Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

web threat

Results 201 - 225 of 275Sort Results By: Published Date | Title | Company Name
Published By: Sunbelt Software     Published Date: Mar 27, 2008
Messaging, internal and Web-based threats are increasing in number and severity. Because the profit motive now drives spammers, hackers and other purveyors of malicious content, as well as the development of more sophisticated techniques to circumvent corporate defenses, organizations must continue to improve their defenses.
Tags : 
messaging, security, web threats, email threats, email security, spam, trojan, sunbelt
    
Sunbelt Software
Published By: Websense     Published Date: Aug 23, 2012
Websense redefines the security gateway with advanced threat and data theft defenses.
Tags : 
security, malware analysis, websense, dlp, data loss prevention, threat defense
    
Websense
Published By: Symantec.cloud     Published Date: Jan 26, 2011
This report examines the new generation of threats, vulnerabilities and attacks, and explores the role that cloud security strategies can play in managing core risks to organizations of all sizes and across all industries.
Tags : 
symantec cloud, web threats, threats, vulnerabilities, cloud security, productivity, mobile communication, cloud computing
    
Symantec.cloud
Published By: Webroot UK     Published Date: Mar 22, 2010
The web today is a prime vector for attack. Interrupting information flows, which are increasingly transmitted over the internet, has become the prime focus for today's financially motivated hackers.
Tags : 
webroot, web security protection, hackers, web threats, cloud computing, malware
    
Webroot UK
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Symantec     Published Date: Apr 09, 2012
Although there is no single security measure than can prevent all threats, the use of SSL encryption and digital certificate-based authentication is one of them.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation, two-factor authentication, identity protection, ddos mitigation, public key infrastructure (pki), domain name services, malware scan, com net tv registry, seal, verisign, security
    
Symantec
Published By: Symantec     Published Date: Oct 02, 2012
The Shortcut Guide to Protecting Against Web Application Threats Using SSL
Tags : 
web application, threats, ssl, cybersecurity
    
Symantec
Published By: Symantec     Published Date: Jan 11, 2013
Threats to web application are becoming increasing complex - from malware and advanced persistent threats to data leaks. This guide is made to address your needs and provides a step by step to assess your security needs.
Tags : 
ssl, web application, shortcut guide, web application threats, shortcut guide, symantec, security, it management
    
Symantec
Published By: Symantec     Published Date: Sep 19, 2012
This guide discusses the combined risk of data loss and customer trust, planning, deploying and maintaining SSL certificates and how SSL certificates can protect your business.
Tags : 
information security, information technology, web applications, security
    
Symantec
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Businesses face an increasingly complex set of threats to their Web applications—from malware and advanced persistent threats (APTs) to disgruntled employees and unintentional data leaks. Although there is no single security measure than can prevent all threats, there are some that provide broad-based mitigation to a number of threats. The use of SSL encryption and digital certificate-based authentication is one of them. Changes in the way we deliver services, the increasing use of mobile devices, and the adoption of cloud computing compounded by the ever-evolving means of stealing information and compromising services leave Web applications vulnerable to attack. In this chapter, we turn our attention to the combined risk of losing data and losing customer trust.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: ESET     Published Date: Jan 30, 2008
Spam looks like a simple enough issue until you have to try to define it: after all, we all think we know it when we see it. Most people have a working definition along the lines of “email I don’t want.” While that’s perfectly understandable, it is difficult to implement technical solutions based on such a subjective definition. Read this paper to learn why SPAM is more than just unwanted email.
Tags : 
malware, threats, email, threat summary, viruses, eset, antivirus, nod32, internet threats, web-borne threats, phishing, trojans, spam, attacks, exploits, computers, malicious software, spam solution, email spam
    
ESET
Published By: Symantec.cloud     Published Date: Feb 03, 2010
The emergence of covert information theft as a key tactic of malware propagators. Most importantly, the paper highlights the crucial danger points for any business that doesn't defend itself against viruses which operate in the background.
Tags : 
messagelabs intelligence, symantec hosted services, security threat, spyware, botnets, phising, email security, social networking, hosted web security, content filtering
    
Symantec.cloud
Published By: Trend Micro     Published Date: May 03, 2018
Hybrid cloud security is a hot topic, especially with the massive growth of public cloud providers like Amazon Web Services (AWS), Microsoft® Azure™ and Google Cloud. With the emergence of the hybrid cloud, where workloads are deployed across physical, virtual, and cloud, security professionals are constantly being challenged to evolve their security practices to adapt to this new architecture. Trend Micro Hybrid Cloud Security, powered by XGen™, takes a blended approach. It combines multiple cross-generational threat defense techniques for protecting hybrid environments. When one technique isn’t effective against a given threat, another will step in to eliminate the threat.
Tags : 
    
Trend Micro
Published By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : 
encryption, data, key, cloud, bits, keys, ciphertext, entropy, plaintext, software
    
Rubrik EMEA
Published By: McAfee Inc     Published Date: Oct 30, 2009
Browsers are the least-protected and therefore easiest medium for transferring malware, which is why protecting your company against web-borne threats should be part of a total security solution. This brief explains the key benefits of implementing a web security solution with McAfee. Read more.
Tags : 
mcafee, email protection, midsize, global threat intelligence, security, data protection, spam
    
McAfee Inc
Published By: ThreatTrack Security     Published Date: May 21, 2015
Watch the Better Defend Your Network from Targeted Attacks webinar to learn about the broad array of enhancements and new capabilities that enable you to better defend your network from advanced malware threats.
Tags : 
targeted attacks, cyberattacks, malware threats, malware analysis sandbox, cybersecurity, security, it management
    
ThreatTrack Security
Published By: IBM     Published Date: Feb 01, 2017
View this webinar to learn what the experts are saying about the current state of digital analytics and hear why not upgrading is a threat to your business. James McCormack of Forrester will detail what steps you need to take now.
Tags : 
ibm, commerce, customer experience, digital intelligence, customer analytics, customer insights, enterprise applications
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Web applications are often the most vulnerable part of a company’s infrastructure and yet are typically given direct paths to the internet, thus leaving these vulnerabilities exposed. IBM commissioned Tolly to evaluate IBM Security Access Manager for its Web protection effectiveness and performance as well as its identity federation, risk management and mobile one-time password capabilities. Tolly found that IBM Security Access Manager provided effective, high-performance threat protection while conveniently providing identity federation features and flexible risk-based access options.
Tags : 
access manager, identity federation, risk management, authentication capabilities, threat protection
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
In the fast moving web environment, where hackers frequently change their tactics, a defense-in-depth strategy of deploying the ProxySG in conjunction with an NGFW is essential for providing optimal protection. The ProxySG is engineered to withstand evasion techniques, making it a perfect complement to your NGFW. Its leading web-proxy technology identifies and blocks malicious web content, and its open architecture allows integration with best-of-breed products for an enhanced security posture. These top 10 advantages represent just a few of the reasons why SWG and NGFW technologies are complementary in nature and why enterprises should implement them together for a layered defense against advanced attacks and targeted threats.
Tags : 
proxy deployment, firewall, threat detection, threat protection
    
Symantec
Published By: Symantec.cloud     Published Date: Apr 27, 2010
We surveyed 273 managers in IT & our research reveals the Top 10 Web Security Threats; And How to Solve Them.
Tags : 
messagelabs symantec, web security threat, malware, bandwidth, bandwidth management
    
Symantec.cloud
Published By: MessageLabs Ltd.     Published Date: Jun 10, 2010
Based on a survey of 273 IT managers, we reveal the top ten web threats to business and outline a solution that uses MessageLabs Security Safeguard, why they matter and how to protect your business from each of them.
Tags : 
messagelabs symantec, web threat, security safeguard, malware, web security services
    
MessageLabs Ltd.
Published By: Thawte     Published Date: Oct 05, 2015
When it comes to protecting your website and customers from attack, knowledge is your best weapon. But with ever-changing threats and ever-evolving defenses comes ever-growing potential for common misconception. To help you cut through the confusion, view our essential guide now and separate website security myth from reality.
Tags : 
website security myths, customer protection, ever-changing threats, website security, security
    
Thawte
Published By: Webroot UK     Published Date: Jan 30, 2014
In 2014, hackers and cyber thieves will continue to change their tactics, using new exploits to infect systems and steal data. This Executive Brief discusses the top five malware trends to keep an eye out for in 2014 and how Webroot SecureAnywhere can provide the endpoint protection that companies will need to be safe in 2014.
Tags : 
webroot, security, esecurity, cyber threat, malware, malware trends, breaches, safeguard, data protection, ddos attacks, web gateway security, online threats, virus, spyware protection, anti-phishing protection, it management
    
Webroot UK
Published By: Akamai Technologies     Published Date: Dec 07, 2016
Many industry experts advise financial services institutions (FSIs) to embrace digital transformation. At the heart of that mandate is the need to satisfy rising customer expectations for fast, secure, always-on services delivered seamlessly across all channels and devices. While it’s important to harness the digital technologies today’s customers turn to — especially when it comes to engaging the millennial generation — FSIs need to optimize web and mobile performance to deliver exceptional end-user experiences. Here are eight considerations. Get started on your journey – download the whitepaper today
Tags : 
online banking service, online banking services, online banking application, online banking applications, online banking app, online banking apps, financial services it, online banking solutions, digital transformation, digital disruption, infrastructure, cloud security, ddos, security breaches, web application security, cyber threats, cyber security, cloud applications
    
Akamai Technologies
Published By: Symantec.cloud     Published Date: Aug 10, 2010
This paper raises real challenges for IT managers who have to protect the business against malware, keep internet bandwidth available for legitimate business needs and enforce acceptable use policies for the human resource department.
Tags : 
messagelabs, security safeguard, symantec hosted services, web threat, malware, employee monitoring, productivity
    
Symantec.cloud
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.