M86 Security

Displaying 1-5 of 5 results

  • White Papers // Jul 2010

    MailMarshal 6.X Performance Benchmarking

    The goal of the research described was to provide a measure of the performance of MailMarshal SMTP 6.0 under several common customer configurations. The evaluation was performed using typical modern server grade hardware that would be readily available to a customer. The summary discussion gives some guidance given on configurations,...

    Provided By M86 Security

  • White Papers // Apr 2010

    Hybrid Web Security: The Best of Cloud Computing and On-Premises Combined

    Web security has evolved along with the Web itself, and the varying threats and attacks that need to be controlled at any one time. Initially, the biggest threat to people using the Web was one of accidently viewing inappropriate content. This is where the original Block lists came from such...

    Provided By M86 Security

  • White Papers // Dec 2009

    Predictions 2010: M86 Security Labs Threat Predictions for the Year Ahead

    2009 has been notable for several high profile 'Wins' such as the successful takedown of the 3FN hosting company, the second takedown in over a year of a rogue Internet Service Provider, followed by the disabling of the Mega-D botnet. While these successes are significant wins for the white hat...

    Provided By M86 Security

  • White Papers // Sep 2009

    Are Proxy Anonymizers Putting Your Enterprise in Peril?

    Chances are, the company deploys Web filters to fight off the threats lurking in cyberspace. And chances are, some of the employees have no trouble bypassing them. How are they undermining the best efforts to defend the enterprise? By accessing Web pages hosting proxy anonymizers, simple scripts that give surfers...

    Provided By M86 Security

  • White Papers // Sep 2009

    Today's Blended Threats: Identifying and Stopping the Growing Problem of Web-Based Attacks

    Organizations of all sizes continue to be challenged by increasingly sophisticated security threats. Attackers, motivated by financial gain, are constantly inventing new ways to penetrate corporate defenses and access valuable data. Their tools include new zero-day attacks, targeted threats, use of mass variant attacks and now, blended threats delivered via...

    Provided By M86 Security

  • White Papers // Apr 2010

    Hybrid Web Security: The Best of Cloud Computing and On-Premises Combined

    Web security has evolved along with the Web itself, and the varying threats and attacks that need to be controlled at any one time. Initially, the biggest threat to people using the Web was one of accidently viewing inappropriate content. This is where the original Block lists came from such...

    Provided By M86 Security

  • White Papers // Jul 2010

    MailMarshal 6.X Performance Benchmarking

    The goal of the research described was to provide a measure of the performance of MailMarshal SMTP 6.0 under several common customer configurations. The evaluation was performed using typical modern server grade hardware that would be readily available to a customer. The summary discussion gives some guidance given on configurations,...

    Provided By M86 Security

  • White Papers // Dec 2009

    Predictions 2010: M86 Security Labs Threat Predictions for the Year Ahead

    2009 has been notable for several high profile 'Wins' such as the successful takedown of the 3FN hosting company, the second takedown in over a year of a rogue Internet Service Provider, followed by the disabling of the Mega-D botnet. While these successes are significant wins for the white hat...

    Provided By M86 Security

  • White Papers // Sep 2009

    Today's Blended Threats: Identifying and Stopping the Growing Problem of Web-Based Attacks

    Organizations of all sizes continue to be challenged by increasingly sophisticated security threats. Attackers, motivated by financial gain, are constantly inventing new ways to penetrate corporate defenses and access valuable data. Their tools include new zero-day attacks, targeted threats, use of mass variant attacks and now, blended threats delivered via...

    Provided By M86 Security

  • White Papers // Sep 2009

    Are Proxy Anonymizers Putting Your Enterprise in Peril?

    Chances are, the company deploys Web filters to fight off the threats lurking in cyberspace. And chances are, some of the employees have no trouble bypassing them. How are they undermining the best efforts to defend the enterprise? By accessing Web pages hosting proxy anonymizers, simple scripts that give surfers...

    Provided By M86 Security