White Papers & Case Studies
-
Global Survey On Social Media Risks
10/7/2011
The use of social media in the workplace is growing at a rapid pace. Savvy businesses are using blogs, social networks, video on demand (VoD), wikis and other vehicles to quickly share information with their target audiences. The result can be greater brand awareness and an enhanced image in the marketplace.
-
Targeted Network Attacks
7/1/2011
In recent years, companies have made substantial investments into their information security infrastructure. By Michael Cotton, Digital Defense, Inc.
-
Seven For 7: Best Practices For Implementing Windows 7
4/5/2011
In February 2011, Microsoft released its first major update to Windows 7, Service Pack 1. Now that this operating system holds more than 20% of market share1, there’s no question that more enterprises will plan major migrations to Windows 7 in 2011.
-
Astaro Partnership Is Pure Gold For Pure IT
3/17/2011
Since 2004 the IT team at Pure IT has offered clients Astaro's line of security products. By Astaro Corporation
-
Astaro Partnership Is Pure Gold For Pure IT
3/17/2011
Since 2004 the IT team at Pure IT has offered clients Astaro's line of security products. By Astaro Corporation
-
Reputation-Based Security - An Analysis Of Real-World Effectiveness
3/2/2011
In September of 2009, Symantec released its first reputation-based security offering as a part of its consumer security products. Our experiences over the past year have provided us with valuable insight into potential challenges and pitfalls of deploying a widespread file reputation system. By Symantec Corporation
-
Reputation-Based Security - An Analysis Of Real-World Effectiveness
3/2/2011
In September of 2009, Symantec released its first reputation-based security offering as a part of its consumer security products. Our experiences over the past year have provided us with valuable insight into potential challenges and pitfalls of deploying a widespread file reputation system. By Symantec Corporation
-
State Of Software Security Report
2/2/2011
The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. By Veracode, Inc.
-
State Of Software Security Report
2/2/2011
The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. By Veracode, Inc.
-
Ten Ways The IT Department Enables Cybercrime
1/26/2011
We hope that by now you’ve already read Kaspersky Lab’s whitepaper, “Waging War At The Endpoint.” If not, please download and read that whitepaper prior to proceeding (in the resource section.) “Waging War At The Endpoint” focuses on the real target for cybercriminals today—the endpoint, or the employee. By Kaspersky Lab
This website uses cookies to ensure you get the best experience on our website. Learn more