filter

Results 126 - 147 of 147Sort Results By: Published Date | Title | Company Name
Published By: Microworld     Published Date: Dec 12, 2007
Due to its nature of open source code, Linux is fast becoming popular and is being deployed in ever increasing numbers on mail servers, corporate networks and desktops. Till recently, systems running on Linux were relatively free from virus and other threats. But with the greater penetration of Linux operating systems, virus authors have begun to target them.
Tags : 
virus, spam, linux, anti-spam, anti spam, anti virus, anti-virus, mailscan
    
Microworld
Published By: Microworld     Published Date: Dec 12, 2007
At the Mail Gateway, MailScan for SMTP Servers scans and cleans mails that flow between all local users and mails between the Internet and Mail Server. It protects organizations against Viruses, Worms, Trojans, Backdoors and many other malware, blocks Spam and Phishing mails, while providing total Content Security for email traffic.
Tags : 
mailscan, mail scan, email security, filtering, filter, email filter, blocking, internet security
    
Microworld
Published By: Microworld     Published Date: Dec 12, 2007
NILP from MicroWorld is an advanced, next generation technology that detects Spam and Phishing mails using unique algorithms. Before we see how NILP works, let’s first check out the magnitude of spam trouble and why traditional methods are failing to counter it.
Tags : 
spam, email security, anti-spam, anti spam, email, intrusion prevention, mail scan, mailscan
    
Microworld
Published By: Microworld     Published Date: Dec 12, 2007
Unwanted PopUp Ads are intrusive Internet advertisements that are displayed when you access web pages. This white paper provides information about different type of PopUp Ads, losses they cause, how they work and suggests key features that a good PopUp Ad Filter software should have.
Tags : 
pop-up, popup, ads, pop-up ad, pop-up ads, internet security, online security, virus
    
Microworld
Published By: Microworld     Published Date: Dec 12, 2007
Spam is the vilest manifestation of e-mail abuse. This white paper provides information about Spam, losses caused by Spam, how Spam works and suggests key features that a good Anti-Spam software should have.
Tags : 
email security, email, dos, ddos, denial of service, denial-of-service, spam, anti-spam
    
Microworld
Published By: MessageLabs     Published Date: Jan 13, 2009
Uncontrolled internet use brings web-malware, malicious links and Trojans to the corporate network.  Uncover the web security options available to your business.  Choosing the right solution can be complicated. FREE Web-filtering Buyer’s Guide (PDF/40KB)
Tags : 
messagelabs, web-filtering, web-filtering buyer’s guide, web-malware, malicious links, trojans, web security solution
    
MessageLabs
Published By: Bronto     Published Date: Jan 03, 2013
In light of the increasing use of preview panes, filters and the default blocking of images in popular email clients such as Outlook, Gmail and AOL, Bronto has outlined design best practices that will help you successfully reach your audience.
Tags : 
esp, email marketing, retail, automation, automated, marketing, digital marketing, software
    
Bronto
Published By: ChoiceStream     Published Date: Feb 04, 2009
ChoiceStream's approach towards personalization differs dramatically from others.  In "Traditional Approaches Contrasted with ChoiceStream's Universal Recommender" technology brief you'll learn about the components of personalization systems.  Most importantly, you’ll learn how to choose a winning algorithm that provides the right personalization solution for your online store.
Tags : 
choicestream, personalization technology brief, universal recommender, best-of-breed personalization, collaborative filtering, preference capture, algorithms
    
ChoiceStream
Published By: ChoiceStream     Published Date: Feb 04, 2009
ChoiceStream’s “Seven Key Requirements for Personalized Recommendation Services” white paper outlines e-commerce recommendation services and key capabilities that can improve sales revenue and customer engagement.  You’ll also receive a Recommendation Evaluation Scorecard to help you objectively summarize critical core requirements in order to maximize your return on investment.
Tags : 
choicestream, personalized recommendation services, quality recommendations, collaborative filtering, in-session click analysis, cohorts, cross-sells, cross-promotions
    
