Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

malware protection

Results 51 - 75 of 163Sort Results By: Published Date | Title | Company Name
Published By: GFI Software     Published Date: Feb 24, 2012
During this webcast, GFI Senior Threat Researcher Chris Boyd discussed:How to identify botnets in your systems, how to remediate botnet malware, how to maximize protection against botnets and how to educate users to prevent infections.
Tags : 
gfi software, technology, security, application security, anti virus, intrusion detection
    
GFI Software
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally. The paper explains that no manually handling of files, such as with USB drives, is unnecessary when you set up a secure network architecture using five zones of protection. You can transfer files to and from your network around the globe, and know the data and the network are secure, automatically scanning files to block dangerous data while allowing "clean" data into the network. The paper notes several reasons why it matters that data is secure while remaining accessible.
Tags : 
viruses, malware, hackers, leaks, supply chain interruptions, stuxnet, scada, usb
    
Globalscape
Published By: HP & Intel     Published Date: Sep 18, 2012
3rd generation Intel Core vPro processors' built-in security technologies deliver and protect business clients where current technologies cannot reach.
Tags : 
intel, security, it threats, threat management, malware, data loss prevention, identity protection
    
HP & Intel
Published By: IBM     Published Date: Nov 04, 2014
Cybercrime prevention needs to reach beyond fraud prevention. Organizations also need to consider deployment costs, management complexity, impact to customers and regulatory compliance. This document examines seven best practices for achieving effective, sustainable cybercrime prevention.
Tags : 
threat prevention, cybercrime, it security, malware protection
    
IBM
Published By: IBM     Published Date: Mar 11, 2015
The primary approaches used to fight advanced threats over the past several years simply aren’t effective. Traditional methods such as user education, vulnerability patching, and malware detection have failed to protect enterprises against the current threat landscape. Attackers continuously develop sophisticated tactics and evasion techniques to bypass the latest protection methods, requiring the security industry to find a different approach to malware protection. Trusteer has pioneered a new cybercrime prevention approach that provides unparalleled protection against spear-phishing, drive-by downloads and advanced, information-stealing malware.
Tags : 
ibm, malware detection, cybercrime prevention, it security solutions, security, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection.
Tags : 
malware protection, ibm, network security, it security, application security
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others.
Tags : 
ibm, computer security, network security, malware protection, network security, security organization
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
Trusteer Apex delivers a new approach to advanced malware protection - Stateful Application Control. By understanding what applications are doing and why, the software can help protect against the latest advanced malware attacks without increasing IT overhead or disrupting end users.
Tags : 
ibm, threat, data, security, trusteer apex, malware protection, stateful application control, cybercriminal
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
IBM offers insights to CIOs regarding transforming the security organization into five core functional areas. This paper focuses on how to respond to the inevitable incident.
Tags : 
ibm, cio, security, data, cybercriminal, malware protection, it management
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
Trusteer Apex delivers a new approach to advanced malware protection - Stateful Application Control.
Tags : 
ibm, threat, trusteer apex, malware, application, networking, security
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
We are pleased to present the findings of The State of Mobile Application Insecurity sponsored by IBM. The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace. Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations.
Tags : 
(delete)mobile application, malware protection, mobile security, application security, proprietary software, open source software, cloud services, source code testing
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
In today’s highly digital world, many users and employees are accessing information from multiple devices and from many locations. Enterprise mobile management tools are becoming a must have for most businesses in order to deliver an optimal user experience. The IBM MaaS360 suite allows for a robust app development platform where you can increase portability and interoperability to enable and support every mobile user in your organization. Download this e-book to see how you can create the best mobile environment for your users and employees. All of the Enterprise Mobile Management tools and services needed to deliver the optimal user experience to every user, wherever they are, whatever app they are using, and whenever they need resources, are well-integrated into the MaaS360 suite from IBM.
Tags : 
enterprise management, mobile management, organization optimization, security management, malware protection, data protection, bug prevention, information management
    
IBM
Published By: IBM     Published Date: May 09, 2017
This eBook takes you on a journey to outthink content chaos and discover how your industry can gain real value from your business content. Read how industry leaders are reflecting on the important challenges they face, and how they are finding innovative ways to collaborate and extract value from all forms of content to outpace those obstacles. Learn how cognitive and cloud-based Enterprise Content Management, or ECM, can help you protect your content while gaining a competitive advantage from it, improving business performance and ROI.
Tags : 
enterprise management, organization optimization, security management, malware protection, data protection, bug prevention, information management
    
IBM
Published By: IBM     Published Date: Jun 22, 2017
Security threats are very real, and the stakes are higher than ever. Each day, tens of thousands of malware variants are created, with new classes of threats continually added and improved upon. Savvy attackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and social media—in fact, the intersection of these technologies provides fertile new ground for threats and malware. Today’s attacks are often not random, but targeted for maximum financial gain and impact. Rogue individuals and groups are constantly innovating new ways to attack organizations’ most valuable assets. As a result, traditional methods of dealing with threats are no longer enough. Organizations need more threat intelligence than ever before in order to effectively protect themselves.
Tags : 
cyber security, global threat intelligence, malware prevention, cyber threat, protection
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : 
malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : 
it security, malware, malware protection, virus prevention, ibm, threat intelligence
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
These days, fraudsters have it easier than ever. The volume of devices commonly in use and the numbers of applications and websites accessed daily have grown so large so fast that organizations can be overwhelmed in trying to protect their resources and their users. The result? Innocent—but sometimes devastating—errors. An organization may deploy only partial measures to protect against threats. And users may actively work around protection to avoid cumbersome security procedures.
Tags : 
malware detection, fraud protection technology, user behavior, threat intelligence, fraud indicators
    
IBM
Published By: IBM     Published Date: Jun 05, 2018
System vulnerabilities, ransomware, malware, intrusions, and other malicious activities are on the rise, showing that today’s cybersecurity professionals are hard-pressed to keep enterprises secure. Although threats are growing in sophistication and attack vectors are expanding, many of the intrusions and cyber attacks happening today are simply a result of improper protections being put in place, systems going unpatched, or weak security policies. While much of the blame is being placed on cybersecurity professionals, the real blame should often be placed upon the tools and policies that many of those professionals have come to trust and the complexity that comes with them.
Tags : 
    
IBM
Published By: IBM     Published Date: Jun 06, 2018
System vulnerabilities, ransomware, malware, intrusions, and other malicious activities are on the rise, showing that today’s cybersecurity professionals are hard-pressed to keep enterprises secure. Although threats are growing in sophistication and attack vectors are expanding, many of the intrusions and cyber attacks happening today are simply a result of improper protections being put in place, systems going unpatched, or weak security policies. While much of the blame is being placed on cybersecurity professionals, the real blame should often be placed upon the tools and policies that many of those professionals have come to trust and the complexity that comes with them.
Tags : 
    
IBM
Published By: Infoblox     Published Date: Sep 04, 2013
Press headlines are filled by reports of malware attacks. Malware attacks, once the reserve of amateurs largely for amusement, are now launched by a number of entities. Today, a malware attack can literally come from anywhere in the world and can impact even the largest organization.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Published By: Infoblox     Published Date: Sep 04, 2013
Security challenges, costs & solutions for IT practitioners
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Published By: Infoblox     Published Date: Nov 07, 2013
According to the Ponemon Institute, the annual cost of malware breaches averaged $8.4 million. Read this white paper to gain insights into critical information to safeguard against DNS security threats and disrupt malware communications to your DNS servers.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Published By: Infoblox     Published Date: Sep 09, 2014
Stories about devastating cyberattacks are plaguing the news. Why? The DNS protocol is easy to exploit. See your network the way hackers do—as an easy target. Learn how you can effectively secure your DNS infrastructure today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Published By: Infoblox     Published Date: Sep 09, 2014
DNS is a key part of enterprise networks but increasingly targeted by hackers. Traditional security measures such as next-generation firewalls or secure web gateways won’t shield your infrastructure from attacks. Learn how to protect your DNS today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Published By: Infoblox     Published Date: Sep 09, 2014
An integrated DNS architecture is needed in today’s networking landscape. Designing a secure DNS architecture requires more than increased bandwidth and QPS. Learn how to build a secure and scalable DNS solution to ensure network availability.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.