HIT Consultant Insightful coverage of healthcare innovation
 

malware defense

Results 1 - 25 of 64Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Aug 11, 2017
Examine the business impact of malware, ransomware, and phishing, as well as the cost of the average data breach. Given the significant economic impact of these threats, understanding your financial exposure and employing a layered defense simply makes sense.
Tags : 
domain name system (dns), cloud security, threat protection, threat prevention, phishing, ransomware, security threats, malware
    
Akamai Technologies
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.
Tags : 
av defense, blue coat, web environment
    
Blue Coat Systems
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
Blue Coat Systems UK
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.
Tags : 
malware, delivery, protect, security, security solutions, networks, delivery networks, firewalls
    
Blue Coat Systems UK
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Ransomware is the fastest growing malware threat today. Utilize these security best practices and risk mitigation strategies to improve your overall security posture. Discover how to: • Reduce risk of ransomware • Get immediate protection against attacks • Prevent malware from spreading laterally To find out how to keep your business protected, we recommend Ransomware Defense For Dummies.
Tags : 
    
Cisco Umbrella EMEA
Published By: IBM     Published Date: Jul 26, 2017
The headlines are ablaze with the latest stories of cyberattacks and data breaches. New malware and viruses are revealed nearly every day. The modern cyberthreat evolves on a daily basis, always seeming to stay one step ahead of our most capable defenses. Every time there is a cyberattack, government agencies gather massive amounts of data. To keep pace with the continuously evolving landscape of cyberthreats, agencies are increasingly turning toward applying advanced data analytics to look at attack data and try to gain a deeper understanding of the nature of the attacks. Applying modern data analytics can help derive some defensive value from the data gathered in the aftermath of an attack, and ideally avert or mitigate the damage from any future attacks.
Tags : 
cyber attacks, data breach, advanced data analytics, malware
    
IBM
Published By: Blue Coat Systems     Published Date: Jul 07, 2011
This report examines the interactions of malware ecosystems, including user behavior, malware hosting sites and delivery networks and offers effective strategies to build better defenses.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
Blue Coat Systems
Published By: Lookout     Published Date: Aug 30, 2017
The modern organization has recognized the need to embrace mobile devices in the workplace. Some have fully implemented a bring-your-own-device (BYOD) program, while some have adopted a hybrid model of corporateowned and personally-enabled (COPE) devices. Many companies then choose to deploy an Enterprise Mobility Management (EMM) or Mobile Device Management (MDM) solution to enable some control of the mobile devices that access corporate data. For companies at this stage of mobility, security is the next critical layer. As Gartner states, “It is becoming increasingly important that security leaders look at the anti-malware, mobile threat defense solutions market, the products available and how they should be used."
Tags : 
enterprise mobility management, mobile device management, mobile security, mobile security solutions, mobile threats
    
Lookout
Published By: Sophos     Published Date: Mar 30, 2017
Threats are becoming increasingly dynamic, forcing organizations to defend against both traditional malware and new advanced attacks. As a result, more and more organizations are making the switch to next-gen endpoint protection from Sophos to get the proven, innovative defense they need. Read this solution brief to learn how Sophos Next-Gen Endpoint Protection delivers the protection, usability and support required to stay ahead of the constantly evolving threat landscape.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
Sophos
Published By: FireEye     Published Date: Apr 07, 2013
Malware activity has become so pervasive and attacks so successful at penetrating legacy defenses.
Tags : 
fireye, threat report, malware, threat landscape, legacy defenses, advanced persistent threat, apt
    
FireEye
Published By: Intel Security     Published Date: Oct 20, 2015
Explore and Understand the Seven Common Misconceptions Regarding Advanced Malware
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
Intel Security
Published By: Blue Coat     Published Date: Nov 23, 2015
When it comes to mobile malware threats, 2015 was a vicious year. While the threats are familiar suspects, their complexity and frequency are at an all-time high, including instances of ransomware and stealthy insertions via spyware on devices. Learn how infections start; simple ways to strengthen corporate defenses; and what the future of mobile threats looks like.
Tags : 
    
Blue Coat
Published By: Webroot UK     Published Date: Feb 04, 2013
Change is a constant in security. Threats are constantly changing to evade security defenses and to reach their objectives. Oddly, some categories of secuirty defenses have remained essentially unchanged. Anti-malware has been among the "unchanged".
Tags : 
anti-malware, security, defenses, unchanged, traditional, approach
    
Webroot UK
Published By: Palo Alto Networks     Published Date: Jul 05, 2012
Introducing WildFire: the Next-Generation of Malware Defense
Tags : 
palo alto, malware, wildfire
    
Palo Alto Networks
Published By: Websense     Published Date: Aug 23, 2012
Websense redefines the security gateway with advanced threat and data theft defenses.
Tags : 
security, malware analysis, websense, dlp, data loss prevention, threat defense
    
Websense
Published By: Entrust Datacard     Published Date: Jul 21, 2014
Certain types of diseases seem to only occur within certain national boundaries. Malware is not one of them. A formidable threat to enterprise security since the 1980s, cybercrime is a truly global phenomenon, and no business is safe from its reach.
Tags : 
history, malware, cybercrime, global, attacks, virtual threat, defense
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Certain types of diseases seem to only occur within certain national boundaries. Malware is not one of them. A formidable threat to enterprise security since the 1980s, cybercrime is a truly global phenomenon, and no business is safe from its reach. A brief look at the history of malware attacks reveals a degree of variance within the virtual threat landscape that makes pinpointing and stopping such attacks extremely difficult. As the historic virus examples illustrate, the malware problem has been and will continue to be a constant threat. Since an offensive line against cybercrime is not possible, enterprises need to prepare the best defense they can.
Tags : 
entrust, malware, history, threat, concern, virus, sql, stuxnet
    
Entrust Datacard
Published By: Citrix Systems     Published Date: Nov 10, 2014
Today, defending your organization’s web properties means more than just protecting a handful of enterprise web applications from advanced malware. Learn more on the complexity and challenges of defending against today’s modern threats and discover how Citrix NetScaler application delivery controller (ADC) is an ideal defense solution.
Tags : 
mobile, web properties, applications, infrastructure, network devices, performance, communicate, security
    
Citrix Systems
Published By: CDW     Published Date: Jun 10, 2013
Securing your network requires more than just new hardware and software. It’s abouta change in your organization’s culture to a more security-conscious environment. Your staff needs strong and diverse passwords.
Tags : 
cdw, external threats, malware, defense, internal threats, security
    
CDW
Published By: McAfee     Published Date: Feb 06, 2013
Windows 8 includes many new security features, such as secure password storage, secure boot functions, anti-malware defenses, and even enhanced reputation capabilities. Will these features be enough to mitigate risks to users and corporate networks?
Tags : 
windows 8 security, endpoint security, windows platform security, windows 2008, windows 2003, windows 7, windows vista, windows 2000
    
McAfee
Published By: McAfee EMEA     Published Date: Nov 15, 2017
When it comes to fighting modern malware, there is no “silver bullet” that can guard against every threat every time. That’s why McAfee takes a different approach. We combine multiple layers of advanced malware protection, detection, and correction technologies into a single endpoint defense fabric. To keep up with cyberthreat innovation, effective detection and analysis requires new state-of-the-art anti-malware technologies: Real Protect and Dynamic Application Containment, complemented by the McAfee® Advanced Threat Defense sandbox. Find out how these tools work together to systematically protect against the most dangerous malware threats.
Tags : 
malware, mcafee, cyber threat, technologies, innovation, analytics
    
McAfee EMEA
Published By: EMC Corporation     Published Date: Mar 20, 2014
Gain insight into the effects of the changing information security threat landscape. Learn RSA’s approach to identifying strategies and techniques to establish a good defense, the “kill chain” concept and how to detect and respond, and how to level the adversarial playing field
Tags : 
emc, security threats, malware threats, malware protection, kill chain, rsa, defense
    
EMC Corporation
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
Exploit Kits: Cybercrime's Growth Industry - Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular third-party applications installed on nearly every PC around the world. That is why patch management has become a critical layer in your malware defense.
Tags : 
threattrack, security, threat, track, information, admins, best, practices
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
South Staffordshire College: A U.K. college with 4 campuses, 4,000 students and 500 employees became frustrated with its Kaspersky antivirus and discovered that VIPRE proves robust malware defense doesn’t have to disrupt operations, slow down machines or be difficult to manage.
Tags : 
threattrack, security, threat, track, information, admins, best, practices
    
ThreatTrack Security
Published By: McAfee     Published Date: Jan 28, 2014
Modern malware defenses use layers of blacklisting and whitelisting, enhanced with real-time analysis and reputation data, to protect the endpoint computing stack.
Tags : 
blacklisting, whitelisting, malware, endpoint, mcafee global threat intelligence, epolicy orchestrator, byod
    
McAfee
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.