Information Security Research Library

Powered by Bitpipe.com

SpywareResearch

  • Combatting APTs with a Defense-in-Depth Security Approach

    Sponsored by: CDW Corporation

    This informative white paper contains critical information on why a defense-in-depth security approach has proven effective in protecting organizations' sensitive data from APTs.

  • Cybercrime: I Spy

    Sponsored by: SearchCIO.com

    This clasroom features expert advice on how to strategically identify and eradicate spyware, as well as the measures CIOs need to take to protect employees' and customers' digital identities.

  • Global Risks 2014

    Sponsored by: ComputerWeekly.com

    Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.

  • Threat Management: Devising a new strategy to tackle today's cyberattacks

    Sponsored by: SearchSecurity.com

    This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.

  • Ballarat Grammar Secures BYOD with HP Sentinel SDN

    Sponsored by: Hewlett-Packard Company

    In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.

  • Antivirus Evaluation Guide

    Sponsored by: Threat Track Security

    In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.

  • 2012 - Endpoint Security Best Practices Survey

    Sponsored by: Symantec Corporation

    Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.

  • Strategies for boosting your practice’s information immunity

    Sponsored by: GFI LanGuard

    According to a 2011 patient privacy and data security study, 96 percent of health-care providers had at least one data breach during the previous two years. Consult this informative white paper to learn more about external threats and internal challenges of the evolving enterprise.

  • Fast and Effective Endpoint Security for Business

    Sponsored by: ESET

    This white paper demonstrates how, by combining powerful management tools, ease of use for end users, impressive performance and state-of-the-art proactive threat detection, ESET NOD32 Antivirus is the most effective way to protect your business’ valuable data assets while ensuring regulatory compliance.

  • Trend Micro Proven #1: Smart Protection Network powers Trend Micro Corporate endpoint solutions to top rankings

    Sponsored by: Trend Micro, Inc.

    3.5 new security threats emerge every second and most come from the web. That's why current methods of testing anti-malware on offline PCs and endpoints don't provide the best possible defense. Learn about an approach that tests for threats at multiple layers for comprehensive protection.

  • Magic Quadrant for Mobile Data Protection

    Sponsored by: Sophos, Inc.

    This Magic Quadrant is a snapshot of the overall market that ranks vendors against each other, according to competitive criteria. Vendors in any quadrant, as well as those not ranked on the Magic Quadrant, may be appropriate for your enterprise's needs and budget.

  • Spam 2011: Protection Against Evolving Threats

    Sponsored by: Proofpoint, Inc.

    The very best anti-spam solutions today de­liver 95% effectiveness. Unfortunately, that’s not good enough. Check out this white paper to see how enterprises can defend themselves with a comprehensive and adaptive anti-spam solution such as the Proofpoint Protection Suite.

  • Solution Brief: Top 10 Ways Shavlik Simplifies Patch Management

    Sponsored by: Shavlik Technologies

    Security vulnerabilities are uncovered on a daily basis, and managing the security patches that address them can be an endless and often complicated task for every network administrator. Without the right automated solutions, patch management can be a tedious and herculean task. Read this white paper from Shavlik to learn more.

  • Worry-Free Business Security Standard

    Sponsored by: Trend Micro, Inc.

    Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.

  • Threat Containment for Facebook

    Sponsored by: BlueCoat

    This technical brief discusses multiple Blue Coat solutions to address malicious content control, enforce acceptable use policies, prevent sensitive information leakage and enhance user productivity on Facebook.

  • ESET: Threat Center

    Sponsored by: ESET

    IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.

  • McAfee Total Protection for Secure Business

    Sponsored by: Insight

    Medium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business.

  • Case Study: San Diego Gastroenterology Medical Associates

    Sponsored by: ESET

    Read this case to learn about one company's battle with virus protection and what they did to overcome it.

  • Threatsaurus: The A-Z of Computer and Data Security Threats

    Sponsored by: Sophos UK

    Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.

  • The Top Six Risks of Employee Internet Use and How to Stop Them

    Sponsored by: St. Bernard Software

    Due to the serious nature of many threats, the Internet use of even one unmonitored employee on a single unmanaged system can ravage a company’s internal network, irrevocably delete critical data, and ultimately ruin the company’s ability to conduct business. Read this white paper to learn how to protect your organization.

  • Pocket E-Guide: Data Breach Dangers -- Learn to How to Protect Data and Lower Security Spending

    Sponsored by: IBM

    Information security is important, but justifying increased security spending isn't. Even though important factors such as stock performance and customer loyalty are directly affected by security breaches. This E-Guide outlines three specific actions for your company to take in order to protect and promote brand trust by preventing data breaches.

  • Case Study: Panda Security Enables Gloucestershire NHS to Communicate Effectively and Safely

    Sponsored by: Panda Security

    Learn how Gloucestershire NHS was able to help 1700 client computers send and receive vital information safely and efficiently by installing Panda's Managed Office Protection Antivirus solution.

  • Emerging Threats: The Changing Face of Email

    Sponsored by: Kaspersky Lab

    More than three years after the infamous declaration from Microsoft's Bill Gates that "spam will be solved" in 2009, unsolicited junk mail continues to bombard email servers, dumping malicious attachments, phishing lures and spam advertising for fake pharmaceuticals.

  • Blue Coat WebFilter

    Sponsored by: BlueCoat

    Review this brief data sheet to learn how WebFilter helps prevent Internet attacks from spyware, phishing, peer-to-peer (P2P) traffic, viral content and more. WebFilter also includes Dynamic Real-Time Rating (DRTR), a patented technology that can instantly categorize Web sites when a user attempts to access them.

  • TechTalk: Stop Malware at the Web Gateway

    Sponsored by: BlueCoat

    Safeguarding your data from malware and other Web threats takes a layered approach. In this TechTalk webinar Blue Coat Technical Marketing Engineers will lead a discussion on how the Blue Coat ProxyAV works with the ProxySG to create a community-watch based security.

Browse by Report Type: Spyware White Papers | Spyware Multimedia | Spyware IT Downloads

See more topics related to: Spyware

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.