Perimeter eSecurity

Displaying 1-4 of 4 results

  • Webcasts // Feb 2011

    The Rise of the Machines: Defending Your Company Against Botnets

    The goal of modern malware is to silently compromise PCs, recruit them to be part of a botnet controlled by malicious attackers, and use them to steal information. Listen to this informative webcast presented by Andrew Jaquith, CTO of Perimeter E-Security and Lead Security Analyst Richard Westmoreland as they...

    Provided By Perimeter eSecurity

  • Webcasts // Jan 2011

    Advantages of Cloud Email Archiving

    Archiving in the cloud has been rapidly growing in popularity, offering a number of benefits which are attractive to companies of all sizes and all industries. These benefits are especially important in these times of tighter budgets and shrinking IT teams. However, security and legal compliance of cloud solutions continues...

    Provided By Perimeter eSecurity

  • White Papers // Aug 2009

    Will Facebook Get You Hired or Fired?

    Phishing is a common method cyber criminals use to lure individuals into giving up their personal information. Spear phishing is where the criminals target a specific group of users, for example all customers of a particular bank or credit union. Whaling is an even more directed attack at one particular...

    Provided By Perimeter eSecurity

  • White Papers // Aug 2009

    Social Networking: The Growing Threat to Businesses and Individuals

    Social Networking is a phenomenon that has officially grown out of control. It means that literally. It has grown to the point where neither the users nor the social networking companies themselves can control these monsters that have been created. It reminds of the movie Jurassic Park where a wealthy...

    Provided By Perimeter eSecurity

  • Webcasts // Jan 2011

    Advantages of Cloud Email Archiving

    Archiving in the cloud has been rapidly growing in popularity, offering a number of benefits which are attractive to companies of all sizes and all industries. These benefits are especially important in these times of tighter budgets and shrinking IT teams. However, security and legal compliance of cloud solutions continues...

    Provided By Perimeter eSecurity

  • Webcasts // Feb 2011

    The Rise of the Machines: Defending Your Company Against Botnets

    The goal of modern malware is to silently compromise PCs, recruit them to be part of a botnet controlled by malicious attackers, and use them to steal information. Listen to this informative webcast presented by Andrew Jaquith, CTO of Perimeter E-Security and Lead Security Analyst Richard Westmoreland as they...

    Provided By Perimeter eSecurity

  • White Papers // Aug 2009

    Social Networking: The Growing Threat to Businesses and Individuals

    Social Networking is a phenomenon that has officially grown out of control. It means that literally. It has grown to the point where neither the users nor the social networking companies themselves can control these monsters that have been created. It reminds of the movie Jurassic Park where a wealthy...

    Provided By Perimeter eSecurity

  • White Papers // Aug 2009

    Will Facebook Get You Hired or Fired?

    Phishing is a common method cyber criminals use to lure individuals into giving up their personal information. Spear phishing is where the criminals target a specific group of users, for example all customers of a particular bank or credit union. Whaling is an even more directed attack at one particular...

    Provided By Perimeter eSecurity