malware discovery

Results 1 - 4 of 4Sort Results By: Published Date | Title | Company Name
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
Hardly a day goes by without the discovery of a new cyber threat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks?
Tags : 
cyber threat, cyber defenses, security intelligence, malware discovery, security, it management, knowledge management, business intelligence, business management
    
Kaspersky Lab
Published By: Mimecast     Published Date: Sep 25, 2008
Email is one of the most critical applications in use in business today: it is embedded in many business workflows, it is used by engineers to inform them of infrastructure issues and it is used to communicate with customers and business partners. In short, the modern organization has email at the heart of its communications and business processes. This makes it critical to minimize both the downtime and loss of email upon the outset of a business continuity event.
Tags : 
mimecast, saas, malware, workflows, risk management, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance, application security, email security, security management, mobile workers, business process automation, business process management, collaboration, collaborative commerce, messaging
    
Mimecast
Published By: Trend Micro SPN     Published Date: May 15, 2009
Measuring the effectiveness of your security infrastructure is key to any enterprise as threats change on a minute by minute basis. See an example of the report you would receive following a Trend Micro Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, threat discovery, worms, trojans, infected, recovering, instant messaging, anti spam, anti spyware, anti virus
    
Trend Micro SPN
Published By: Trend Micro SPN     Published Date: Nov 24, 2009
How do you measure security effectiveness? Conventional security solutions may appear to be holding back targeted malware attacks but this eBook shows you how to check the performance of your current infrastructure. Whether you are 'secure', 'infected' or 'recovering', you can benefit from a Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, infected, recovering, instant messaging, anti spam, anti spyware, anti virus, application security, email security, internet security
    
Trend Micro SPN
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.