White Papers: threat


Sort by: Date | Company | Title


What is Threat Emulation Technology
By CheckPoint | 14/11/2013
Threat Emulation uses a sandbox as a separate, isolated environment in which files are open and run to determine whether they are safe or malicious. In this infographic, we look at its implementation and the technology required to avoid infecting a corporate network.
Download this now


Threat Monitoring; Fast Responses To Security Incidents
By Websense | 14/11/2013
As threats evolve and the effectiveness of signature based web security declines, IT departments need to play a bigger, more hands-on role in web security than ever before. In this whitepaper, we look at real-time advanced threat defences that provide immediate visibility into advanced threats, data exfiltration and infected systems.
Download this now
Sign up now to get free exclusive access to reports, research and invitation only events.

Computerworld newsletter

Join the most dedicated community for IT managers, leaders and professionals in Australia