M86 Security Company SummaryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Summary
M86 Security

Overview: M86 Security is the largest provider of Secure Web Gateways and the largest independent provider of Web and e-mail content security in the world.

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by M86 Security.
Research offered by M86 Security

Android security settings and controls for Android enterprise security by M86 Security. February 01, 2012 - With all the security gaps in the Android platform, is it possible to achieve enterprise-level security? In this resource, gain expert insight into enabling effective Android enterprise security. View now to explore Android security settings and control, battling Android malware, and much more.

  View Android security settings and controls for Android enterprise security research abstract

Data Loss Prevention: Email and Web Gateway Best Practices by M86 Security. October 07, 2010 - This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them. Read this paper to learn more about single-channel DLP at the email and Web gateways.

  View Data Loss Prevention: Email and Web Gateway Best Practices research abstract

E-Guide: How antivirus software works: Virus detection techniques by M86 Security. October 05, 2011 - Antivirus software uses several different virus detection techniques, as described in this tip by expert Lenny Zeltser.

  View E-Guide: How antivirus software works: Virus detection techniques research abstract

E-Guide: How to build a toolset to avoid Web 2.0 security issues by M86 Security. September 17, 2010 - Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network.

  View E-Guide: How to build a toolset to avoid Web 2.0 security issues research abstract

How to Avoid Targeted Web and Email Attacks by M86 Security. July 19, 2011 - This white paper uncovers the dangers of targeted attacks, how and why cybercriminals have been so successful at exploiting traditional security technologies, and what your company can do to avoid becoming the next victim of a targeted attack.

  View How to Avoid Targeted Web and Email Attacks research abstract

How to collect Windows Event logs to detect a targeted attack by M86 Security. July 13, 2011 - Targeted attacks are growing, and eventually your enterprise will be a target. In this e-guide, expert Richard Bejtlich covers how to collect Windows Event logs to detect an intrusion.

  View How to collect Windows Event logs to detect a targeted attack research abstract

How to prevent phishing attacks: User awareness and training by M86 Security. October 26, 2011 - This expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing.

  View How to prevent phishing attacks: User awareness and training research abstract

Is Your Acceptable Use Policy Social Media-proof? by M86 Security. February 11, 2011 - This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization. It provides guidance on how to update an AUP to accommodate the increasing popularity and use of social media in the business environment.

  View Is Your Acceptable Use Policy Social Media-proof? research abstract

Lowering IT Costs: How to Reduce the Need for Desktop Remediation and Shave Millions off IT Expenses by M86 Security. November 18, 2011 - The average malware attack can cause significant damage, forcing organizations to exceed their budgets. In this paper, gain a better understanding of how much the next-generation threats impact remediation costs and discover a solution to minimize those cost, while maximizing efficiency.

  View Lowering IT Costs: How to Reduce the Need for Desktop Remediation and Shave Millions off IT Expenses research abstract

Modern Cyber Threats and Government Agencies by M86 Security. November 18, 2011 - View this paper to explore how and why targeted attacks work, modern cyber attacks in the real world, the rise in public sector attacks, Web and email security solutions and more.

  View Modern Cyber Threats and Government Agencies research abstract

Technical guide on Web Security Gateways by M86 Security. April 28, 2011 - Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.

  View Technical guide on Web Security Gateways research abstract

Today’s Blended Threats: Identifying and Stopping Web-based Email Attacks by M86 Security. October 30, 2009 - Organizations of all sizes continue to be challenged by increasingly sophisticated security threats. Attackers are constantly finding new ways to access valuable data. They use various tools and methods to evade traditional security products. This brief white paper presents a new security solution that can stop new threats quickly and effectively.

  View Today’s Blended Threats: Identifying and Stopping Web-based Email Attacks research abstract

Web Exploits: There’s an App for That by M86 Security. May 27, 2010 - The main motivation driving the cybercrime industry is the possibility of monetary gain. Savvy, knowledgeable individuals with skills in developing Web applications and basic knowledge in hacking have filled a niche by creating exploit kits. Read this white paper to learn the basics about exploit kits, what they do, and why the bad guys use them.

  View Web Exploits: There’s an App for That research abstract

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts