• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

trend micro

Results 101 - 123 of 123Sort Results By: Published Date | Title | Company Name
By: BlackBerry Cylance     Published Date: Jul 02, 2018
Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was jointly developed to provide additive testing to the commodity antivirus protection tests currently produced by AV-TEST. CylancePROTECT® was tested against five competitor endpoint products from Kaspersky, McAfee, Sophos, Symantec, and Trend Micro. The tests were performed in December 2016 and January 2017. This report contains the results of four test cases. The primary goal was to show the detection and prevention capabilities of new and unknown malicious executables. Read more in the AV-TEST report.
Tags : 
cyber, threat, protection, av-test, cylance
    
BlackBerry Cylance
By: TrendMicro     Published Date: May 09, 2011
The most effective approach for fighting Web threats will employ multiple layers of protection and incorporate a range of protective measures. Download this paper to learn more.
Tags : 
trendmicro, trend micro, web threat, protection, internet security, security management, web service security, data protection
    
TrendMicro
By: TrendMicro     Published Date: May 09, 2011
The test doesn't just score how well a product can detect file-based threats (Infection Layer), but includes the ability to block the threat at its source (Exposure Layer) and detect/block the threat during execution (Dynamic Layer). Click here to see the results.
Tags : 
trendmicro, endpoint security, benchmark testing, av-test.org, internet security, security management, performance testing
    
TrendMicro
By: TrendMicro     Published Date: May 09, 2011
Download this paper to learn how the right endpoint security for virtual desktops will help your enterprise achieve cost and efficiency advantages from virtual desktops.
Tags : 
trendmicro, endpoint security, virtual desktop infrastructure, vdi, infrastructure, internet security, security management, desktop management
    
TrendMicro
By: TrendMicro     Published Date: May 09, 2011
This paper details the results of a benchmark test conducted between Trend Micro Deep Security, McAfee Total Protection for Endpoint and Symantec Endpoint Protection 11.0 in virtual environments.
Tags : 
trendmicro, anti-virus performance, vmware esx, virtual environments, mcafee total protection, symantec endpoint protection, anti spam, anti spyware, anti virus, application security, data protection
    
TrendMicro
By: Symantec     Published Date: Jul 11, 2017
In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos, Symantec, and Trend Micro — and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.
Tags : 
endpoint security, security, threat prevention, threat detection, security solution
    
Symantec
By: Datadog     Published Date: Feb 10, 2016
With thousands of companies using Datadog to track their infrastructure, we can see software trends emerging in real time. Today we're excited to share what we can see about true Docker adoption—no hype, just the facts.
Tags : 
datadog, docker, software trend, information technology, data management, kubernetes, container, microservices, docker swarm, infrastructure monitoring, container monitoring
    
Datadog
By: Trend Micro     Published Date: Oct 12, 2012
This white paper evaluates that "free" claim by examining the additional costs associated with deploying ForeFront and abandoning third party anti-malware solutions.
Tags : 
information security, licensing, software costs, trend micro, security, encryption, hacker detection, intrusion detection, intrusion prevention, data protection
    
Trend Micro
By: Trend Micro     Published Date: Oct 12, 2012
This special report, commissioned by Trend Micro, reinforces the security and operational cost savings of host-based virtual patching with the Deep Security and OfficeScan products
Tags : 
infomation security, software costs, trend micro, security, application security, internet security, security management, return on investment, total cost of ownership
    
Trend Micro
By: Trend Micro     Published Date: Oct 12, 2012
The consumerization and mobilization of enterprise IT is a real, irreversible, and unstoppable movement that needs immediate attention and innovative solutions.
Tags : 
information technology, security, trend micro, internet security, security management, security policies
    
Trend Micro
By: Trend Micro     Published Date: Oct 12, 2012
This free white paper provides a comprehensive overview of the threat as well as the advanced protection that enterprises can now use to protect their networks and information.
Tags : 
information technology, network, trend micro, security, network security, hacker detection, intrusion detection, intrusion prevention, network security appliance
    
Trend Micro
By: Trend Micro     Published Date: Oct 12, 2012
The security software you choose for virtual environments will have a significant impact on your organization's return on investment.
Tags : 
information technology, security, software, trend micro, internet security
    
Trend Micro
By: Trend Micro     Published Date: Oct 12, 2012
Download this free white paper to learn exactly what you need to avoid any trouble without sacrificing innovation or impeding the progress of your business today and in the future.
Tags : 
cloud computing, information security, information technology, trend micro, security, servers
    
Trend Micro
By: Trend Micro     Published Date: Oct 12, 2012
See which security solution is the fastest and most efficient in this FREE analysis
Tags : 
ation security, information technology, trend micro, security, auditing, security management
    
Trend Micro
By: Trend Micro     Published Date: Oct 12, 2012
Learn how agentless security architectures can maintain a high level of security while lowering costs
Tags : 
information security, information technology, protection, security, data protection
    
Trend Micro
By: Quocirca     Published Date: Dec 02, 2008
The need to share information has never been greater as cross-organizational business processes become deeper and more complex. The movement of digital information, both within a business and across its increasingly porous boundaries to external individuals and organizations, carries more and more risk as regulations are tightened around data protection and personal privacy.
Tags : 
quocirca, content security, aep networks, clearswift, symantec, trend micro, websense, smtp, security, data management, compliance, disaster recovery, security management, data protection, content management system
    
Quocirca
By: Trend Micro SaaS     Published Date: Oct 07, 2007
Der umfassende Hosted-Service wehrt Bedrohungen ab, ehe sie das Netzwerk erreichen, und kombiniert dazu leistungsfähige Anti-Spam- und Anti-Phishing-Funktionen mit mehrfach ausgezeichnetemViren- und Spyware-Schutz. Trend Micro, einer der Marktführer im Bereich der Sicherheits-Software, aktualisiert und optimiert die Lösung, um das Netzwerk des Kunden zuverlässig zu schützen und gleichzeitig wertvolle IT-Ressourcen einzusparen.
Tags : 
trend, messaging hosted security, e-mail, netzwerk, mx-datensatzes, spyware-schutz
    
Trend Micro SaaS
By: Unitrends     Published Date: Jan 05, 2017
Exchange Online, SharePoint Online, and OneDrive for Business are the applications your business relies on every day. But without a smart backup plan, finding and restoring lost Office 365 data can take hours, days, or even longer. The facts are that data loss can occur in cloud-based applications, including Microsoft Office 365 and deleted items will be permanently removed after 14 days. Read our eBook to learn how to broaden your backup and recovery plan to include purpose built protection for Microsoft Office 365.
Tags : 
unitrends, microsoft office 365, backup, recovery, data loss, it management, enterprise applications
    
Unitrends
By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
By: Palo Alto Networks     Published Date: Sep 30, 2016
in our 36-criteria evaluation of automated malware analysis providers, we identified the 11 most significant ones — Blue coat, check Point, cisco, cyphort, Fidelis cybersecurity, Fireeye, Fortinet, intel Security, Palo Alto networks, lastline, and trend Micro — and researched, analyzed, and scored them.
Tags : 
palo alto, automated malware, security, cloud, forrester report
    
Palo Alto Networks
By: CA Technologies EMEA     Published Date: May 30, 2018
The trend speaks volumes. By 2020, more than 50% of global enterprises will be running containerized applications in production, up from less than 20% today, according to Gartner. And IDC says that by 2021, more than 95% of new microservices will be deployed in containers. CA Technologies has produced this webinar to look at the how a one- size fits all approach does not always work.
Tags : 
    
CA Technologies EMEA
By: CA Technologies EMEA     Published Date: May 30, 2018
The trend speaks volumes. By 2020, more than 50% of global enterprises will be running containerized applications in production, up from less than 20% today, according to Gartner. And IDC says that by 2021, more than 95% of new microservices will be deployed in containers. CA Technologies has produced this webinar to look at the essentials of Container Monitoring so download right away to find out more.
Tags : 
    
CA Technologies EMEA
Start   Previous    1 2 3 4 5     Next   End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter