trend micro

Results 51 - 75 of 127Sort Results By: Published Date | Title | Company Name
By: Trend Micro SPN     Published Date: Jun 15, 2009
Power to the people? Managing technology democracy in the Workplace. A Trend Micro sponsored report by the Economist Intelligence Unit.
Tags : 
trend, trend micro, economist intelligence unit, security, risks, technology democracy, cio, cto
    
Trend Micro SPN
By: Trend Micro SPN     Published Date: Nov 24, 2009
A report sampling over 100 large enterprises that explores the types of cost savings that can be gained by employing a comprehensive content security solution with a cloud client architecture. The report concludes total savings of up to 40% can be achieved.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
    
Trend Micro SPN
By: Trend Micro SPN     Published Date: Nov 24, 2009
How do you measure security effectiveness? Conventional security solutions may appear to be holding back targeted malware attacks but this eBook shows you how to check the performance of your current infrastructure. Whether you are 'secure', 'infected' or 'recovering', you can benefit from a Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
    
Trend Micro SPN
By: ESET     Published Date: Jan 30, 2008
Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too. So, how do scanners really work? The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Tags : 
heuristics, threat analysis, how av works, av signatures, traditional antivirus, norton, symantec, trend micro
    
ESET
By: ESET     Published Date: Jan 30, 2008
Steganography is the science of hiding data inside of items, such as sound and picture files.  Listen to this podcast to learn more about steganography and the potential IT security concerns it poses.
Tags : 
embedded files, steganography, hiding data, secret files, coding, av signatures, traditional antivirus, norton
    
ESET
By: Microsoft Office     Published Date: Nov 24, 2008
To address the needs of customers as well as emerging workplace trends,  Microsoft focused the design of Microsoft Office Professional Plus 2007 around four key goals. They are: working more efficiently with better results, collaborating with others across boundaries, making better use of information, and streamlining processes and controlling content. These goals correspond to long-term investment areas that Microsoft began with Microsoft Office 2003 and continues to focus on today.
Tags : 
microsoft office outlook® 2007, microsoft office infopath® 2007, microsoft office open xml formats, microsoft office excel® 2007
    
Microsoft Office
By: Trend Micro SaaS     Published Date: Oct 08, 2008
Unternehmen verzeichnen gegenwrtig einen dramatischen Anstieg von Spamund E-Mail-Angriffen. Diese Angriffe beeintrchtigen nicht nur die Produktivitt der Mitarbeiter, sondern verbrauchen auch wertvolle IT-Arbeitszeit und Infrastruktur-Ressourcen. Diese Bedrohungen knnen auch Datenlecks und rechtliche Risiken mit sich bringen.
Tags : 
spamund, produktivitt, trend, erkennung, sicherheitslsung
    
Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Apr 02, 2009
Gehostete (d. h. webbasierte) Lsungen fr Messaging-Sicherheit finden bei Unternehmen aller Gren immer mehr Anklang. Einige haben sich bereits fr gehostete Services entschieden, whrend andere sich langsam mit der Idee anfreunden und nun eher Services von Dritten zur Verwaltung ihrer Sicherheits-infrastruktur nutzen als noch vor einem Jahr. Entscheidungstrger erkennen gerade jetzt im Zuge der aktuellen Wirtschaftskrise, dass gehostete Lsungen fr E-Mail-Sicherheit eine kostengnstige Alternative darstellen und gleichzeitig die Sicherheit erhhen.
Tags : 
trend micro, messaging-sicherheit, lsungen, osterman research, messaging-services, prozentsatz
    
Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Dec 07, 2007
Um mit dem Wachstum Schritt zu halten und allen Schlern eine Umgebung zu bieten, in der sie optimal lernen und sich entfalten knnen, setzen die Shakopee-Schulen im Netzwerk eine vielschichtige Sicherheitslsung ein, die alle Standorte im Bezirk verbindet. Die IT-Abteilung muss stndig Funktionalitt und Kosten gegeneinander abwgen, um mit der Installation ein Hchstma an Qualitt und Nutzen zu gewhrleisten.
Tags : 
trend micro, schutz, kosten-nutzen, shakopee-schulbezirks, funktionalitt, interscan, officescan, pc-cillin
    
Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Dec 05, 2007
eSecurityToGo hat sich auf Sicherheitslsungen fr kleine und mittlere Unternehmen (SMB) von heute spezialisiert. Einen groen Teil des Kundenstamms bilden andere IT-Berater, die das umfassende Fachwissen und die besonderen Schwerpunkte von eSecurityToGo zu schtzen wissen. Das Unternehmen ist Reseller der kompletten Produktpalette von Trend Micro Lsungen. Es sichert sich damit zufriedene Kunden, die sich auch in Zukunft fr Trend Micro entscheiden.
Tags : 
gegensatz, unternehmen, esecuritytogo, interscan messaging, trend micro, smb
    
Trend Micro SaaS
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : 
endpoint security, desktop devices, mobile devices, byod, corporate data, technology
    
CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
In todays always on, always connected world where sensitive data is almost certain to be stored electronically, organizations can no longer afford to operate without some form of Endpoint Protection. The costs related to network downtime or stolen data resulting from malicious attacks significantly outweighs that of maintaining an up to date solution. Although the unified nature of Endpoint Protection has made extensive security functionality easier to manage, selecting the right products can be a difficult task. This whitepaper aims to explain how the core functionality of Enterprise Protection suites have developed, what to look for in a solution, and which technologies will need to be considered in the future. In todays business environment, it is no longer a question of whether to invest in Endpoint Protection, but a question of which solution is right for your organization.
Tags : 
endpoint security, data security, endpoint protection, enterprise protection, technology
    
CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
New business models and employee work styles are adding pressure on existing endpoint security strategies. A recent survey shows most companies are dissatisfied with current approaches to endpoint security. As a result, most companies are eyeing vendor changes in the coming year. Download this infographic to learn more.
Tags : 
endpoint security, security policy, mobile devices
    
CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, its critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security
    
CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Merchants and service providers that process credit card payments must comply with the Payment Card Industry Data Security Standard (PCI DSS), now at Version 3.0. Whether the transaction occurs in a store or online, and regardless of the environment, from physical Point of Sale devices, to virtualized servers, or web servers in a public cloud, PCI DSS 3.0 mandates that these organizations are responsible for the security of their customers cardholder data. Read this white paper to learn more about the Payment Card Industry Data Security Standard 3.0.
Tags : 
    
CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
This book explores the security challenges of virtualization in the data center, at the endpoint, and in the cloud. I explain why using traditional security products built for physical systems is a mistake for virtual systems. Finally, I explain how virtualaware security solutions provide in-depth security without compromising performance in virtual, cloud, and hybrid environments that include a mix of virtual and physical systems.
Tags : 
cloud security, virtualization security, virtualization, data center
    
CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Organizations around the world are embracing the economic and operational benefits of cloud computing. Whether organizations are extending internal resources or fully deploying on Microsoft Azure, the ability to take advantage of the business benefits of cloud require that organizations continue to meet key security requirements. Azure delivers a trusted cloud infrastructure on which customers can design, build and manage their own cloud applications and infrastructure. While Azure provides security controls for the infrastructure and change to virtualization layers, deploying organizations are responsible for deploying and maintaining security for the guest operating systems, applications, and data in order to protect against malware attacks, zero-day vulnerabilities and data breaches. Read this white paper to lean more about Trend Micro Instant-On Cloud Security for Microsoft Azure.
Tags : 
cloud security, microsoft azure, cloud computing, cloud infrastructure, malware attacks, data breaches, trend micro
    
CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Virtualization and cloud computing can help your organization achieve significant savings in data center hardware costs, operational expenditures, and energy demands while achieving improvements in quality of service and business agility. However, as data centers continue to transition from physical to virtual and now increasingly, cloud environments, traditional security can slow down provisioning, become difficult to manage, and cause performance lag. As you scale your virtual environment and adopt software defined networking, evolving your approach to security can reduce time, effort, and impact on CPU, network, and storage. Read this white paper to learn more about virtualization and cloud computing.
Tags : 
security, virtualization, cloud computing, trend micro
    
CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Traditional security solutions cant keep up with new trends in user behavior. Turning to point products to address discrete challenges only serves to increase complexity and may inadvertently leave gaps in your security. Plus, you need to consider how you will secure users as your IT philosophy progresses from on-premise to the cloud. To effectively counter todays evolving threat landscape, you need a tightly woven mesh of security that consolidates your view across all layers of protection and all deployment models. Read this white paper to learn how Trend Micro Smart Protection Complete can protect your users.
Tags : 
user protection, security, cloud, endpoint, application, network
    
CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Mar 26, 2015
The targeted attacks and advanced threats that are increasingly used to breach enterprise networks are purpose-built to evade traditional defenses. Enterprises require an advanced approach to protection that identifies these attacks and enables organizations to prevent breaches and their costly consequences. Read this white paper to learn how the Trend Micro Custom Defense can prevent the collateral damage associated with targeted attacks and advanced threats.
Tags : 
custom defense, security threats, enterprise networks, intellectual property
    
CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Rush University Medical Center (Rush) is a not-for-profit healthcare, education, and research enterprise with a 664-bed academic medical center that includes hospital facilities for adults and children. Rush offers residency and fellowship programs in medical and surgical specialties to more than 2,000 students. With a large and experienced IT team, Rush manages three data centers across its campuses. The organization currently supports approximately 1,600 virtual desktops and 600 virtual servers, along with 10,000 physical desktops. The Rush IT team is tasked with supporting users on all devices, including smartphones and tablets. Watch the video to see how Rush protects the entire organization and protects against advanced threats with Trend Micro solutions, including Deep Discovery. Webinar Brought To You By CDW-Trend Micro
Tags : 
security threats, trend micro, security solutions, mobile devices, network
    
CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro
Tags : 
    
CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Watch this video to learn why you should defend against targeted attacks, and how the Trend Micro Custom Defense provides unique solutions to detect, analyze and respond to your attackers. Webinar Brought To You By CDW-Trend Micro
Tags : 
trend micro, targeted attacks, security solutions, technology
    
CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Dont be that guy. The one who downloads every app he sees. You wouldnt order a dish in a restaurant without knowing whats inside. Apps might look good on the surface but can hide a nasty surprise. Cyber criminals create dangerous apps and websites designed to steal your private data. Watch this video to learn how Trend Micro Mobile Security detects and blocks the bad stuff keeping your mobile devices protected. Webinar Brought To You By CDW-Trend Micro
Tags : 
mobile security, apps, cyber criminals, cyber security, trend micro, mobile devices
    
CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Jul 17, 2015
A small business owner named Pete needs a complete security solution that protects everyone on his staff when they email, browse, and share using their Macs, PCs, or mobile devices. Watch this video and see Pete discover Trend Micro Worry-Free Business Security is an easy-to-use solution that provides complete user protection for all his employees. Webinar Brought To You By CDW-Trend Micro
Tags : 
security solution, cyber attack, mobile devices, business security, user protection
    
CDW-Trend Micro
Start   Previous    1 2 3 4 5 6    Next    End
Search Research Gateway      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.