RSS feed Get our RSS feed

News by Topic

abs

Results 426 - 450 of 511Sort Results By: Published Date | Title | Company Name
By: Symantec.cloud     Published Date: Apr 27, 2010
Create a step-by-step approach to IT security that will work for your business.
Tags : messagelabs hosted symantec, it security, smb, malware
     Symantec.cloud
By: Symantec.cloud     Published Date: Apr 27, 2010
Spammers reach new heights of inventiveness and professionalism. Understand the latest spam threat.
Tags : messagelabs intelligence, symantec hosted services, spam threat, web security services, security safeguard
     Symantec.cloud
By: Symantec.cloud     Published Date: Apr 15, 2010
Keeping email secure and available is a complex and daunting task. Learn how a hosted solution can provide secure and available email
Tags : messagelabs symantec hosted services, email, security, botnets
     Symantec.cloud
By: Symantec.cloud     Published Date: Apr 15, 2010
Keeping email, web, and IM secure is a complex and daunting task. Learn how a hosted solution can provide security and available communications.
Tags : messagelabs symantec hosted services, email, security, web security
     Symantec.cloud
By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -California edition
Tags : messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, california edition
     Symantec.cloud
By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Wisconsin Edition
Tags : messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, wisconsin edition
     Symantec.cloud
By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Wisconsin Edition
Tags : messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, wisconsin edition
     Symantec.cloud
By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Massachusetts Edition
Tags : messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, massachusetts edition
     Symantec.cloud
By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Michigan Edition
Tags : messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, michigan edition
     Symantec.cloud
By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Nevada edition
Tags : messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, nevada edition
     Symantec.cloud
By: Symantec.cloud     Published Date: Apr 15, 2010
Learn how MessageLabs Hosted Policy Based Encryption service enables companies to automatically safeguard the security of sensitive data. -Washington edition
Tags : messagelabs symantec hosted services, company email communication, encryption, deployment, safeguard data, data protection, washington edition
     Symantec.cloud
By: Absolute Software     Published Date: Feb 23, 2010
A majority of environments today are cross-platform, combining both PCs and Macs. The result has become a common IT challenge: How can you maintain Macs in a network environment with a PC-centric infrastructure and with Windows-based network services?
Tags : computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
     Absolute Software
By: Symantec.cloud     Published Date: Feb 12, 2010
Understand the legal issues if you do not conduct a risk assessment before creating your AUP.
Tags : messagelabs, symantec hosted services, aup, acceptable use policy, security risk assessment, information security, business continuity management, compliance
     Symantec.cloud
By: Symantec.cloud     Published Date: Feb 12, 2010
IT security needs to work seamlessly across email, web & IM to protect against the latest Converged Threats - FREE Whitepaper
Tags : messagelabs, symantec hosted services, converged threat, it security, web security, malware, messagelabs security safeguard
     Symantec.cloud
By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen
     Absolute Software
By: Symantec.cloud     Published Date: Feb 03, 2010
Email may be used as evidence for or against US and Canadian organizations in litigation. Learn how to preserve, protect, and produce legally compliant email.
Tags : messagelabs, symantec hosted services, ediscovery compliance, email security, esi, electronically stored information
     Symantec.cloud
By: Symantec.cloud     Published Date: Feb 03, 2010
Hosted security is an efficient and cost-effective solution for many midmarket organizations. Learn how to evaluate hosted security services, and make a business case for reliable security with predictable costs.
Tags : messagelabs, symantec hosted services, hosted security provider, total cost of ownership, tco
     Symantec.cloud
By: Symantec.cloud     Published Date: Feb 03, 2010
Best-Practices Guidelines for Managing Workplace Email and Web Use to Minimize Risks and Maximize Compliance.
Tags : messagelabs, symantec hosted services, workplace email, web acceptable usage policy, compliance, security, productivity
     Symantec.cloud
By: Symantec.cloud     Published Date: Feb 03, 2010
Here are five common problems that occur when corporate employees use PST files and the advantages of email archiving.
Tags : messagelabs, symantec hosted services, pst file, personal storage table, email archiving, storage and backup, disaster recovery, compliance
     Symantec.cloud
By: Symantec.cloud     Published Date: Feb 03, 2010
The emergence of covert information theft as a key tactic of malware propagators. Most importantly, the paper highlights the crucial danger points for any business that doesn't defend itself against viruses which operate in the background.
Tags : messagelabs intelligence, symantec hosted services, security threat, spyware, botnets, phising, email security, social networking
     Symantec.cloud
By: Absolute Software     Published Date: Jan 27, 2010
Deploying patches in a timely fashion soon after they become available helps secure the OS and prevent the majority of data breaches. However, many computer systems are often not patched for months or not at all.
Tags : computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
     Absolute Software
By: Absolute Software     Published Date: Jan 27, 2010
This whitepaper explains how organizations can reduce their energy bills by remotely regulating computers. Topics include typical workplace computer usage, how to calculate your potential energy savings, debunking power management myths, and how you can assign multiple power saving profiles to clients.
Tags : computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
     Absolute Software
By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis
     Ounce Labs, an IBM Company
By: Absolute Software     Published Date: Jan 19, 2010
This whitepaper explains step-by-step how you can deploy a complete Snow Leopard disk image to a Mac OS X computer, even while it is being used. No immediate boot from a server, FireWire drive, or boot DVD is necessary, and no pre-configuration of the target computer is required.
Tags : computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
     Absolute Software
By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
     Ounce Labs, an IBM Company
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics