M86 Security

Displaying 1-9 of 9 results

  • White Papers // Jul 2010

    MailMarshal 6.X Performance Benchmarking

    The goal of the research described was to provide a measure of the performance of MailMarshal SMTP 6.0 under several common customer configurations. The evaluation was performed using typical modern server grade hardware that would be readily available to a customer. The summary discussion gives some guidance given on configurations,...

    Provided By M86 Security

  • White Papers // Jun 2010

    Social Networking: The Pros, the Cons and the Solution

    Social networking sites such as Facebook, MySpace, LinkedIn and Bebo have permeated society and the workplace over recent years. Organizations are right to embrace these sites as an extra weapon in their sales and marketing armoury. This M85 whitepaper shows how organisations can do this secure in the knowledge that...

    Provided By M86 Security

  • White Papers // Jun 2010

    Executive Guide to Internal Data Theft

    This whitepaper looks at an inescapable trend - the increasing threat of confidential data being removed from the network inside the organization through the use of removable media devices. It shows how M86 EndPoint Security stops opportunists and criminals from copying information to or from the network - significantly reducing...

    Provided By M86 Security

  • White Papers // Jun 2010

    Are Bots About to Bring Down Your Business?

    There's some good news these days on the IT security front: Cybercriminals don't want to knock your network offline. The bad news? They want to use it for launching attacks that are more distributed, more profitable, and potentially more damaging to your business than ever before. This free whitepaper looks...

    Provided By M86 Security

  • White Papers // Jun 2010

    M86 - Are Proxy Anonymizers Putting Your Enterprise in Peril?

    Chances are, your company deploys Web filters to fight off the threats lurking in cyberspace. And chances are, some of your employees have no trouble bypassing them. This whitepaper looks at how they maybe undermining your best efforts to defend the enterprise, and what you and your organisation can do.

    Provided By M86 Security

  • White Papers // Apr 2010

    Hybrid Web Security: The Best of Cloud Computing and On-Premises Combined

    Web security has evolved along with the Web itself, and the varying threats and attacks that need to be controlled at any one time. Initially, the biggest threat to people using the Web was one of accidently viewing inappropriate content. This is where the original Block lists came from such...

    Provided By M86 Security

  • White Papers // Dec 2009

    Predictions 2010: M86 Security Labs Threat Predictions for the Year Ahead

    2009 has been notable for several high profile 'Wins' such as the successful takedown of the 3FN hosting company, the second takedown in over a year of a rogue Internet Service Provider, followed by the disabling of the Mega-D botnet. While these successes are significant wins for the white hat...

    Provided By M86 Security

  • White Papers // Sep 2009

    Are Proxy Anonymizers Putting Your Enterprise in Peril?

    Chances are, the company deploys Web filters to fight off the threats lurking in cyberspace. And chances are, some of the employees have no trouble bypassing them. How are they undermining the best efforts to defend the enterprise? By accessing Web pages hosting proxy anonymizers, simple scripts that give surfers...

    Provided By M86 Security

  • White Papers // Sep 2009

    Today's Blended Threats: Identifying and Stopping the Growing Problem of Web-Based Attacks

    Organizations of all sizes continue to be challenged by increasingly sophisticated security threats. Attackers, motivated by financial gain, are constantly inventing new ways to penetrate corporate defenses and access valuable data. Their tools include new zero-day attacks, targeted threats, use of mass variant attacks and now, blended threats delivered via...

    Provided By M86 Security

  • White Papers // Apr 2010

    Hybrid Web Security: The Best of Cloud Computing and On-Premises Combined

    Web security has evolved along with the Web itself, and the varying threats and attacks that need to be controlled at any one time. Initially, the biggest threat to people using the Web was one of accidently viewing inappropriate content. This is where the original Block lists came from such...

    Provided By M86 Security

  • White Papers // Jul 2010

    MailMarshal 6.X Performance Benchmarking

    The goal of the research described was to provide a measure of the performance of MailMarshal SMTP 6.0 under several common customer configurations. The evaluation was performed using typical modern server grade hardware that would be readily available to a customer. The summary discussion gives some guidance given on configurations,...

    Provided By M86 Security

  • White Papers // Jun 2010

    Social Networking: The Pros, the Cons and the Solution

    Social networking sites such as Facebook, MySpace, LinkedIn and Bebo have permeated society and the workplace over recent years. Organizations are right to embrace these sites as an extra weapon in their sales and marketing armoury. This M85 whitepaper shows how organisations can do this secure in the knowledge that...

    Provided By M86 Security

  • White Papers // Jun 2010

    Executive Guide to Internal Data Theft

    This whitepaper looks at an inescapable trend - the increasing threat of confidential data being removed from the network inside the organization through the use of removable media devices. It shows how M86 EndPoint Security stops opportunists and criminals from copying information to or from the network - significantly reducing...

    Provided By M86 Security

  • White Papers // Jun 2010

    Are Bots About to Bring Down Your Business?

    There's some good news these days on the IT security front: Cybercriminals don't want to knock your network offline. The bad news? They want to use it for launching attacks that are more distributed, more profitable, and potentially more damaging to your business than ever before. This free whitepaper looks...

    Provided By M86 Security

  • White Papers // Jun 2010

    M86 - Are Proxy Anonymizers Putting Your Enterprise in Peril?

    Chances are, your company deploys Web filters to fight off the threats lurking in cyberspace. And chances are, some of your employees have no trouble bypassing them. This whitepaper looks at how they maybe undermining your best efforts to defend the enterprise, and what you and your organisation can do.

    Provided By M86 Security

  • White Papers // Dec 2009

    Predictions 2010: M86 Security Labs Threat Predictions for the Year Ahead

    2009 has been notable for several high profile 'Wins' such as the successful takedown of the 3FN hosting company, the second takedown in over a year of a rogue Internet Service Provider, followed by the disabling of the Mega-D botnet. While these successes are significant wins for the white hat...

    Provided By M86 Security

  • White Papers // Sep 2009

    Today's Blended Threats: Identifying and Stopping the Growing Problem of Web-Based Attacks

    Organizations of all sizes continue to be challenged by increasingly sophisticated security threats. Attackers, motivated by financial gain, are constantly inventing new ways to penetrate corporate defenses and access valuable data. Their tools include new zero-day attacks, targeted threats, use of mass variant attacks and now, blended threats delivered via...

    Provided By M86 Security

  • White Papers // Sep 2009

    Are Proxy Anonymizers Putting Your Enterprise in Peril?

    Chances are, the company deploys Web filters to fight off the threats lurking in cyberspace. And chances are, some of the employees have no trouble bypassing them. How are they undermining the best efforts to defend the enterprise? By accessing Web pages hosting proxy anonymizers, simple scripts that give surfers...

    Provided By M86 Security