CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

it sandbox

Results 26 - 34 of 34Sort Results By: Published Date | Title | Company Name
Published By: Damballa     Published Date: Apr 14, 2014
Learn the 6 shortcomings of security sandboxing and see what solutions your organization should be utilizing to detect and protect against advanced threats.
Tags : 
malware, threats, security, network based intelligence, detection, security sandboxing, virtual execution, network vulnerabilty
    
Damballa
Published By: Lookout     Published Date: Aug 30, 2017
Most people define mobile devices – smartphones and tablets – as those running a mobile-optimized operating system (e.g. iOS, Android, Windows Phone). There’s a trend emerging, however, in which traditional mobile devices are gaining functionality typically associated with PCs. At the same time, PCs are being architected more like mobile devices — an interbreeding of species, if you will. The iPad Pro, for example, has a keyboard. With Windows 10, phones and tablets can run “Universal” apps that also run on PCs. Windows 10 also has application-layer sandboxing, code-signing, and an app store with apps pre-vetted by Microsoft. In certain configurations (i.e. enterprise-managed devices), a laptop running Windows 10 has a security architecture that looks strikingly similar to a smartphone or tablet.
Tags : 
cybersecurity, enterprise networks, enterprise security architecture, risk reduction, ios attacks
    
Lookout
Published By: Cisco     Published Date: Apr 11, 2016
A través de los años, todos hemos escuchado hablar de soluciones simples y aparentemente mágicas que permiten resolver problemas de seguridad, incluido el uso exclusivo de la tecnología de sandboxing para combatir el malware avanzado y las amenazas dirigidas.
Tags : 
    
Cisco
Published By: Mimecast     Published Date: Jan 03, 2017
Mimecast has detected and blocked a dangerous new campaign that uses social engineering and advanced sandbox evasion techniques to deliver stealthy malware. This Email Security Advisory from Mimecast offers: - Detailed attack analysis - Mimecast viewpoint - reduce sandbox reliance - Weaponized attachments - prevention and recommendations
Tags : 
mimecast, security, email security, email, cyber security, malware
    
Mimecast
Published By: MobileIron     Published Date: Feb 17, 2015
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : 
mobile, open file architecture, mobileiron, security, sandboxed
    
MobileIron
Published By: MobileIron     Published Date: Sep 22, 2014
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : 
mobile security, mobile first era, mobile operating systems, agent-based security, emm platforms, user productivity, wireless, enterprise applications
    
MobileIron
Published By: NetApp     Published Date: Jun 09, 2009
NetApp® SnapManager® for Oracle (SMO) is designed to significantly simplify all these tasks and more. In this article, we examine how you can deploy SMO to simplify and even automate data protection, recovery, and cloning across both primary and secondary storage. Learn more today!
Tags : 
netapp, snapmanager, oracle, smo, networked storage, snapmanager, dataontap, direct attached storage
    
NetApp
Published By: McAfee     Published Date: Apr 25, 2014
You spoke and we listened. Today’s advanced malware threats have you spending a lot of resources fighting an uphill battle. The answer is McAfee Advanced Threat Defense—so you can find, freeze, and fix threats.
Tags : 
advanced malware, maware threats, malware problems, malware attacks - rootkits, phishing, zero-access, trojans, apts
    
McAfee
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Why Cisco Umbrella is the simplest decision you can make to improve your company’s security. You have to make some serious security decisions when you’re an IT leader. That’s because both the volume and sophistication of attacks are intensifying relentlessly — and it’s clear that conventional defenses alone are no longer adequate. More effective blocking of attackers is particularly important because under-the-radar attacks are wreaking havoc on enterprises that rely on antivirus products, firewalls, and sandboxing alone. Umbrella is a proven service provider whose security services are completely nondisruptive. Download this whitepaper to find out more.
Tags : 
    
Cisco Umbrella EMEA
Previous    1 2     Next   
Search