Company: Intel UK
Category: Data Security
Published: November 2012
Unlike yesteryear's amateur virus-producing hackers, who created widespread threats, today's cyber-criminals instigate much more specific attacks. Criminals are using stealth techniques to deliver their crimeware, allowing it to find targets and dig in below the operating system (OS). This paper surveys embedded technologies and how they can help IT's toughest security challenges.
Data Governance | June 2013 | White Paper
Endpoint Security | June 2013 | Case Study
Data Centre Power Management | June 2013 | Case Study
Enterprise Performance Management | May 2013 | Case Study
Data Security | May 2013 | Case Study
© Incisive Media Investments Limited 2013, Published by Incisive Financial Publishing Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 04252091 & 04252093.