X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 malware detection


The Sum of All Malware Fears: Siemens on Stuxnet
When Stuxnet malware hit the mainstream media in September 2010, it all sounded like a plotline straight from a Tom Clancy thriller. After all, Stuxnet targeted

malware detection  the first attempt at malware for industry or infrastructure applications. And the experts say this may not be the last such attempt. Therefore, operating companies as well as system integrators now should be sensitized and should undertake measures to analyze their security situation. Security is not buyable as a single product or a technical feature. Security is a steadily ongoing process that links products, people, and processes. Do you anticipate copycat attempts to replicate some or all of

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Information Security RFI/RFP Template

Firewall System, Intrusion Detection System, Anti-Virus System, Virtual Private Network (VPN), Public Key Infrastructure (PKI), Enterprise Applications, Cryptographic Module  

Start Now

Documents related to » malware detection

Choosing a Solution for Web Filtering: Software, Appliance, Managed Service?


There are three types of web security solutions: software-based, appliance-based, and managed services. Each needs to be evaluated against several key buying criteria, including the accuracy of threat protection, ease of installation and use, and total cost of ownership (TCO). Learn about the benefits of each category, and how they deal with all manner of web-borne security threats, including inappropriate use of the Web.

malware detection   Read More

Building a Business Case for Enterprise Spyware Protection


It is sometimes difficult to quantify the scope of spyware problems within corporate environments. The least noticeable effect of spyware is to slow network and desktop processing by tiny increments. But even the slightest slowdown, multiplied across the enterprise, adds up to a serious bottom line impact in decreased automated processing and worker productivity.

malware detection   Read More

2008 Internet Security Trends: A Report on Emerging Attack Platforms for Spam, Viruses, and Malware


Just when malware design seemed to have reached a plateau, new and more complex attack techniques have now emerged. For a while, security controls designed to manage spam, viruses, and malware were working, but as a result of this success, the threats they protected against were forced to change. Learn about today’s key security trends and how you can fight against the sophisticated new generation of Internet threats.

malware detection   Read More

Mobility in Manufacturing—No More a “Nice to Have”


I have been recently engaged in interesting discussions and conversations with software vendors and users on the mobile adoption of enterprise resource planning (ERP) solutions, particularly in the manufacturing industry, and have gathered some insights on the potential challenges and benefits of mobile technologies for ERP systems for manufacturing, where mobility appears to be more of a

malware detection   Read More

Web Application Security: How to Minimize Prevalent Risk of Attacks


Vulnerabilities in Web applications are now the largest vector of enterprise security attacks. Attacks compromising sensitive data are often the result of “cross-site scripting,” “SQL injection,” and “buffer overflow.” As many companies have discovered, these attacks will evade traditional network defenses unless you take new precautions with automated detection. Learn more in this primer to Web application security.

malware detection   Read More

The Whys and Hows of a Security Vulnerability Assessment


TEC outlines the reasons for having a Security Vulnerability Assessment done, how a security vulnerability assessment is performed, what can be gained by enlisting the Security Vulnerability Assessment process, and what you should expect to see in a Security Vulnerability Assessment report. After all, the most important reason for having a Security Vulnerability Assessment performed is to enable corrective action. How can you know what to secure if you don't know what is insecure?

malware detection   Read More

Protect Yourself Against "Converged" Internet Threats


Find out how to protect yourself in the symantec white paper converged threats on the security landscape.

malware detection   Read More

Which is Best: Cloud-Based or on-Premise Web security?


As you'll discover in the Aberdeen report, Web Security in the Cloud: More Secure!

malware detection   Read More

Beyond Spam – Email Security in the Age of Blended Threats


Not all email security solutions are built to defend against emerging email threats. Regardless of whether someone is using a desktop, laptop, netbook, tablet or smartphone, an organization’s umbrella of security needs to protect any device connected to their networks and deliver real-time protection from the variety of threats to email infrastructures. Read this white paper to learn about the types of threats to email security in existence today, including botnets, phishing, malware, and smartphone attacks, and what to do about them.

malware detection   Read More

Problematic, Unloved, and Argumentative: What Is a Potentially Unwanted Application (PUA)?


Determining when to classify a program as being either unwanted or unsafe can be particularly challenging, because a researcher has to look not just at what a program does, but what the intent is behind it. Business, ethical, and legal questions come into play, too. Read this white paper to understand the difference between the outright threats posed by malware such as viruses and worms and those that are classified as being potentially a threat.

malware detection   Read More