Whitepaper Posted by: dymar on 06/03/2018 10:26

THALES – Secure Execution Engine

Traditional approaches to computer security can result in an uneven spread of security around a company’s networks and computers. Parts of the environment may be extremely well protected; others may not, and gaps in security measures can create vulnerabilities.With such a high proportion of mission critical systems connected to open systems such as the Internet, there are real possibilities that …

Whitepaper Posted by: dymar on 06/03/2018 10:26

SOPHOS – Assessing endpoint security solutions

Evaluating the performance of competing endpoint security products is a time-consuming and daunting task. Enterprise decision-makers have to rely on independent competitive comparisons, performance benchmarks, and detection certifications, all covering different solutions and criteria, providing conflicting results. This paper highlights the pitfalls of simply looking at virus detection rates and investigates the effect of the rapidly developing IT environment and …

Whitepaper Posted by: dymar on 06/03/2018 10:26

THALES – Certification Authorities

  In days of old, introductions were made by means of credentials, issued by a trusted party. In some cases, such credentials were accepted more or less at a global level. A good example of this is the ordinary passport, supported, if necessary, by additional documentation, such as a visa. In this case, the trusted issuer of the credential is …

Whitepaper Posted by: dymar on 06/03/2018 10:26

SOPHOS – Protection for Mac and Linux computers

The current risk to computers running non-Windows platforms is small but growing. As Mac and Linux computers become more prevalent within organizations, they are likely to become more of a target for hackers as a way in to the rest of the network and a means of infecting websites. This paper investigates the real threat from non-Windows platforms. It discusses …

Page 2 of 3123