White Papers: Trend Micro


Sort by: Date | Company | Title


Detecting the Enemy Inside the Network - How Tough Is It?
By Trend Micro | 22/10/2012
Advanced persistent threats (APTs) refer to a category of threats that pertain to computer intrusions by threat actors that aggressively pursue and compromise chosen targets. APTs are often conducted in campaigns, which consist of a series of failed and successful attempts over time to get deeper and deeper into a target’s network and are therefore not isolated incidents. Download to find out more!
Download this now


ESG - Understanding and Addressing APTs
By Trend Micro | 22/10/2012
Three years ago, few people outside of the U.S. Department of Defense (DoD) or other military/intelligence organisations had heard of Advanced Persistent Threats (APTs). Now these kinds of targeted cyber attacks have become routine with discussion extending across the technology, business, and mainstream media. In this whitepaper, we look at exactly are APTs and what enterprise organisations are doing to defend themsleves. Read more!
Download this now


Best Practices for Mitigating Advanced Persistent Threats
By Trend Micro | 22/10/2012
Today, many security practitioners do not acknowledge that there are advanced threats that have bypassed their security protection techniques and reside undetected on their systems. In this whitepaper, we look at how research will enable security practitioners to understand these new threats and steps they must take in order to reduce the risk of being compromised. Click to download.
Download this now


Information Security, Virtualisation, and the Journey to the Cloud
By Trend Micro | 14/7/2011
As organisations expand their virtualisation deployments to application and desktop virtualisation, they will find themselves on the road to cloud computing. In this ESG whitepaper, we look at the multi-phase processes IT organisations will undergo and offer guidance on how each phase provides an opportunity to not only increase optimisation and efficiency, but enhance security as well.
Download this now


The Challenges of Securing a Virtual IT Infrastructure
By Trend Micro | 13/11/2012
Compelling new date from IDG Research spotlights the most pressing challenges facing organisations globally around virtualisation and security in data centers and clouds environments. As security professionals work to secure virtualization, an array of issues logically enter the equation. Find out what these are and how to best resolve them. Click to download!
Download this now


Checking Cloud Service Providers
By Trend Micro | 13/2/2013
In this whitepaper, we look at how to help enterprises overcome the complex data and threat security risks that inhibit them from adopting cloud computing. We find out how enterprise companies need a validated set of trusted security tools that compliments your internal IT controls, helps you overcome fear about cloud security, and enhances your ability to fully embrace cloud computing. Learn more.
Download this now


How to Reference Testing Procedures
By Trend Micro | 13/2/2013
Many organizations are looking to the cloud for increasing computational capacity or lowering costs of ownership. While the security issues facing a traditional corporate network are well understood, the challenges of using the cloud are more complex. In this whitepaper, we explore how responsibility is shared between the cloud provider and the customer, and what is the most secure practice for cloud computing. Download for more!
Download this now


Protecting the Dynamic Datacentre
By Trend Micro | 13/2/2013
The purpose of IT security is to enable your business, not impede it, in an environment where the challenges and complexity you face for your IT security grow every day. Compliance requirements impose security standards for data and applications on servers, however organisations continue to struggle to balance the need to protect their business in significant ways. Find out how security changes when you move from traditional servers to the cloud-based solutions.
Download this now


Kill Your Data To Protect It From Cybercriminals
By Trend Micro | 13/2/2013
There are two types of data: the kind of data that someone wants to steal and everything else. Most security professionals today do not understand the motivations behind data theft. In this Forrester whitepaper, we explore how encrypting, and thereby devaluing, your sensitive data, you can make cybercriminals bypass your networks and look for less robustly protected targets. Find out how to use encryption, tokenization, and other technologies to “kill your data". Click to download!
Download this now


Cost Savings Through Virtual Patching
By Trend Micro | 13/2/2013
Software patches have long been an integral aspect of maintenance and development for any product or system. Regular patches allow a system to undergo dynamic growth, evolving to meet new needs, respond to new developments, or address emergent weaknesses. In this whitepaper, we address the cost savings and overall gains to security and stability that an enterprise can accrue through the implementation of virtual patching technology. Click to download!
Download this now

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?