The role of sandboxing in advanced malware detection

Client security

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Endpoint security: Decision time

    Learn how to evaluate your potential endpoint solution and its ability to integrate into your environment. 

  • Endpoint security: RFP technology decisions

    Learn the different options of endpoint protection software and how each feature helps to detect and stop malicious behavior. 

  • Endpoint security: From business problem to technical solution

    Learn how endpoint protection software can help block malicious network traffic while providing secure access to your data. 

  • IT decision center: Endpoint security

    While antivirus detection capability was for years the most important metric in deciding how to protect endpoints, it's probably the least effective way to rank the pack of endpoint protection suites on the market today. For one thing, all the major ... 

  • Developing your endpoint security management transition plan

    This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based malware defense and signature-based antivirus with new malware-detection technologies, ensuring Web secur... 

  • Enterprise network security visibility: Beyond traditional defenses

    Organizations have implemented various network security technologies to gain better visibility into their networks. However, these security technologies place an increased demand on the network. This TechGuide explores how to improve network security... 

  • State of the art endpoint management

    Employees use cloud services for work whether they’re sanctioned by IT or not. IT's only choices -- aside from blocking every service, which won’t make users happy -- are to embrace these services or develop user- and IT-friendly alternatives. It’s n... 

  • Cloud initiatives are changing roles for information security managers

    This edition features the results of our 2011 priorities survey. Today's information security managers are getting more of a say in enterprise cloud initiatives and mobile device projects. Plus, learn from the experts about the best ways to enforce ... 

  • Combatting the new security threats of today's mobile devices

    This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subje... 

  • Comparing seven top integrated endpoint security suites

    A colorful array of seven complex integrated endpoint security suites is put to the test. See which fared best. Also in this issue, learn more about revamping remote access, getting to know honeyclients and winning the Web 2.0 tug-of-war. 

  • Examining device-based authentication

    Combining device-based authentication technology with existing user-based authentication would be appealing for many organizations, but technical details remain unclear. 

  • SmartScreen

    SmartScreen is a Microsoft filtering tool designed to detect and block suspicious and malicious sites, applications and files. The program checks the safety of websites and downloads and tracks malware and phishing attempts. Introduced in Windows 7'... 

  • Roots of Trust (RoT)

    Roots of Trust (RoT) is a set of functions in the trusted computing module that are always trusted by the computer’s operating system (OS). The RoT serves as separate compute engine controlling the trusted computing platform cryptographic processor o... 

  • password blacklist

    A password blacklist is a list of words disallowed as user passwords due to their commonplace use. Blacklists may also incorporate rules to prevent the use of common passwords with frequently-used modifications such as capital letters, standard subst... 

  • password strength meter

    A password strength meter is an indicator, either in graphical or text form, of the strength of a password as entered by a user. A password strength meter shows how resistant a given password might be to cracking attempts like brute force attacks. 

  • local wipe

    Local wipe, also known as auto-wipe, is deletion of a device's data which is initiated by software on the device itself, rather than through remote administration. A local wipe may be automatically conducted in response to a number of failed login a... 

  • Lookout Mobile Security

    Lookout Mobile Security is an antimalware, data backup and remote management app for smartphones and tablets. 

  • buffer overflow

    A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. 

  • email spoofing

    E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. 

  • phishing

    Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. 

  • social engineering

    Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. 

  • See more Definitions on Client security
  • SmartScreen

    SmartScreen is a Microsoft filtering tool designed to detect and block suspicious and malicious sites, applications and files. The program checks the safety of websites and downloads and tracks malware and phishing attempts. Introduced in Windows 7'... 

  • Mobile security market moves away from FUD

    Citrix's chief security strategist says the lock-everything-down mentality can hinder mobile productivity. 

  • Sandboxing security: A cure-all strategy for virtual environments?

    Sandboxing is a limited technology. Expert Brad Casey explores the margins and supplemental products organizations can use in virtual environments. 

  • Experts: Merely ousting Bennett won't solve Symantec strategy problems

    Experts say firing Steve Bennett overshadows the larger problems with the Symantec strategy, namely the company's lack of focus on security. 

  • Cut Microsoft admin rights to mitigate 92% of threats, study shows

    Removing Microsoft admin rights from employees mitigates 92% of critical vulnerabilities reported in 2013 

  • Roots of Trust (RoT)

    Roots of Trust (RoT) is a set of functions in the trusted computing module that are always trusted by the computer’s operating system (OS). The RoT serves as separate compute engine controlling the trusted computing platform cryptographic processor o... 

  • password blacklist

    A password blacklist is a list of words disallowed as user passwords due to their commonplace use. Blacklists may also incorporate rules to prevent the use of common passwords with frequently-used modifications such as capital letters, standard subst... 

  • password strength meter

    A password strength meter is an indicator, either in graphical or text form, of the strength of a password as entered by a user. A password strength meter shows how resistant a given password might be to cracking attempts like brute force attacks. 

  • Microsoft to offer Windows XP antivirus updates past April 2014

    Software giant Microsoft will extend Windows XP antivirus updates past the XP end-of-life date, but security patches are still slated to end in April. 

  • Securing endpoint devices with code-execution prevention

    A survey revealed 54% of enterprises don't know if they use code-execution prevention on networked endpoint devices. Does your organization? 

  • See more All on Client security
About Client security

Develop client security and get information on client security software, how to build, implement and maintain secure procedures, awareness training and assessments for keeping your network safe from potentially unsecure laptops, desktops, and other endpoint machines.