ChoiceStream
Published By: Genesys     Published Date: Mar 01, 2008
Filtration experts have discussed filter presses and their perceived shortcomings. This article discusses filter presses as well as the batch or continuous filtration alternatives to replace them.
Tags : 
    
Genesys
Published By: Visendo     Published Date: Sep 09, 2010
This whitepaper explains how SMBs can improve their mail security and increase their efficiency when storing, scanning, filtering emails with minimum investment and Visendo innovative email suite.
Tags : 
pop3 connector, antispam filter, anti-phisihing, email security for smbs
    
Visendo
Published By: Perimeter E-Security     Published Date: Oct 21, 2010
Read our guide to learn more about the popular malware methods cyber criminals are using to compromise internal systems.
Tags : 
malware, malicious website, firewalls, ids/ips, web content filtering, gateway av, network security solutions, host-based ips
    
Perimeter E-Security
Published By: QFilter.com     Published Date: Nov 23, 2010
The dangers posed by industrial Dust Explosions can affect a wide range of different industries. This article examines the topic, and gives recommendations on how to prevents such incidents from occurring.
Tags : 
dust explosions, dust control, dust safety, dust hazards, dust collection
    
QFilter.com
Published By: ETNA Software     Published Date: Feb 10, 2011
This whitepaper discusses various ways of filtering companies for electronic trading purposes.
Tags : 
filtering software, finance software, investment software, financial tools, trading, technology, software, financial services
    
ETNA Software
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Blue Coat WebFilter helps you easily manage web content by categorizing it into a discrete number of categories. Read about some of the new additions.
Tags : 
blue coat, webfilter, filter, categories, benefits, web content, manage, content management
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Blue Coat WebFilter is best-in-class for web threat protection, but content filtering databases have another key role to play: control of Internet use
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
Blue Coat WebFilter helps you easily manage web content by categorizing it into a discrete number of categories. Read about some of the new additions.
Tags : 
blue coat, webfilter, filter, categories, benefits, web content, manage, content management
    
Blue Coat Systems UK
Published By: ZScaler     Published Date: Dec 13, 2011
Leveraging a combined view of billions of daily web transactions-spanning millions of enterprise users across over 140 countries - Zscaler ThreatLabZ delivers the State of the Web Q3 2011 Report.
Tags : 
blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn
    
ZScaler
Published By: CDW Symantec     Published Date: Aug 02, 2012
With daily reports of network breaches on the way up, now is the time to double down on solid network protection. This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve.
Tags : 
data, identity, security, network, protection, mobile, security, documents
    
CDW Symantec
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Infosys     Published Date: Jan 02, 2019
Challenge: An air purifier manufacturer needed to remind customers to periodically change filters to maintain product efficiency and deliver consistent customer experience. Solution: We helped them develop a Bluetooth enabled smart air filter, where an embedded sensor measured the effectiveness of the filter and relayed that information to an iOS or Android app. Users were alerted when filters needed replacing, and given the opportunity to buy directly through online retailers and also to subscribe to the Amazon Device Replenishment Service. Outcomes: Increased revenue through replacement filter sales Expected to touch 50,000 users in the first year Integrated with Amazon Alexa for seamless digital experience Powerful product differentiation in a crowded market
Tags : 
    
Infosys
Published By: Intel     Published Date: Apr 11, 2019
Restaurants, like many industries, are data-rich environments that often do not have the tools or technologies to gather and mine the value from this data. Fast food chain automation is changing how restaurants calculate and manage costs on a daily basis. ARDIC's IoT-Ignite* analytics solution combines with Intel technologies to gather, filter, and analyze key variables to automate operations in fast-moving environments. For restaurants, benefits include reduced waste, insight into customer behaviour, and operational efficiencywith positive impact on the bottom line.
Tags : 
    
Intel
Start   Previous    1 2 3 4 5 6     Next   End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.