- Secure Cloud Networking
- Prevent Data Breaches with Stronger Email Security
- Adapting Qi-compliant wireless-power solutions to low-power wearable products
- Hybrid Will Be the New Normal for Next Generation Enterprise WAN
- The Hybrid Cloud Helps Midsize Companies Compete - Gaining Large Corporation Advantages at a Midsize Price
July 2012- The ways in which people are accustomed to using technology have always influenced and determined malware development and that trend will continue. With the significant growth in the use of mobile devices, malware developers have been working to make these platforms a viable entry point for malicious code infection.
Malware has changed considerably since the early PC viruses first introduced more than 25 years ago. Today, it evolves so quickly that many customers find it nearly impossible to stay ahead of the latest threat.
If the explosion in malware variants wasn't enough, sophisticated Client Side Attacks and Advanced Persistent Threats (APT's) target victims in ways that completely evade traditional security measures.
Current research suggests as much as 75% of new viruses are ...
The Blue Coat 2011 Mid-Year Security Report described the powerful tools that make malware delivery networks successful: dynamic web links that enable cybercrime to change out payload servers and avoid detection. Last year, the malware web delivery infrastructure was hacking into popular and trusted domains where cybercriminals can display lures beyond the reach of reputation filters and web category blocking.
With an eye on acceptable-use policies, the lures often inhabit categories such as Online ...
October 2011- This white paper provides a detailed discussion of objectives and methodologies for integrating CorreLog software with McAfee ePolicy Orchestrator (ePO) software. This document also describes the features and capabilities of the implementation, intended as a top-level description of how to add CorreLog's Security Information and Event Management (SIEM) functions with the ePO software system, to create a single unified system.
July 2011- No organization can afford to operate without an email security strategy. The risk landscape is constantly changing with new threats surfacing every day. This white paper looks at email security in small and medium businesses, the solutions available and what features SMBs cannot do without.
Findings of an inspection of over 100,000 endpoints across multiple enterprises confirmed some type of breaches in security and compliance. Typically, 10-35% of endpoints demonstrated some kind of security threat or compliance issue. The most notable findings of the 2010 study were a dramatic rise in unmanaged machines and miss-configured anti-virus software and other third-party agents.
September 2010- This white paper raises real challenges for IT managers who have to protect the business against malware, keep internet bandwidth available for legitimate business needs and enforce acceptable use policies for the human resource department. Managers everywhere must also find a balance between allowing reasonable personal internet use at work and maintaining productivity and concentration in the office.
September 2010- This white paper will discuss the history and progression of the modern Trojan attack. It will explore the methodology used by hackers in selecting a target and developing a compelling attack and will cite several examples of some successful targeted Trojans. Finally, this paper will look at the Symantec Hosted Services MessageLabs™ Complete Email Guard solution and how Symantec Hosted Services can help protect an organization against targeted Trojans in the future.
September 2010- This industry report covers the email gateway market. Gartner, Inc. positions Symantec in the Leaders quadrant in its 2010 Magic Quadrant for Secure Email Gateways (anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention). In this report, Gartner analysts note that, "The e-mail security market is very mature. Targeted phishing detection, outbound e-mail inspection, encryption and delivery form factor are the major differentiators." Please enter your contact information to view the complete Gartner Magic Quadrant for ...
April 2010- Couple the reality of IT staff resources stretched too thin with security threats that are increasingly sophisticated and destructive, and the corporate trend -- even at the low-end of SMB businesses -- toward relying on an experienced managed security services provider becomes clear. This Yankee Group paper describes why multiple security layers are needed to achieve comprehensive and cost-effective security solutions.
November 2009- The internet is now the number-one conduit for infecting users with malware. SophosLabs reports that in 2009, 23,500 new infected web pages are discovered every day. That’s one every four seconds or so, four times worse than what it was in the same period in 2008 . Malware authors are very successful with a popular method: compromising popular, high-traffic, legitimate sites in order to kick-start the infection process. Users visiting a hijacked site have no way of knowing ...
February 2008- This white paper presents market research from a survey of organizations that are using Google Apps Security and Compliance Solutions, as well as solutions offered by nine other leading vendors. The goal of this research was to determine how organizational decision-makers perceive the offerings with which they are most familiar, and to determine if there are quantifiable differences between Google’s solutions and those offered by the other vendors. The research found that with Google ...
November 2009- The archiving capabilities in Exchange 2010 are a good start, but they are more or less a first-generation offering that will not satisfy the needs of many organizations, particularly those in mixed environments. As a result, most organizations will still need the varied capabilities provided in third-party archiving solutions that will support Exchange 2010 and earlier versions of Exchange, as well as other mail and collaboration systems. This white paper has three primary goals: educate decision-makers about ...
November 2009- The Internet has created new opportunities for mischief and new challenges for managers. In the end, it comes down to choice. Where do you draw the line? How do you balance individual access with the overall protection and good of the business? What is the correct balance between monitoring and blocking? This white paper examines a Web security solution that gives companies the ability to monitor and enforce their Internet usage policies, bringing site monitoring ...
August 2009- Laws have been passed to more adequately secure private and sensitive information, many of them specifically requiring better email security. Secure your information exchange by acting on the essential tips provided in this whitepaper.
November 2009- With one new infected webpage discovered every 4.5 seconds, it is essential you have the three pillars of protection - revealed in this whitepaper - to defend your organization against the sophisticated web threats of today.
November 2009- Discover how you can leverage endpoint security and data protection to provide simplified cross-platform security, centralized management, and control of devices, apps, and network access.
Web-borne malware is now more common than malware that enters an organization through email. The number of Web sites discovered per day, that carry malware increased 400% in 2008. This drastic increase in infected sites can cause serious issues for your business. Organizations need to proactively protect their networks both by instituting acceptable usage policies for employee web usage as well as implementing a solution to combat these malware intrusions.
This report ...
October 2009- Protecting confidential data is serious business. Failure may result in fat fines and even jail time – not to mention damage to your brand. WatchGuard easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution.
July 2009- Take a look at the new XTM (extensible threat management) network security from WatchGuard. See the tangible benefits this new generation of security solutions offer. No hype – just concrete examples of XTM features and the advantages they deliver for you to evaluate against your current security.
September 2009- Malware-related data breaches have reached pandemic proportions as criminals discover that Internet crime is easy to commit, highly lucrative, and largely under-policed. With a few hundred dollars, a cyber criminal can begin a career of breaking into computers to steal identity and confidential data for sale to the highest bidder. The cyber crime economy is so robust that there is a vibrant market for professional malware toolkits available for $500 to $1,000 that come pre-configured with a ...
There has been a rapid rise in the use of web blended threats to exploit client browsers and operating systems. These can lead to infection by bots which can be controlled remotely. Eleven percent of the world’s computers are enmeshed in at least one botnet and 72% of corporate networks with more than 100 computers have an infection.
Obfuscated code and encrypted exploits are increasing in prevalence. The point of these exploits is to ...
June 2009- Extended Validation SSL delivers the acknowledged industry standard for the highest level of online identity assurance processes for SSL certificate issuance. Find out how the EV standard increases the visibility of authentication status through the use of a green address bar in the latest high security Web browsers.
April 2009- This whitepaper presents the latest trends in Internet usage at the workplace, the ways in which this usage affects companies' productivity, and the latest, most effective methods to fight informational threats through modern content-filtering solutions.
February 2009- Messaging, internal and Web-based threats are increasing in number and severity. Because the profit motive now drives spammers, hackers and other purveyors of malicious content, as well as the development of more sophisticated techniques to circumvent corporate defenses, organizations must continue to improve their defenses. Plus, organizations must protect against internal users from sending confidential content out of the organization through a variety of communication tools, whether this activity is intentional or accidental. The risks ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services