M86 SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for company name: M86 Security returned the following results.
RSS What is RSS?
Related Categories

 •   Anti-Virus Solutions
 •   Security Monitoring
 •   Data Security
 •   Application Security
 •   E-Mail Management
 •   Fraud Detection & Prevention
 •   Anti-Spyware
 •   Web Transaction Control Gateways
 •   Intrusion Prevention Solutions
 •   Endpoint Security

Advertisement

ALL RESULTS
1 - 13 of 13

Android security settings and controls for Android enterprise security by M86 Security

February 01, 2012 - (Free Research)
With all the security gaps in the Android platform, is it possible to achieve enterprise-level security? In this resource, gain expert insight into enabling effective Android enterprise security. View now to explore Android security settings and control, battling Android malware, and much more. 
(EGUIDE) READ ABSTRACT |

Modern Cyber Threats and Government Agencies by M86 Security

November 18, 2011 - (Free Research)
View this paper to explore how and why targeted attacks work, modern cyber attacks in the real world, the rise in public sector attacks, Web and email security solutions and more. 
(WHITE PAPER) READ ABSTRACT |

Lowering IT Costs: How to Reduce the Need for Desktop Remediation and Shave Millions off IT Expenses by M86 Security

November 18, 2011 - (Free Research)
The average malware attack can cause significant damage, forcing organizations to exceed their budgets. In this paper, gain a better understanding of how much the next-generation threats impact remediation costs and discover a solution to minimize those cost, while maximizing efficiency. 
(WHITE PAPER) READ ABSTRACT |

How to prevent phishing attacks: User awareness and training by M86 Security

October 26, 2011 - (Free Research)
This expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing. 
(EGUIDE) READ ABSTRACT |

E-Guide: How antivirus software works: Virus detection techniques by M86 Security

October 05, 2011 - (Free Research)
Antivirus software uses several different virus detection techniques, as described in this tip by expert Lenny Zeltser. 
(EGUIDE) READ ABSTRACT |

How to Avoid Targeted Web and Email Attacks by M86 Security

July 19, 2011 - (Free Research)
This white paper uncovers the dangers of targeted attacks, how and why cybercriminals have been so successful at exploiting traditional security technologies, and what your company can do to avoid becoming the next victim of a targeted attack. 
(WHITE PAPER) READ ABSTRACT |

How to collect Windows Event logs to detect a targeted attack by M86 Security

July 13, 2011 - (Free Research)
Targeted attacks are growing, and eventually your enterprise will be a target. In this e-guide, expert Richard Bejtlich covers how to collect Windows Event logs to detect an intrusion. 
(EGUIDE) READ ABSTRACT |

Technical guide on Web Security Gateways by M86 Security

April 28, 2011 - (Free Research)
Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats. 
(EBOOK)

Is Your Acceptable Use Policy Social Media-proof? by M86 Security

February 11, 2011 - (Free Research)
This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization. It provides guidance on how to update an AUP to accommodate the increasing popularity and use of social media in the business environment. 
(WHITE PAPER) READ ABSTRACT |

Data Loss Prevention: Email and Web Gateway Best Practices by M86 Security

October 07, 2010 - (Free Research)
This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them. Read this paper to learn more about single-channel DLP at the email and Web gateways. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: How to build a toolset to avoid Web 2.0 security issues by M86 Security

September 17, 2010 - (Free Research)
Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network. 
(EGUIDE) READ ABSTRACT |

Web Exploits: There’s an App for That by M86 Security

May 27, 2010 - (Free Research)
The main motivation driving the cybercrime industry is the possibility of monetary gain. Savvy, knowledgeable individuals with skills in developing Web applications and basic knowledge in hacking have filled a niche by creating exploit kits. Read this white paper to learn the basics about exploit kits, what they do, and why the bad guys use them. 
(WHITE PAPER) READ ABSTRACT |

Today’s Blended Threats: Identifying and Stopping Web-based Email Attacks by M86 Security

October 30, 2009 - (Free Research)
Organizations of all sizes continue to be challenged by increasingly sophisticated security threats. Attackers are constantly finding new ways to access valuable data. They use various tools and methods to evade traditional security products. This brief white paper presents a new security solution that can stop new threats quickly and effectively. 
(WHITE PAPER) READ ABSTRACT |

1 - 13 of 13

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts