Overview: M86 Security is the largest provider of Secure Web Gateways and the largest independent provider of Web and e-mail content security in the world.
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by M86 Security.
Research offered by M86 Security
Data Loss Prevention: Email and Web Gateway Best Practices by M86 Security. October 07, 2010 - This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them. Read this paper to learn more about single-channel DLP at the email and Web gateways.
E-Guide: How antivirus software works: Virus detection techniques by M86 Security. October 05, 2011 - Antivirus software uses several different virus detection techniques, as described in this tip by expert Lenny Zeltser.
How to Avoid Targeted Web and Email Attacks by M86 Security. July 19, 2011 - This white paper uncovers the dangers of targeted attacks, how and why cybercriminals have been so successful at exploiting traditional security technologies, and what your company can do to avoid becoming the next victim of a targeted attack.
How to collect Windows Event logs to detect a targeted attack by M86 Security. July 13, 2011 - Targeted attacks are growing, and eventually your enterprise will be a target. In this e-guide, expert Richard Bejtlich covers how to collect Windows Event logs to detect an intrusion.
Is Your Acceptable Use Policy Social Media-proof? by M86 Security. February 11, 2011 - This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization. It provides guidance on how to update an AUP to accommodate the increasing popularity and use of social media in the business environment.
Lowering IT Costs: How to Reduce the Need for Desktop Remediation and Shave Millions off IT Expenses by M86 Security. November 18, 2011 - The average malware attack can cause significant damage, forcing organizations to exceed their budgets. In this paper, gain a better understanding of how much the next-generation threats impact remediation costs and discover a solution to minimize those cost, while maximizing efficiency.
Modern Cyber Threats and Government Agencies by M86 Security. November 18, 2011 - View this paper to explore how and why targeted attacks work, modern cyber attacks in the real world, the rise in public sector attacks, Web and email security solutions and more.
Today’s Blended Threats: Identifying and Stopping Web-based Email Attacks by M86 Security. October 30, 2009 - Organizations of all sizes continue to be challenged by increasingly sophisticated security threats. Attackers are constantly finding new ways to access valuable data. They use various tools and methods to evade traditional security products. This brief white paper presents a new security solution that can stop new threats quickly and effectively.
Web Exploits: There’s an App for That by M86 Security. May 27, 2010 - The main motivation driving the cybercrime industry is the possibility of monetary gain. Savvy, knowledgeable individuals with skills in developing Web applications and basic knowledge in hacking have filled a niche by creating exploit kits. Read this white paper to learn the basics about exploit kits, what they do, and why the bad guys use them.