Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > Security Management

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Security Management

Security Management: In network management, the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many subfunctions, such as creating, deleting, and controlling security services and mechanisms.
Results 226 - 250 of 884Sort Results By: Published Date | Title | Company Name
Webinar Published By: ESET     Published Date: Sep 07, 2011
Selecting an antivirus for your small or medium business that won't slow you down.
Tags : 
eset, antivirus, security, smb, protection
    
ESET
White Paper Published By: ESET     Published Date: Sep 07, 2011
In this report, we investigate the implementation details of the malware and the ways in which it is distributed, and consider the cybercriminals' objectives.
Tags : 
eset, tdl, x64, cybercriminal, cybercrime
    
ESET
White Paper Published By: ESET     Published Date: Sep 07, 2011
This paper gives some examples of "potentially unwanted" and "potentially unsafe" applications, explaining how they differ from out-and-out malware.
Tags : 
eset, pua, potentially unwated application, software, unsafe
    
ESET
White Paper Published By: ESET     Published Date: Sep 07, 2011
A lengthy analysis that considers many of these questions, as well as discussing some of the characteristics of this fascinating and multi-faceted malicious code.
Tags : 
eset, virus, scada, plcs, stuxnet
    
ESET
White Paper Published By: ESET     Published Date: Sep 07, 2011
Another look at what our Research team at ESET, LLC came up with at the end of 2008 for a "top 10 things that people can do to protect themselves against malicious activity." Updated with more recent material from other members of ESET's research teams across the globe.
Tags : 
eset, cyberbullets, autorun, administrative priveleges, password
    
ESET
Webinar Published By: ESET     Published Date: Jun 20, 2011
Trusted experts in endpoint security solutions. Learn more today!
Tags : 
cloud computing, endpoint security, evolution, google, hype
    
ESET
Free Offer Published By: ESET     Published Date: Jun 08, 2011
ESET NOD32 Antivirus 4, ESET's Business Solution offers complete server-to-endpoint protection. Request a free trial today.
Tags : 
eset, free trial, nod32 antivirus 4, antivirus, malware
    
ESET
White Paper Published By: ESET     Published Date: Feb 17, 2010
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology.
Tags : 
eset, endpoint security, networkwide platform, integrated security management, heuristic scanning
    
ESET
White Paper Published By: ESET     Published Date: Feb 17, 2010
Analysis of ESET's ThreatSense.Net®, a sophisticated malware reporting and tracking system, shows that the highest number of detections this month, with almost 9.90%, was the Win32/Conficker class of threat.
Tags : 
eset, threats, malware reporting, tracking system, win32/conficker
    
ESET
White Paper Published By: ESET     Published Date: Feb 17, 2010
View this ESET Monthly UK threat report to find out the top computer threats in the UK.
Tags : 
eset, computer threats, threatsense.net, virus lab, malware
    
ESET
White Paper Published By: ESET     Published Date: Feb 17, 2010
This paper is designed to provide a basic understanding of what heuristics are and how they are used in the anti-malware industry.
Tags : 
eset, teaching heuristics, anti-malware, encryption, polymorphism
    
ESET
White Paper Published By: ESET     Published Date: Feb 11, 2010
This document combines the thoughts of both Research teams in ESET Latin America and ESET, LLC into a single paper, proposing a comprehensive vision of how the threatscape is likely to evolve in 2010.
Tags : 
eset, cybercrime, security, threat, crimeware
    
ESET
White Paper Published By: ESET     Published Date: Feb 11, 2010
Why all the hype? Is cyberwarfare really something enterprise information security professionals should be concerned about? It's hard to know what the next cyber crisis will be, but here are a few best practices that enterprise security teams should consider to avoid becoming victims.
Tags : 
eset, cyberwarfare, threat, enterprise information security, botnet
    
ESET
White Paper Published By: ESET     Published Date: Jan 21, 2010
3rd International Conference on Cybercrime Forensics Education & Training. What is the information that the end-user or end-site really needs to know about an incoming threat?
Tags : 
eset, internet security, cybercrime, threat, malware
    
ESET
White Paper Published By: ESET     Published Date: Jan 21, 2010
Bots and botnets suck, so what better teaching aid to help people understand them than a vacuum cleaner? It can be extremely challenging to attempt to explain technical concepts to non-technical people. There are two goals for this presentation. Click on this white paper to read about it.
Tags : 
eset, internet security, bots, botnets, national cybersecurity alliance
    
ESET
White Paper Published By: ESET     Published Date: Jan 08, 2010
This report provides a report of the Top Computer Threats in the United Kingdom.
Tags : 
eset, monthly threat report, top computer threat, security, anti spam
    
ESET
White Paper Published By: ESET     Published Date: Oct 07, 2009
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology. The threat landscape facing businesses has evolved significantly, and corporations are looking for security products that can protect against known threats and prepare for future attackers in a simple-to-use architecture.
Tags : 
eset, security, threatsense, malware, threat trends
    
ESET
Webinar Published By: ESET, LLC.     Published Date: Oct 27, 2011
Get the information you need to make the right decision through this presentation. Register for the "Finding the Right Antivirus Solution e-Kit" to watch this webcast to get answers to your questions around effectiveness, performance, environmental fit and usage, management efficiency, and more.
Tags : 
eset, technology, security, internet security, anti virus
    
ESET, LLC.
White Paper Published By: ESET, LLC.     Published Date: Oct 27, 2011
If you're looking to evaluate antivirus software based on its price, you're missing the larger picture. You need an antivirus solution that will work with today's complicated infrastructures that include virtualization, you need proactive protection from malware and you need an antivirus solution that won't rob your employees of productivity. Register for the "Finding the Right Antivirus Solution e-Kit" to better understand what goes into the process of evaluating antivirus software.
Tags : 
eset, technology, security, anti virus, internet security
    
ESET, LLC.
White Paper Published By: ESET, LLC.     Published Date: Sep 21, 2011
This report presents a comparative analysis on the performance and usability of 7 security solutions from some of the world's largest security vendors
Tags : 
eset, smb, antivirus software, malware, it professional
    
ESET, LLC.
White Paper Published By: ESET, LLC.     Published Date: May 16, 2011
Just recently a very stereotypical 419 was put together, using the Libyan crisis as bait and "government funds" as hook. Yep, every time a dictator is deposed or dies, someone seizes the opportunity to offer his fortune. Read this report for details.
Tags : 
eset, global threat report, april 2011, 419, scam
    
ESET, LLC.
Webinar Published By: ESET, LLC.     Published Date: May 16, 2011
Trends such as mobility, Web 2.0, and consumerization are shattering traditional notions of IT control. As a result, IT security organizations are struggling to defend against a more formidable hacker adversary at a time when they have less visibility and control over their IT environment. As part of our Cybersecurity Masters webinar series, ESET would like to invite you to attend these expert presentations by Forrester and ESET.
Tags : 
eset, cybersecurity webinar, security manager, it security, anti spam
    
ESET, LLC.
White Paper Published By: ESET, LLC.     Published Date: Apr 27, 2011
Global Threat Trends is a monthly report created by ESET that includes a review of the current events in the world of information security and the top ten threats of the month.
Tags : 
eset, blackhat japanning, global threat report, david harley, urbanschrott
    
ESET, LLC.
White Paper Published By: ESET, LLC.     Published Date: Jan 18, 2011
Download this Tech Brief to learn the five common complaints IT professionals have with antivirus software and how you can find software that does the job right.
Tags : 
eset, antivirus software, malware, it professional, security
    
ESET, LLC.
White Paper Published By: F5 Networks Inc     Published Date: Jan 03, 2014
Today, the shift to a cloud-based enterprise IT architecture is a foregone conclusion for a variety of organizations. As a result, cloud-based security has become a top priority. Read this whitepaper to learn about the challenges of cloud-based security and identity and access management as well as how your business can overcome these challenges with best-in-class solutions.
Tags : 
idc, cloud, cloud federation, identity and access management, iam
    
F5 Networks Inc
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search