Micro Trend

Results: 398



#Item
341Computer security / Symantec Endpoint Protection / Kaspersky Lab / ESET / Symantec / Sophos / McAfee / Trend Micro / ESET NOD32 / Antivirus software / Software / System software

Fast and Effective Endpoint Security for Business 2012

Add to Reading List

Source URL: go.eset.com

Language: English - Date: 2012-11-27 11:34:54
342

SHI - Software House International Mandatory State Contract Software : Microsoft Trend Micro Symantec

Add to Reading List

Source URL: www.atu.edu

- Date: 2011-08-08 10:07:20
    343Computer security / Computer network security / Trend Micro / Cloud computing / Centralized computing / Computing

    Partner SUCCESS STORY Dedalus Relies on Trend Micro and Amazon Web Services to Protect Customers Trend Micro Deep Security helps customers meet shared security responsibility on AWS

    Add to Reading List

    Source URL: www.trendmicro.com

    Language: English - Date: 2014-06-24 03:23:20
    344Consumerization / Bring your own device / Productivity / KT Corporation / Technology / Mobile technology / Mobile device management

    A Forrester Consulting Thought Leadership Paper Commissioned By Trend Micro Key Strategies To Capture And Measure The Value Of Consumerization Of IT Enterprises Achieve A Wide Range Of Benefits By Deploying Bring-Your-O

    Add to Reading List

    Source URL: www.trendmicro.com

    Language: English - Date: 2013-04-25 21:20:01
    345Privilege escalation / Vulnerability / Firefox / Zero-day attack / Software / Computer security / Cyberwarfare

    Vendor Patched Advisory Trend Micro Products Multiple local privilege escalation vulnerabilities

    Add to Reading List

    Source URL: www.reversemode.com

    Language: English - Date: 2008-01-18 11:16:16
    346Steering wheel / Steering / Land transport / Tata Motors / Sedans / Sports cars / Micro Trend / Transport / Private transport / Human–machine interaction

    Bidder Name and Location Unit Price No. Units

    Add to Reading List

    Source URL: www.dot.wi.gov

    Language: English - Date: 2014-03-07 14:23:06
    347Espionage / Cryptography / Malware / Data security / Backdoor / Port / Firewall / Distributed firewall / Cracking of wireless networks / Computer network security / Cyberwarfare / Computer security

    A Trend Micro Research Paper Backdoor Use in Targeted Attacks Dove Chiu, Shih-Hao Weng, and Joseph Chiu Targeted Attack Defense Research Team

    Add to Reading List

    Source URL: www.trendmicro.com

    Language: English - Date: 2014-07-31 03:59:19
    348Cloud computing / Android / Malware / Mobile operating system / Mobile apps / Google Chrome OS / Microsoft Windows / Web threat / Android Market / Smartphones / Computing / Software

    Security Threats to Business, the Digital Lifestyle, and the Cloud: Trend Micro Predictions for 2013 and Beyond

    Add to Reading List

    Source URL: www.trendmicro.com

    Language: English - Date: 2012-12-12 22:34:07
    349Software / Webroot Software / Avira / Sophos / Symantec / Trend Micro / Malware / Webroot Internet Security Complete / Webroot Internet Security Essentials / Antivirus software / Computer security / System software

    WHITE PAPER > HOW RESELLERS CAN BECOME THE TRUSTED ADVISORS How Resellers Can Become the Trusted Advisors on Security Issues Boosting Customer Satisfaction and Loyalty with Superior Antivirus Protection

    Add to Reading List

    Source URL: custom.crn.com

    Language: English - Date: 2014-07-14 10:42:42
    350Computer security / Crime prevention / National security / Spamming / Advanced persistent threat / Malware / Password / Threat / Trend Micro / Computer network security / Security / Cyberwarfare

    SECURITY IN CONTEXT LATERAL MOVEMENT: How Do Threat Actors Move Deeper Into Your Network?

    Add to Reading List

    Source URL: about-threats.trendmicro.com

    Language: English - Date: 2013-05-22 02:06:43
    UPDATE