Trend Micro Whitepapers


Sort by: Date | Company | Title


Detecting the Enemy Inside the Network - How Tough Is It?
By Trend Micro | 22/10/2012
Advanced persistent threats (APTs) refer to a category of threats that pertain to computer intrusions by threat actors that aggressively pursue and compromise chosen targets. APTs are often conducted in campaigns, which consist of a series of failed and successful attempts over time to get deeper and deeper into a target’s network and are therefore not isolated incidents. Download to find out more!
Download this now


Devising a Server Protection Strategy with Trend Micro
By Trend Micro | 13/11/2012
With so many Information Technology solutions available to choose from today, many organizations put their trust in the experience, insight and advice of Gartner, and their industry-leading analysts. Trend Micro’s portfolio of solutions meets and exceeds Gartner’s recommendations on how to devise a server protection strategy. Precisely how Trend Micro does it is detailed in this whitepaper. Read now.
Download this now


ESG - Understanding and Addressing APTs
By Trend Micro | 22/10/2012
Three years ago, few people outside of the U.S. Department of Defense (DoD) or other military/intelligence organisations had heard of Advanced Persistent Threats (APTs). Now these kinds of targeted cyber attacks have become routine with discussion extending across the technology, business, and mainstream media. In this whitepaper, we look at exactly are APTs and what enterprise organisations are doing to defend themsleves. Read more!
Download this now


Global Cloud Security Software Market
By Trend Micro | 14/10/2013
Even though the Global Cloud Security Software market is currently growing at a rate of over 25%, the market is pegged with strong growth inhibitors, including the lack of awareness among end-users about the risks associated with cloud computing. In this whitepaper, we look at the market as a whole and its direction into the future.
Download this now


Helping Companies Fight Against Targeted Attacks
By Trend Micro | 23/9/2013
Given the advances attackers have been making, it is very unlikely that organizations will be able to keep motivated and patient adversaries out of their networks. In most cases, the best one can hope for is to detect targeted attacks early and limit the amount of information the attackers can obtain access to. In this whitepaper, we identify the timeline of a typical attack sequence and the tools available for implementing custom defence strategies.
Download this now


How Threat Actors Steal Your Data
By Trend Micro | 23/9/2013
Advanced Persistent Threats strive to remain undetected in the network in order to gain access to the valuable data. Once in, it can be an arduous task for system administrators to detect any malicious activity in the network. In this whitepaper, we look at the methods used for malicious activity and what efforts can be taken to mitigate the problem.
Download this now


How to Reference Testing Procedures
By Trend Micro | 13/2/2013
Many organizations are looking to the cloud for increasing computational capacity or lowering costs of ownership. While the security issues facing a traditional corporate network are well understood, the challenges of using the cloud are more complex. In this whitepaper, we explore how responsibility is shared between the cloud provider and the customer, and what is the most secure practice for cloud computing. Download for more!
Download this now


Information Security, Virtualisation, and the Journey to the Cloud
By Trend Micro | 20/2/2013
According to ESG research, virtualisation technology investments top the priority list in 2010 as nearly 60% of large and small organisations will increase their spending on virtualisation technology. Why? Because its optimisation and efficiency benefits are measurable and real. Learn how this can be true.
Download this now


Information Security, Virtualisation, and the Journey to the Cloud
By Trend Micro | 14/7/2011
As organisations expand their virtualisation deployments to application and desktop virtualisation, they will find themselves on the road to cloud computing. In this ESG whitepaper, we look at the multi-phase processes IT organisations will undergo and offer guidance on how each phase provides an opportunity to not only increase optimisation and efficiency, but enhance security as well.
Download this now


Keeing Virtualisation & Cloud Security Cost-effective
By Trend Micro | 13/2/2013
Virtualisation and cloud computing can help your organisation achieve a significant ROI as well as savings in hardware costs, operational expenditures, and energy demands - all while achieving improvements in service quality and business agility. Despite this potential, many organisations maintain their existing physical server security, unaware that this limits their ability to maximize their use of virtualisation and cloud technologies. Find out how to identify these security gaps and how best to close them. Click to download!
Download this now

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?