April 2008- IBM features this presentation on security and the business of the security business. The lion’s share of security market is focused on software vulnerabilities, but there is more to risk than weak software, the company says.
April 2008- SANS Internet Storm Center uses the DShield distributed incident detection technology. ISC database receives over 10 million log lines daily from intrusion-detection systems run by volunteers worldwide. Thousands of system administrators send in additional observations and findings via e-mail and the Web. This service is free to the Internet community. SANS Internet Storm Center features this presentation.
Protect your servers, workstations and networks with security software that won’t slow you down.
Preventive antivirus and antispyware packages are “must haves” in today’s networking environments. No company from the smallest business with 10 users up to the largest enterprise with 100,000+ employees is immune from the security threats posed by rogue code – which include viruses, Trojans, bots, zombies, spyware, spam and blended malware. The threats have become more sophisticated, pervasive and pernicious ...
December 2008- Organizations need to take a holistic and integrated approach to protecting their laptops, desktops, and servers. Learn more about how managing endpoint protection from a single, unified console simplifies security administration and enables operational efficiencies, including centralized software and policy updates—and provides the most effective way to combat today’s sophisticated and stealthy threats.
Protecting the Perimeter is quickly becoming a critical point of protection for today’s business. Many fundamental business activities - marketing, advertising, customer support, research - are Web dependent. Making the Web the number one delivery method for malware which poses a significant security challenge to businesses of all sizes.
In this State of the Internet Security Webroot delivers the results of its survey of Web security decision makers in the US, UK, ...
Anonymous proxies are an unseen threat - a student's or employee's backdoor to malicious or productivity-sapping sites on the Internet. If your URL filtering solution relies on the old-school URL database/keyword approach, your ship is leaking and you may not see the holes.
With hundreds of new proxy sites created each day, traditional URL filtering just can't keep up, even when supplemented by standard keyword analysis. What follows is a primer on ...
October 2007- This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. In the space of two months, spammers have switched from image spam to using PDF, Excel and ZIP file attachments. By using these attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
April 2004- MicroWorld Winsock Layer (MWL) is a radical technology that fights viruses and other threats from a new perspective. Developed by MicroWorld Technologies Inc., MWL blocks threats at the Internet gateway itself and does not allow them to enter your system. This article discusses features of MWL and explains how it does its anti virus and content security tasks, efficiently and quietly.
July 2007- This whitepaper provides an introduction to Non Intrusive Learning Patterns. NILP is an advanced, next-generation technology that detects spam and phishing mails using unique algorithms. NILP carries a continuously updating database containing DNA imprints of millions of spam mails detected worldwide. Once the DNA imprints are checked, NILP reverses its learning by classifying GOOD (ham) mails, rather than using the traditional way of classifying BAD (spam) mails.
July 2007- MailScan 5 for SMTP Servers is the world’s most advanced antivirus, content security and mail-management solution at the mail gateway, for mail servers working on different operating systems and platforms like Windows, Unix, Linux, Novell and Solaris. Installed on a Windows machine, it comes with a built-in, multithreaded SMTP server and a POP3 downloader, and acts as a security gateway between your mail server and the Internet. At the mail gateway, MailScan for SMTP Servers ...
July 2007- One knows small businesses work on stringent standards of service and product delivery models adhering to tight deadlines, as client demands are always on the higher side. Business continuity is a vital factor for midsize organizations in retaining clientele and fostering relationships. Security breaches and virus infections in the internal network of organizations can be quite detrimental for business continuity, as they can bring down the entire network of an organization in a matter of ...
June 2007- EConceal Firewall is a comprehensive software firewall, designed to prevent unauthorized access to a computer or network connected to the Internet. It enforces a boundary between two or more networks by implementing default or user-defined Access Control policies. The software allows the user to choose the types of Internet access to be allowed and those which are a strict no-no. The user can set rules to control network access from and to their systems. The ...
June 2004- X-Spam for Exchange 2000-2003 is highly adaptive anti-spam software that protects the Microsoft Exchange 2000-2003 servers from spam. The software uses advanced regular expressions and meta tests to positively identify spam and block it. This white paper discusses spam, its impact on business, and also provides information on tools and techniques X-Spam uses to protect Exchange 2000-2003 servers.
April 2004- Linux is fast becoming popular and is being deployed in ever increasing numbers on mail servers, corporate networks and desktops. Till recently, systems running on Linux were relatively free from virus and other threats. But with the greater penetration of Linux operating systems, virus authors have begun to target them. This paper talks about threats faced by Linux mail servers and explains the recommended features that good anti-virus and anti-Spam software should have.
July 2003- This white paper provides information about how intelligent and extremely malignant viruses compromise your network and suggests an important feature that good anti-virus software should have to combat such threats.
January 2003- Spam is the vilest manifestation of e-mail abuse. This white paper provides information about Spam, losses caused by Spam, how Spam works, and suggests key features that a good Anti-Spam software should have.
January 2003- The Internet provides a window to our Universe, bringing its wonders to your desktop. There is unfortunately, its dark side, with harmful content that your child should not be exposed to. This white paper provides information about different types of threats your child faces every time it logs on to the Internet and suggests key features that good Parental Control software should have.
January 2003- Content Security refers to monitoring Internet access and e-mail activity in your network. This white paper provides information about Content Security, its need and recommends features that good Content Security software should have.
January 2008- This paper from Bulwark Systems explains corporate protection that starts at the Internet Gateway, the main entrance for viruses, malware and digital attacks. Antivirus for Web Server protects the data traffic of company handled via HTTP, HTTP over FTP or directly via FTP. It enables risk-free surfing and downloading without loss of performance and reliably prevents infected contents from being sent and received. Antivirus for Mail Server checks the complete incoming and outgoing SMTP data ...
January 2008- This paper from Hewlett-Packard describes about traditional methods of addressing viruses, worms and other malicious code depends on signatures and patches. That leaves systems vulnerable to previously unknown threats until protective code can be written and deployed. At a time when viruses spread more quickly than ever before, often generating paralyzing amounts of network traffic, this is a significant lapse. To protect themselves from the onslaught of traffic generated by computer viruses, many corporations shut ...
January 2008- This white paper outlines measures to protect self from virus outbreaks that happen before the virus signatures and are able to identify and contain a virus. The main idea is that what many viruses have in common is that they scan the network for other systems (using many different approaches) and try to propagate themselves where they can. By implementing a honeypot on the network that will answer the virus calls and stall them (by ...
January 2008- Multiple virus engines are desired to diminish time lag between virus outbreak and signature update. This white paper portrays the importance of response time, shows the response time differences between virus engines and explains why having multiple scanners at mail server level lessens the average response time and therefore the possibility of virus infection.
January 2008- Since the damaging effects of a virus go far beyond the moment of infection, the IT personnel are pulled into enterprise-wide clean-up efforts, and the company sees an immediate negative impact on system availability and employee productivity. People can defend against viruses - and prevent costly downtime - by ensuring that the systems are automatically patched against the latest security threats. Novell ZENworks Patch Management allows determining quickly what patches are right for the organization ...
January 2008- The goal of any intrusion detection, anti-virus, firewall or other security mechanism is not simply to stop attacks, but to protect a computing resource so that the resource can continue to perform its function. This paper presents a model of computing resources and of how the loss or degradation of resources impacts the ability of a system to complete its mission. The model is based on ""anytime algorithms"", which relate time to some measure of ...
January 2008- A third of small-sized businesses and mid-sized businesses have suffered at least some disruption due to security issues. Just as threatening are business losses caused by compromised data integrity or privacy - as well as disasters and accidents beyond anyones control. This paper published by Computer Associates (CA) describes the dangers business faces as well as the techniques that can help one mitigate or even eliminate them. Because of the Internet, email and instant ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services