malware discovery

Results 1 - 4 of 4Sort Results By: Published Date | Title | Company Name
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
Hardly a day goes by without the discovery of a new cyber threat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks?
Tags : 
cyber threat, cyber defenses, security intelligence, malware discovery, security, it management, knowledge management
    
Kaspersky Lab
Published By: Trend Micro SPN     Published Date: May 15, 2009
Measuring the effectiveness of your security infrastructure is key to any enterprise as threats change on a minute by minute basis. See an example of the report you would receive following a Trend Micro Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, threat discovery, worms, trojans, infected, recovering, instant messaging
    
Trend Micro SPN
Published By: Trend Micro SPN     Published Date: Nov 24, 2009
How do you measure security effectiveness? Conventional security solutions may appear to be holding back targeted malware attacks but this eBook shows you how to check the performance of your current infrastructure. Whether you are 'secure', 'infected' or 'recovering', you can benefit from a Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, infected, recovering, instant messaging
    
Trend Micro SPN
Published By: Mimecast     Published Date: Sep 25, 2008
Email is one of the most critical applications in use in business today: it is embedded in many business workflows, it is used by engineers to inform them of infrastructure issues and it is used to communicate with customers and business partners. In short, the modern organization has email at the heart of its communications and business processes. This makes it critical to minimize both the downtime and loss of email upon the outset of a business continuity event.
Tags : 
mimecast, saas, malware, workflows, risk management, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance
    
Mimecast
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com