of traditional security solutions by watching now to learn more.
Get This Now
Intel

Fighting Rootkits: Protecting against stealthy malware by flying under the operating system
sponsored by Intel
White Paper: | Posted: 27 Dec 2012
Published:31 Jan 2012
Summary:Discover why rootkits are so harmful to your organization and uncover the innovative and dramatically different approach you should take to protect your organization from these harmful intruders.
Get This Now
Intel

The New Reality of Stealth Crimeware
sponsored by McAfee.
White Paper: | Posted: 21 Nov 2011
Published:21 Nov 2011
Summary:The new reality of crimeware consists of the stealth, creativity and patience of stuxnet, and the commercialism, wide distribution and easy-to-use toolkits of Zeus, making it even more challenging to detect and protect against. Organisations must go beyond the traditional security to ensure their intellectual property is safe.
Get This Now
McAfee.

Worry-Free Business Security Standard
sponsored by Trend Micro, Inc.
Software Download: | Posted: 26 Oct 2010
Premiered:26 Oct 2010
Summary:Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.
Get This Now
Trend Micro, Inc.

Sophos Computer Security Scan
sponsored by Sophos, Inc.
Trial Software: | Posted: 07 Apr 2010
Premiered:07 Apr 2010
Summary:Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.
Get This Now
Sophos, Inc.

Heuristic Analysis- Detecting Unknown Viruses
sponsored by ESET
White Paper: | Posted: 03 Feb 2010
Published:03 Feb 2010
Summary:The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Get This Now
ESET

McAfee Initiative to Fight Cybercrime
sponsored by McAfee, Inc.
White Paper: | Posted: 15 Dec 2008
Published:15 Dec 2008
Summary:Fighting Cybercrime requires a three-pronged approach: technology & innovation, education, and legal frameworks.
Get This Now
McAfee, Inc.

Unified Threat Management (UTM) Solutions
sponsored by SonicWALL
White Paper: | Posted: 05 Dec 2007
Published:01 Dec 2007
Summary:This series of technical briefs examines the key factors you need to consider regarding unified threat management (UTM) solutions as they impact security, performance, management, and consolidation.
Get This Now
SonicWALL

Kaspersky Internet Security 7.0
sponsored by Kaspersky Lab
Trial Software: | Posted: 16 Nov 2007
Premiered:01 Nov 2007
Summary:Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
Get This Now
Kaspersky Lab

Putting Security in a Positive Light - A Guide to Proactively Managing Endpoint Risk
sponsored by Lumension
White Paper: | Posted: 29 Oct 2007
Published:10 Sep 2007
Summary:This white paper outlines the importance of adopting a positive security model that combines the power of vulnerability management, automated remediation, whitelist application and device control to eliminate the risk of the unknown.
Get This Now
Lumension



Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com