Whitepaper Library
 

web

Results 326 - 350 of 3842Sort Results By: Published Date | Title | Company Name
Published By: Webroot     Published Date: Nov 02, 2012
These days, fixing your endpoint security software requires a new approach and it's called "forget the old approach". Download this white paper to learn more.
Tags : 
it security, endpoint security, endpoint protection, security software
    
Webroot
Published By: Webroot     Published Date: Nov 02, 2012
This paper examines the different endpoint security methods for virtualized environments and presents how Webroot® SecureAnywhereTM Business - Endpoint Protection security provides optimal performance, protection and manageability.
Tags : 
endpoint security, virtualization, virtualized environments
    
Webroot
Published By: Webroot     Published Date: Nov 02, 2012
Download this information to familiarize yourself technically with the components and capabilities of Webroot® SecureAnywhereTM Business - Endpoint Protection.
Tags : 
endpoint security, endpoint protection, it security, malware solutions, malware, malware protection
    
Webroot
Published By: Webroot     Published Date: Nov 02, 2012
This paper looks at this problem and how Webroot, by going back to the drawing board on counering malware threats, is revolutionizing endpoint protection and solving the issues that hinder existing endpoint security solutions.
Tags : 
antivirus protection, endpoint protection, endpoint security, malware
    
Webroot
Published By: Webroot     Published Date: Nov 02, 2012
This report presents our results and findings as a result of performance benchmark testing conducted for eight security software products, on Windows 7 Ultimate Edition from December 2011 to January 2012.
Tags : 
it security, endpoint security, endpoint protection
    
Webroot
Published By: Webroot     Published Date: Nov 02, 2012
This short paper looks at this situation and suggests how by replacing traditional AV with next generation cloud-based endpoint protection you will solve many of the issues surrounding your highly distributed mobile workforce.
Tags : 
mobility, endpoint security, it security, endpoint protection, mobile workforce, high mobility
    
Webroot
Published By: Webroot     Published Date: Nov 02, 2012
When IT administrator, Ty Smith deployed SecureAnywhere Business - Endpoint Protection, system wide, it quickly became clear that he had made the right choice, both from a security standpoint and a financial one.
Tags : 
endpoint security, endpoint protection, malware protection, antivirus software, case study
    
Webroot
Published By: Webroot     Published Date: Nov 02, 2012
FAQs for how to break the old trade-off between effectiveness against malware and speed.
Tags : 
faqs, virus detection, endpoint security, it security, malware detection, antivirus detection
    
Webroot
Published By: Webroot     Published Date: Nov 02, 2012
The experts agree that AV software is a must-have for business PC users, but it is necessary to take great care in choosing one. In this brief, you'll find that user experiences with AV solutions can vary widely.
Tags : 
malware attacks, antivirus security, endpoint solution, endpoint security, security solutions
    
Webroot
Published By: Webroot     Published Date: Nov 07, 2012
This case study describes how globally dispersed technology company, Cascade Microtech addressed concerns about Web Security.
Tags : 
case study, web security, cloud, mobility, mobile security, web security solutions
    
Webroot
Published By: Webroot     Published Date: Nov 08, 2012
To Protect Mobile Users and Globally Dispersed Locations, Cascade Microtech Chooses Webroot for Web Security in the Cloud.
Tags : 
mobile users, mobility, case study, it security, web security, cloud computing, networking
    
Webroot
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : 
web security, mobile threats, security, cloud, application, technology, solution, networking, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : 
secure web gateway, web-based threats, web, solution, technology, networking, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, web threats, physical appliance, virtual appliance, saas, security, technology, data center
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.
Tags : 
web security, mobile, workforce, bluecoat, security
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : 
gateway, web, security
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, appliance, virtual, physical, saas, hybrid
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
From the Era Before security to this current era of empowerment this infographic from BlueCoat provides a timeline navigates the rise of web commerce and the rise in securities which protect us. Starting with when web commerce began to grow and hackers took notice to now when Web Security is able to empower businesses.
Tags : 
idc, security, bluecoat, web security, hackers
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
The use of SSL encryption for all enterprise Internet traffic is growing steadily. Applications that make use of SSL – such as SharePoint, Exchange, WebEx, Salesforce.com and Google Apps – are commonplace. Even email applications like Gmail, Yahoo, and Zimbra are being used in workplace environments as hosted email or BYOD apps. It’s clear that organizations now need complete visibility into the SSL traffic coming across the WAN. They need the ability to preserve complete network and web histories from encrypted network and web traffic for compliance, regulatory and logging requirements. Blue Coat has solutions today to address the SSL dilemma.
Tags : 
blue coat, ssl, ssl visibility, server hardware, servers, small business networks
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.
Tags : 
av defense, blue coat, web environment
    
Blue Coat Systems
Published By: VMWare - vFabric     Published Date: May 10, 2012
View this webcast to learn how to achieve real-time awareness by managing ever-increasing data volumes and transaction rates.
Tags : 
vfabric, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, regulations, risk assessment, cloud computing, virtualization, infrastructure
    
VMWare - vFabric
Published By: VMWare - vFabric     Published Date: May 10, 2012
View this webcast to learn about real-world examples of companies that have adopted VMware vFabric tc Server and how to plan for future cloud deployments.
Tags : 
vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, cloud computing, content management, virtualization, infrastructure
    
VMWare - vFabric
Published By: VMWare - vFabric     Published Date: May 10, 2012
View this webcast to learn how to cost-effectively run your applications & balance your load across virtual machines.
Tags : 
vfabric, balancing, load balancing, elastic, networking, virual, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, virtualization, cloud computing, infrastructure
    
VMWare - vFabric
Published By: VMWare - vFabric     Published Date: May 10, 2012
This webcast will review best practices for architecting a modern data management platform.
Tags : 
vfabric, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, data management, architecture, networking, virtualization, cloud computing, infrastructure
    
VMWare - vFabric
Published By: VMWare - vFabric     Published Date: May 10, 2012
Attend this webcast to learn how vFabric Data Director can help you build database-as-a-service in your datacenter.
Tags : 
vfabric, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, database, networking, virtualization, cloud computing, infrastructure, design and facilities
    
VMWare - vFabric
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.