The role of sandboxing in advanced malware detection

Client security

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Endpoint security: Decision time

    Learn how to evaluate your potential endpoint solution and its ability to integrate into your environment. 

  • Endpoint security: RFP technology decisions

    Learn the different options of endpoint protection software and how each feature helps to detect and stop malicious behavior. 

  • Endpoint security: From business problem to technical solution

    Learn how endpoint protection software can help block malicious network traffic while providing secure access to your data. 

  • IT decision center: Endpoint security

    While antivirus detection capability was for years the most important metric in deciding how to protect endpoints, it's probably the least effective way to rank the pack of endpoint protection suites on the market today. For one thing, all the major ... 

  • Developing your endpoint security management transition plan

    This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based malware defense and signature-based antivirus with new malware-detection technologies, ensuring Web secur... 

  • Enterprise network security visibility: Beyond traditional defenses

    Organizations have implemented various network security technologies to gain better visibility into their networks. However, these security technologies place an increased demand on the network. This TechGuide explores how to improve network security... 

  • State of the art endpoint management

    Employees use cloud services for work whether they’re sanctioned by IT or not. IT's only choices -- aside from blocking every service, which won’t make users happy -- are to embrace these services or develop user- and IT-friendly alternatives. It’s n... 

  • Cloud initiatives are changing roles for information security managers

    This edition features the results of our 2011 priorities survey. Today's information security managers are getting more of a say in enterprise cloud initiatives and mobile device projects. Plus, learn from the experts about the best ways to enforce ... 

  • Combatting the new security threats of today's mobile devices

    This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subje... 

  • Comparing seven top integrated endpoint security suites

    A colorful array of seven complex integrated endpoint security suites is put to the test. See which fared best. Also in this issue, learn more about revamping remote access, getting to know honeyclients and winning the Web 2.0 tug-of-war. 

  • Examining device-based authentication

    Combining device-based authentication technology with existing user-based authentication would be appealing for many organizations, but technical details remain unclear. 

  • Roots of Trust (RoT)

    Roots of Trust (RoT) is a set of functions in the trusted computing module that are always trusted by the computer’s operating system (OS). The RoT serves as separate compute engine controlling the trusted computing platform cryptographic processor o... 

  • password blacklist

    A password blacklist is a list of words disallowed as user passwords due to their commonplace use. Blacklists may also incorporate rules to prevent the use of common passwords with frequently-used modifications such as capital letters, standard subst... 

  • password strength meter

    A password strength meter is an indicator, either in graphical or text form, of the strength of a password as entered by a user. A password strength meter shows how resistant a given password might be to cracking attempts like brute force attacks. 

  • local wipe

    Local wipe, also known as auto-wipe, is deletion of a device's data which is initiated by software on the device itself, rather than through remote administration. A local wipe may be automatically conducted in response to a number of failed login a... 

  • Lookout Mobile Security

    Lookout Mobile Security is an antimalware, data backup and remote management app for smartphones and tablets. 

  • buffer overflow

    A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. 

  • email spoofing

    E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. 

  • phishing

    Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. 

  • social engineering

    Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. 

  • Wired Equivalent Privacy (WEP)

    Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usua... 

  • See more Definitions on Client security
About Client security

Develop client security and get information on client security software, how to build, implement and maintain secure procedures, awareness training and assessments for keeping your network safe from potentially unsecure laptops, desktops, and other endpoint machines.