Your Search returned 2 results from our Editorial content

Sort By

IT & SYSTEMS MANAGEMENT

Report: Malware-infected Android apps spike in the Google...

The number of mobile apps infected with malware in Google's Play store nearly quadrupled between 2011 and 2013, a security group has reported.

ANTI-SPYWARE

Android one-click Google authentication method puts users,...

A feature that allows Android users to authenticate themselves on Google websites without having to enter their account password can be abused by rogue apps to give...

   
   

Your Search returned 9 results from our White Paper Library

Sort By
Entrust

Malware

Addressing Advanced Fraud Threats in Today’s Mobile Environment:...

This white paper looks at the potentials threats& stumbling blocks of mobile finance, as well as the opportunities available.


McAfee

Microsoft Windows

Corporate Av/Epp Comparative Analysis: Exploit Protection...

This paper tests 11 enterprise level Endpoint protection (EPP) products to measure their effectiveness in protecting Windows computers against exploits....


McAfee

Endpoint Security

A Buyer's Guide to Endpoint Protection Platforms

This Gartner paper acts as buyer's guide to endpoint protection platforms, listing the most advanced features to help buyers differentiate solutions.


Symantec.cloud

Encryption

Encryption and Data Protection

Your company’s critical data is constantly under threat. Find out all you need to know about the benefits of encryption, including how it can provide strong...


Symantec Corporation

Endpoint Security

Small Business Endpoint Protection Performance Benchmarks...

Download the Passmark competitive benchmark report and check out how Symantec Endpoint Protection Small Business Edition performs against competing solutions....


Symantec Corporation

Internet Security

The Tangled Web: Silent Threats & Invisible Enemies

This white paper will cover how spyware steals personal identities and confidential data, the risks and vulnerabilities in your business.


Symantec Corporation

Endpoint Security

Customer Success - Tree in The Glen

Treehouse in the Glen (www.treehouseintheglen.com), a certified Green toy store in Silicon Valley, replaced a variety of security solutions with Symantec...


Symantec Corporation

Anti-Spam

Symantec Internet Security Threat Report

Symantec’s analysts unparalleled sources of data with which to identify, analyse, and provide informed commentary on emerging trends in attacks, malicious...


Webroot

Fraud Detection & Prevention

Phishing 2.0

This white paper looks at how phishing emails have changed in recent years, and how companies can protect against them.


Most Recent Comments

IDG Connections

  • conect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • connect
  • conect
  • conect
  • conect
  • conect
  • conect
no-image

Resource Center

  • /view_company_report/213/brocade
  • /view_company_report/1487/canon
  • /view_company_report/103/cisco-systems-inc
  • /view_company_report/1432/exablox
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/31/ipswitch
  • /view_company_report/1219/jama-software
  • /view_company_report/16/netapp
  • /view_company_report/506/qualys
  • /view_company_report/1304/ringcentral-inc
  • /view_company_report/1242/teradata

Poll

Is tech more of a problem or solution to climate change?