X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 sophos end point security


2008 Internet Security Trends: A Report on Emerging Attack Platforms for Spam, Viruses, and Malware
Just when malware design seemed to have reached a plateau, new and more complex attack techniques have now emerged. For a while, security controls designed to

sophos end point security  FEEBS OUTBREAK TIMELINE   Sophos Virus Name Outbreak First Reported First Signature Published Virus Outbreak Duration (Hours) W32/Feebs-Fam 10/13/2007 4:00 10/16/2007 1:49 69:49 W32/Feebs-BW 10/17/2007 4:00 10/17/2007 14:36 10:36 W32/Feebs-BX 10/17/2007 4:00 10/18/2007 1:52 21:52 Mal/Feebs-B 10/19/2007 8:00 10/19/2007 13:19 5:19 W32/Feebs-BY 10/20/2007 1:00 10/20/2007 15:25 14:25 Mal/Feebs-C 10/22/2007 4:10 10/22/2007 11:17 7:07   Tremendous Growth in URL Outbreaks While attachment outbreaks like the

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » sophos end point security

Spire Security


Founded in 2008, Spire Security is an analyst firm that provides research and analysis in the information security field. A specialty of Spire is enterprise security metrics.

sophos end point security   Read More

Which is Best: Cloud-Based or on-Premise Web security?


As you'll discover in the Aberdeen report, Web Security in the Cloud: More Secure!

sophos end point security   Read More

The Whys and Hows of a Security Vulnerability Assessment


TEC outlines the reasons for having a Security Vulnerability Assessment done, how a security vulnerability assessment is performed, what can be gained by enlisting the Security Vulnerability Assessment process, and what you should expect to see in a Security Vulnerability Assessment report. After all, the most important reason for having a Security Vulnerability Assessment performed is to enable corrective action. How can you know what to secure if you don't know what is insecure?

sophos end point security   Read More

Security and Trust: Doing More Business Over the internet


Learn how a secure web site can help you make sales in Security and Trust: Doing Business Over the Internet.

sophos end point security   Read More

Need for Content Security


The Internet access you have provided in the office costs money. You wish to see it used as a productive tool and increase business. It also provides the best way to appear busy. Employees can open multiple pages, a few of them related to legitimate work, while the others cater to their "personal" interests. It takes a single mouse click or Alt+Tab to navigate between pages, when a supervisor appears. This white paper provides details of how Internet access can be abused and how organisation can keep a tab on its employees.

sophos end point security   Read More

Top 5 Security Tips for 2009


In the white paper top 5 security tips for 2009, discover what smaller companies like yours can do to protect themselves from security threats that...

sophos end point security   Read More

Network Security Management


In the converging network and security infrastructure, relating what is reported from security products to what is observed on the network is critical. Q1 Labs’ network security management product, QRadar, combines network behavioral analysis with vulnerability assessment and security event correlation into one platform. Ultimately, this convergence reduces IT acquisition and operations costs, and enhances responses to network security incidents.

sophos end point security   Read More

Wireless (In)Security Trends in the Enterprise


Wireless Fidelity (WiFi) has become a mainstream technology offering great benefits and efficiencies but carrying with it unique security challenges. Unsecured WiFi provides an easy target for hit-and-run style attacks allowing hackers to cause severe damage while remaining invisible and undetected. Ignoring the specific requirements for securing their enterprise network and users against WiFi vulnerabilities, businesses risk loss of confidential data, legal fines and penalties, and brand erosion. By following WiFi security best practices and using the right tools, enterprises can reap the benefits of WiFi while protecting their IT infrastructure from WiFi threats.

sophos end point security   Read More

Security Innovation


Security Innovation has been identifying application security risks for top software vendors and US government agencies since its inception. The company offers security services from application testing, to security code review, to auditing. Security Innovation was founded by a recognized authority in software security and is managed by software industry veterans and a team of experts that came from companies like Microsoft, Lockheed Martin, Harris Corporation, and IBM. The company is headquartered in Melbourne, FL (US) and has offices in Boston, MA and Bozeman, MT.

sophos end point security   Read More

End-to-End Monitoring Is Critical to Meeting End User Expectations Today and Tomorrow


To function as a business partner, IT must deliver service at predictable levels—and also contribute to enterprise strategy, by planning for services that enable growth. That’s why IT needs end-to-end infrastructure views that reveal issues as they happen, and track trends that predict future needs. But how can IT create unified views of the environment without draining critical resources?

sophos end point security   Read More