RSS feed Get our RSS feed

News by Topic

eset

Results 26 - 50 of 94Sort Results By: Published Date | Title | Company Name
By: ESET, LLC.     Published Date: Sep 21, 2011
This report presents a comparative analysis on the performance and usability of 7 security solutions from some of the world's largest security vendors
Tags : eset, smb, antivirus software, malware, it professional, security, small business, vendors
     ESET, LLC.
By: ESET     Published Date: Jul 28, 2011
Join us as we dive into security environments and uncover what specific capabilities organizations need to look for when selecting their next endpoint security solution.
Tags : webcast, key consideration, eset, endpoint security, security, endpoint
     ESET
By: ESET     Published Date: Sep 07, 2011
Another look at what our Research team at ESET, LLC came up with at the end of 2008 for a "top 10 things that people can do to protect themselves against malicious activity." Updated with more recent material from other members of ESET's research teams across the globe.
Tags : eset, cyberbullets, autorun, administrative priveleges, password, social networks, backup, antivirus
     ESET
By: ESET     Published Date: Sep 07, 2011
A lengthy analysis that considers many of these questions, as well as discussing some of the characteristics of this fascinating and multi-faceted malicious code.
Tags : eset, virus, scada, plcs, stuxnet, malware, siemens, code
     ESET
By: ESET     Published Date: Sep 07, 2011
This paper gives some examples of "potentially unwanted" and "potentially unsafe" applications, explaining how they differ from out-and-out malware.
Tags : eset, pua, potentially unwated application, software, unsafe, antivirus, unwanted, malware
     ESET
By: ESET     Published Date: Sep 07, 2011
In this report, we investigate the implementation details of the malware and the ways in which it is distributed, and consider the cybercriminals' objectives.
Tags : eset, tdl, x64, cybercriminal, cybercrime, malware, security, rootkit
     ESET
By: ESET     Published Date: Sep 07, 2011
We discuss about Internet users' behaviour when it comes to Internet security and the top ten threats of the month.
Tags : eset, threat report, internet security, malware industry, antivirus, cybercrime group, mobile devices
     ESET
By: ESET     Published Date: Sep 07, 2011
Selecting an antivirus for your small or medium business that won't slow you down.
Tags : eset, antivirus, security, smb, protection, cybercrime, precautions, safety
     ESET
By: ESET     Published Date: Sep 07, 2011
Learn valuable tips and techniques to fully protect your smartphone against security threats.
Tags : eset, gemini trojan, android phone, apps, security, threats, smartphone, applications
     ESET
By: ESET     Published Date: Sep 07, 2011
Protection for small and medium businesses against viruses and cybercrimes.
Tags : eset, black hat conference, hacking the car, malware, protection, security, antivirus
     ESET
By: ESET     Published Date: Sep 07, 2011
This report presents a comparative analysis on the performance, effectiveness and usability of seven security solutions from some of the world's largest security vendors.
Tags : eset, security solutions for business, malware, antivirus, protection, cybercrime
     ESET
By: ESET     Published Date: Sep 21, 2012
Cyber-attacks are now about making money. ACAD/Medre.A is a terrifying worm that stole AutoCAD files. This whitepaper shows how industrial espionage is a new threat.
Tags : computer worm, espionage, eset, industrial espionage, security
     ESET
By: ESET     Published Date: Sep 21, 2012
Cyber-thieves are targeting smaller businesses, is yours next? Less IT staff and tight budgets make you a target. Get this critical tech brief to learn about four critical security counter measures.
Tags : cybercrime, security, eset, defense, small business
     ESET
By: ESET     Published Date: Sep 21, 2012
Get the most up-to-date view of the IT security threat landscape from the experts at ESET. This monthly threat report is required reading for anyone involved with IT Security.
Tags : security threat, eset, it security, security
     ESET
By: ESET     Published Date: Sep 21, 2012
The cloud is supposed to be a "cure-all", but it also creates numerous new security issues for SMBs. Download this techbrief for 7 tips you must have before you commit to any service!
Tags : cloud computing, security, eset
     ESET
By: Mimecast     Published Date: Aug 30, 2016
Download Resetting Your Email Security Strategy to learn: - How employees are your first and last line of defense in attacks and why proper education is key. - How you can fix your processes against modern threats like whaling - The critical role of today’s cyber security technologies - Why your security strategy is doomed to failure without strong leadership"
Tags : mimecast, email, email security, cyber security, whaling, email security strategy, security
     Mimecast
By: Mimecast     Published Date: Apr 18, 2017
"It’s no secret that organizations find themselves the target of increasingly sinister and highly sophisticated phishing, spear-phishing, whaling and ransomware attacks. While risks are clearly mounting, many organizations still aren’t keeping up with the challenge. Download Resetting Your Email Security Strategy to learn: - How employees are your first and last line of defense in attacks and why proper education is key. - How you can fix your processes against modern threats like whaling - The critical role of today’s cyber security technologies - Why your security strategy is doomed to failure without strong leadership"
Tags : email security, ransomware, phishing, whaling, security strategy
     Mimecast
By: Aruba Networks     Published Date: Nov 15, 2013
Der Next-Generation Workplace steht für Mobilität. Im Jahr 2013 gab es mehr mit dem Internet verbundene Mobilgeräte als Menschen weltweit. Aufgabe der IT ist es, die dafür notwendigen Verbindungen und Netzwerke zu schaffen und dafür zu sorgen, dass diese an die Anforderungen der unterschiedlichen Benutzergruppen, an ihre Aufgaben sowie die eingesetzten mobilen Geräte angepasst sind – sei es für Angestellte, Unternehmer, Gäste oder Kunden. Mobiles Arbeiten steigert die Produktivität und bietet zahlreiche Vorteile für den Anwender – aber auch IT-Verantwortliche können profitieren. Laden Sie unser Whitepaper herunter und überzeugen Sie sich von den Vorteilen...
Tags : just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs
     Aruba Networks
By: ESET     Published Date: Oct 07, 2009
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology. The threat landscape facing businesses has evolved significantly, and corporations are looking for security products that can protect against known threats and prepare for future attackers in a simple-to-use architecture.
Tags : eset, security, threatsense, malware, threat trends, conficker, virus, agent
     ESET
By: Epson Robotics Media     Published Date: Feb 09, 2018
Digital Elektronik kaufte für diesen Job vier Epson Roboter und diese Roboter beendeten die Aufgabe in nur wenigen Monaten. Seitdem hat Digital Elektronik die Roboter für neue Anwendungen eingesetzt, von denen einige ähnlich, andere jedoch recht verschieden waren. Darin zeigt sich, dass ihre flexiblen Einsatzmöglichkeiten ein wesentlicher Vorteil von Epson Robotern ist. Volker Spanier, Leiter von Factory Automation Epson Deutschland GmbH, sagt:„ Ich denke, dass dies ist ein hervorragendes Beispiel dafür ist, wie die Roboter von Epson die Effizienz von Produktionslinien verbessern und Aufgaben vollenden können, die von Hand vielleicht sogar unmöglich wären. Es ist auch großartig zu sehen, dass unsere Roboter für den Bau einer solch denkwürdigen Sehenswürdigkeit eingesetzt werden, die für lange Zeit fortbestehen wird“.
Tags : roboter, epson, bauen, winzige, uhren
     Epson Robotics Media
By: Turn     Published Date: Mar 09, 2016
In this eBook, you'll learn how to reset your channel-first marketing strategy to put your audience first, delivering the right message at the right time in the right way. Discover new ways to reach your audience across channels and test your marketing-first quotient.
Tags : programmatic, omnichannel, multichannel advertising, dsp, demand side platform, omnichannel campaigns, audience definition, campaign tactics
     Turn
By: Infosys     Published Date: May 21, 2018
Our client was a large financial institution with millions of customers using a wide range of products. So when customers called the contact center, they could have any query out of a possibility set of 68 categories. They would want investment advice, or ask about their account. Or they would simply want to reset their PIN. The trouble was that the large range of support offered at the contact center meant long and complex phone calls, as customers often found their way through the interactive voice response (VR) system to the wrong agent. They had to be re-routed-often several times- which gave our clients two problems.
Tags : customer, service, automation, voice, response
     Infosys
By: McAfee EMEA     Published Date: Mar 20, 2018
Bedrohungsvektoren entwickeln sich stetig weiter. In dieser Situation müssen IT-Sicherheitsentscheider effektive Lösungen für die Sicherheit von Endgeräten finden. Bei mehr als zwei Drittel der Unternehmen wurden im vergangenen Jahr sensible Daten kompromittiert. Die Reaktion auf solche Vorfälle ist mit großem Zeit- und (manuellem) Arbeitsaufwand verbunden – und selbst damit lassen sich die Probleme häufig nur für einen Teil der Endgeräte lösen. Sicherheitsentscheider wünschen sich deshalb integrierte Lösungen, die bei allen eingesetzten Endgerätetechnologien für mehr Effizienz, Übersicht und Schutz sorgen. Im Januar 2017 beauftragte McAfee Forrester Consulting, gängige Tools und Strategien für das Endgeräte-Sicherheits-Management sowie deren wahrgenommene Effektivität zu evaluieren.
Tags : 
     McAfee EMEA
By: NETIQ     Published Date: Jun 20, 2014
Recently, industry analysts have focused on new authentication methods; however, maybe passwords aren’t dead. In today’s world, passwords are still a big part of life but resetting them still drains the life from IT productivity. Slay that monster.
Tags : netiq, passwords, enterprise security, username, password, security
     NETIQ
By: Software Security Solutions     Published Date: Aug 23, 2010
ESET NOD32 Centrally Managed Business Edition. The Thinking Person's Solution.
Tags : software security, eset business edition, free trial, anti-virus software, smb, nod32, anti virus protection system
     Software Security Solutions
Start   Previous    1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics