Cisco AMP for Endpoints: Exploit Prevention

March 30, 2019

Memory attacks penetrate via endpoints and malware evades security defenses by exploiting vulnerabilities in applications and operating system processes. A majority of these attacks operate in the memory space of the exploited application and remain untouched by most security solutions once they gain access to the memory.

Spotlight

ContentKeeper Technologies

ContentKeeper Technologies is a global leader in innovative, scalable, fault-tolerant, enterprise Internet filtering and security solutions. ContentKeeper provides proven Web security solutions to secure today’s Web 2.0 and mobile centric business environments. Our solutions enable organizations to protect and control gateway Internet access and to embrace mobile technology, social media and cloud-based services without compromising security. Even in today’s evolving threat landscape, ContentKeeper’s advanced, multi-layered behavioral analysis technology with high speed SSL (decrypted) packet inspection ensures mission critical Internet resources and services are protected – regardless of the device being used or where employees are located. ContentKeeper’s Multi-Gig, layer 2 bridge design maximizes scalability, high performance and reliability. Real-time Web content and threat analysis engines are backed by our patented (Closed Loop Collaborative Filtering) shared intelligence network

OTHER WHITEPAPERS
news image

Is Cyber Security Meeting Today’s Intensifying Challenges?

whitePaper | September 22, 2022

Cybersecurity has always been critical, but it’s taken on new urgency today. Cyberattacks have escalated in intensity and volume. At the same time, IT is experiencing the pressing challenges of a technology modernization revolution. Driving this tech revolution are remote work environments, a skills shortage and unprecedented growth in cloud deployments. These developments bring increasing requirements to proactively secure environments, deflect risks and rapidly respond to cyberattacks.

Read More
news image

The State of Mobile App Security 2022

whitePaper | July 28, 2022

Mobile apps have become key tools for businesses to serve customers, earn revenue, and enable remote work by employees. Over the last two years, mobile apps have become critical to success for the majority of businesses.

Read More
news image

Ransomware Data Recovery Architectures

whitePaper | September 26, 2022

Ransomware attacks have been on the rise in recent years. They are extremely insidious in nature and have been foremost in many CEOs’ and CIOs’ minds lately. Ransomware is malware that prevents an enterprise from accessing and using its data, usually by encrypting the data in an inconspicuous manner so the victim does not know the attack is occurring.

Read More
news image

Cybersecurity Whitepaper 2018

whitePaper | December 12, 2019

Most of the Small to medium-sized companies are unaware about the ways in which they’re vulnerable. More than 45% mistakenly believe they’re not a viable victim. They are just too small a target in comparison to larger organizations and tend to have a blind eye towards the cyber threats they face, which is in sharp contrast to what attackers think.

Read More
news image

Understanding Ransomware and Strategies to Defeat it

whitePaper | March 5, 2020

Held Hostage in Hollywood: In February 2016 the Hollywood Presbyterian Medical Center, in Los Angeles, paid a ransom of about US$17,000 to hackers who infiltrated and disabled its computer network with ransomware. The hospital paid the ransom of 40 Bitcoins (currently worth about $16,664) after a “network infiltration” began on February 5, when employees reported being unable to access the hospital’s network and electronic medical records system. “The malware locked access to certain computer systems and prevented us from sharing communications electronically,” said hospital CEO Allen Stefanek.

Read More
news image

Asana Security and Privacy

whitePaper | October 26, 2022

Customers trust Asana with their data so that they can focus on the work that matters most to their businesses. That’s why we’re focused not only on creating an easy to-use collaborative work management solution, but also on keeping our customers’ data safe.

Read More

Spotlight

ContentKeeper Technologies

ContentKeeper Technologies is a global leader in innovative, scalable, fault-tolerant, enterprise Internet filtering and security solutions. ContentKeeper provides proven Web security solutions to secure today’s Web 2.0 and mobile centric business environments. Our solutions enable organizations to protect and control gateway Internet access and to embrace mobile technology, social media and cloud-based services without compromising security. Even in today’s evolving threat landscape, ContentKeeper’s advanced, multi-layered behavioral analysis technology with high speed SSL (decrypted) packet inspection ensures mission critical Internet resources and services are protected – regardless of the device being used or where employees are located. ContentKeeper’s Multi-Gig, layer 2 bridge design maximizes scalability, high performance and reliability. Real-time Web content and threat analysis engines are backed by our patented (Closed Loop Collaborative Filtering) shared intelligence network

Events