• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

worm

Results 1 - 15 of 15Sort Results By: Published Date | Title | Company Name
By: ESET     Published Date: Sep 21, 2012
Cyber-attacks are now about making money. ACAD/Medre.A is a terrifying worm that stole AutoCAD files. This whitepaper shows how industrial espionage is a new threat.
Tags : 
computer worm, espionage, eset, industrial espionage, security
    
ESET
By: Trend Micro SPN     Published Date: May 15, 2009
Measuring the effectiveness of your security infrastructure is key to any enterprise as threats change on a minute by minute basis. See an example of the report you would receive following a Trend Micro Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, threat discovery, worms, trojans, infected, recovering, instant messaging, anti spam, anti spyware, anti virus
    
Trend Micro SPN
By: Cisco     Published Date: Jan 15, 2015
For nearly 10 years, viruses endured as the primary method of attack, and over time they were largely matched by defenders’ ability to block and protect against them. Motivated by the notoriety and the knowledge gained by the discovery and publicizing of new vulnerabilities, attackers continued to innovate. What ensued were distinct threat cycles, an “arms race,” so to speak. Approximately every five years attackers would launch new types of threats— from macroviruses to worms to spyware and rootkits—and defenders would quickly innovate to protect networks from them.
Tags : 
attacks, viruses, protection, networks, threats, arms race, vulnerabilities, macroviruses, worms, spyware, rootkits, defenders, security, data management
    
Cisco
By: VMware     Published Date: Feb 26, 2009
In this brief, you'll learn how CA Recovery Management Products, like CA ARCserve Backup and CA XOsoft solutions, can be applied with VMware Infrastructure to help you effectively respond to the challenges and opportunities of business-critical computing.
Tags : 
vmware, business continuity, ca recovery management, ca arcserve, ca xosoft solutions, vmware infrastructure, business-critical computing, virtualization, data recovery, trojans, worms, viruses, highly available systems, disk staging, failover, replication, server architecture, mainframe technology, hardware abstraction, encapsulation
    
VMware
By: CopiaTECH     Published Date: Mar 18, 2008
No longer worried about viruses, Trojan horses, worms, identity theft, and phishing scams? Do you feel as if you have gone the distance to protect your company and your network from impending doom? Sleep at night? Well, there is one tiny itty bitty little detail that can be a can of worms that makes a good old virus look quite friendly, the software license agreement.
Tags : 
license, end user, eula, copiatech, spyware, anti spyware, internet security, desktop management
    
CopiaTECH
By: Internet Security Systems     Published Date: Aug 21, 2009
Use of instant messaging applications-like AOL Instant Messenger, Yahoo! Messenger, MSN Messenger and ICQ-and peer-to-peer applications has grown significantly. Although the benefits of real-time communication offer a productivity benefit to corporate environments, instant messaging and peer-to-peer applications add significant vulnerabilities and risks to an enterprise's security posture.
Tags : 
instant messaging, instant messenger, icq, internet security, web security, virus, anti virus, anti-virus, antivirus, worms, vulnerability management, internet security systems, it management, bandwidth management, anti spam, anti spyware, email security, intrusion detection, intrusion prevention, patch management
    
Internet Security Systems
By: MessageLabs     Published Date: Sep 25, 2008
The Internet has proven to be a vital communications medium for worldwide commerce, but as an open and unprotected global network it can also present a wide range of threats that can cripple any business organization. Several years ago, most Internet threats were relatively benign examples of a young adolescent’s technical expertise but over time they have evolved into increasingly sophisticated domestic and foreign attacks that are designed to capture financial, personal, or strategic business information. Threats now come in the form of deliberately malicious acts, and exploitative opportunities for hackers and/or organized crime. The impact is serious, and the landscape of victims is getting broader every day. In response, no organization can afford to have its networks remain unprotected.
Tags : 
messagelabs, online threats, security, small & medium businesses, email spam, viruses, trojan horses, worms, phishing attacks, spyware, adware, honeypots, sandboxing, the wildlist, anti spam, anti spyware, anti virus, email security, internet security, security management
    
MessageLabs
By: HP     Published Date: Jul 08, 2009
Data is the backbone of every organization. No matter the business, industry, or size, reliable data access is essential to operations. Should a "worst-case scenario" occur, being prepared with an appropriate disaster recovery strategy is essential. Given the potential high cost associated with data loss, reliable data protection is no longer an option; rather, it is an obligation. This white paper discusses a data protection strategy that takes into consideration the business environment, offering sophisticated features while maintaining simplicity, affordability, and reliability.
Tags : 
storage, data protection, reliability, reliable, disaster recovery, business protection, business continuity, storageworks, rto, rpo, recovery time objective, recovery point objective, tape, lan, san, das, direct attached storage, rdx, d2d, disk to disk
    
HP
By: MX Logic     Published Date: May 21, 2008
Rootkits, Trojans, ransomware, Denial-of-Service and much more – this newly released white paper from MX Logic covers the everchanging security threat landscape. Learn what malicious intrusions are out there, how to identify them and how to keep your network safe.
Tags : 
botnets, dha, dos, denial of service, queen bot, malware, drive by, storm worm, blended threats, rootkits, trojans, spyware, viruses, virus, worm, worms, polymorphism, push propagation, pull propagation, zero day
    
MX Logic
By: Larsen & Toubro Infotech(LTI)     Published Date: Feb 18, 2019
The largest national multiline insurance had built a repository of Insurance policies (P&C and Life Insurance) on Microfilm and Microfiche in early 90’s, as a preservation strategy. They were grappling with issues as this technology became outdated over time: • Risk of losing their only source of data for Insurance policies and corresponding communication, need to improve data availability and speed of claims evaluation • Compliance issues, need of a WORM (write once read many) storage compliant with FINRA regulations, where data should be encrypted when at rest • Total cost for digitization compared to 10-12 years of support left to maintain insurance policies was not very encouraging • Required a low cost, cloud-based, FINRA-compliant document management solution which could provide quick access to stored data Download complete case study to know how LTI’s e-Office sDownload full case study to know how LTI’s e-Office solution enabled 50% TCO for Largest national Multiline Insurance.
Tags : 
    
Larsen & Toubro Infotech(LTI)
By: Microworld     Published Date: Dec 12, 2007
At the Mail Gateway, MailScan for SMTP Servers scans and cleans mails that flow between all local users and mails between the Internet and Mail Server. It protects organizations against Viruses, Worms, Trojans, Backdoors and many other malware, blocks Spam and Phishing mails, while providing total Content Security for email traffic.
Tags : 
mailscan, mail scan, email security, filtering, filter, email filter, blocking, internet security, virus, spam, anti-virus, anti-spam, anti spam, anti virus, malware, microworld
    
Microworld
By: MessageLabs     Published Date: Sep 22, 2008
In this whitepaper, get a detailed look at dangerous robot networks or “botnets,” such as Sobig, StormWorm and MayDay. Understand how their creators are constantly evolving these threats to prevent detection by traditional forms of security. Finally, learn how the MessageLabs solution provides unique protection against botnets.
Tags : 
botnet, bot, messagelabs, email security, malware, virus, security, network security, anti spam, anti virus, intrusion detection, intrusion prevention
    
MessageLabs
By: Symantec.cloud     Published Date: Sep 28, 2010
Recently, a new worm, commonly known as "here you have" used old mass-mailer techniques to spread rapidly across the Internet, effectively shutting down the email servers of many large companies.
Tags : 
messagelabs, symantec hosted services, embedded links, worm, security, malware, anti spam, anti spyware, anti virus, email security, hacker detection, internet security, security management
    
Symantec.cloud
By: VMware     Published Date: Feb 20, 2009
Hopefully your business will never have to experience a major disaster. But having an effective disaster recovery plan with sufficient documentation, adequate testing, and well trained staff will increase your chances of survival when faced with a minor or major catastrophe.
Tags : 
vmware, disaster recovery plan, threats, viruses, worms, trojans, smb, security, anti spam, anti spyware, anti virus, disaster recovery, security management
    
VMware
By: Internet Security Systems     Published Date: Aug 21, 2009
Viruses have been on the attack for more than 20 years, and the cost of dealing with them is escalating. Too many malcode (malicious code) attacks by viruses, worms, Trojans and the like are breaking through today's most prevalent system defenses: Antivirus (AV) programs. This whitepaper will discuss the full impact of virus disasters and what historically has been done to combat the problem.
Tags : 
virus, antivirus, anti-virus, anti virus, trojan, trojans, malware, worms, malcode, internet security, email security, web security, internet security systems, security, network security, anti spyware, application security, hacker detection, security management, web service security
    
Internet Security Systems
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter