Search Results: M86 Security
1-14 of 14 results

Clyst Vale Community College

Clyst Vale Community College was founded in 1960 as Broadclyst Secondary Modern, becoming a comprehensive for 11 to 16-year-olds and community...

Published 09 December 2010

Fife Constabulary Police the Internet with M86 Security

Fife Constabulary, in Scotland is dedicated to reducing crime and reinforcing the quality of life for Fife residents all year round as well as for...

Published 09 December 2010

Napier University’s Investigation Pays Off with the M86 Security Internet Filtering and Reporting Solution

Located in Edinburgh, Scotland, Napier University is a dynamic, innovative and forward-looking institution committed to high education standards....

Published 09 December 2010

Nottingham University Hospitals NHS Trust

Nottingham University Hospitals NHS Trust (NUH) is one of the largest in the UK, with an annual budget of more than £500 million.

Published 09 December 2010

An Inside Job: Extending Enterprise Protection to Remote Laptops

IT managers face significant threats from remote workers and business travellers — in fact virtually any employee who takes a laptop home at night...

Published 03 November 2010

Are Proxy Anonymizers Putting Your Enterprise in Peril?

Like many modern threats to enterprise security, the use of proxy anonymizers is largely part of a behavioural issue. Chances are, your company...

Published 03 November 2010

E-mail Security - It Only Takes One E-mail

Published 03 November 2010

Endpoint Security - You Can't Be Everywhere - M86 Security Can

Published 03 November 2010

M86 Security Acquires Avinti to Add Behavioural Malware Detection

M86 Security, a global provider of web and e-mail security products, today announced the acquisition of Avinti, a provider of advanced...

Published 03 November 2010

M86 Security Announces Blended Threats Service Offering

M86 Security, a global provider of secure web gateway and e-mail security products, today announced its plans to integrate blended threat detection...

Published 03 November 2010

M86 Security Appoints John Vigouroux as New CEO

M86 Security, a global provider of secure web gateway and e-mail security products to more than 20,000 businesses worldwide, today announced the...

Published 03 November 2010

Social Networking: the Pros, the Cons and the Solution

Social networking sites such as Facebook, MySpace, LinkedIn and Bebo have permeated society and the workplace in recent years. With media giants...

Published 03 November 2010

Web Security - More Critical - and More of a Threat - Than Ever Before

Published 03 November 2010

M86 Security - Web and E-mail Security Products

M86 Security is a global provider of web and e-mail security products. We are the only security company able to provide integrated, reliable and...

Published 08 May 2009

1-14 of 14 results

Join our network

754 people like this.
0 people follow this.

CBR Supplier Recommendations

  • M86 Security - Web and E-mail Security Products

    M86 Security is a global provider of web and e-mail security products. We are the only security company able to provide integrated, reliable and effective enterprise-class multi-layered solutions. Our deep expertise in web and e-mail allows us to correlate real-time threat intelligence to protect organisations from current and emerging threats....

See more

CBR White Paper Recommendations

  • An Inside Job: Extending Enterprise Protection to Remote Laptops

    03 November 2010 | By M86 Security

    IT managers face significant threats from remote workers and business travellers — in fact virtually any employee who takes a laptop home at night or on the road. To be clear, it's not the employees themselves who are the problem. What's happening is that remote workers are unintentionally and unknowingly infecting their laptops with spyware, Trojans, worms and other malicious code. Then they turn around and plug those laptops into the enterprise when they're back in the office. IT managers need to understand the severity of the situation, what's driving it and why it's only going to get worse. They can also familiarise themselves with tools that can help get things under control....

    White Papers
  • Are Proxy Anonymizers Putting Your Enterprise in Peril?

    03 November 2010 | By M86 Security

    Like many modern threats to enterprise security, the use of proxy anonymizers is largely part of a behavioural issue. Chances are, your company deploys web filters to fight off the threats lurking in cyberspace. And chances are, some of your employees have no trouble bypassing them by accessing web pages hosting proxy anonymizers, simple scripts that give surfers a way to get to sites that are officially off-limits. With so many new ones being created every day, ordinary filtering technology based on URL blocking just can't keep up. And because they don't raise red flags in log files the way unapproved sites do, they elude easy detection by IT security staff....

    White Papers
  • Social Networking: the Pros, the Cons and the Solution

    03 November 2010 | By M86 Security

    Social networking sites such as Facebook, MySpace, LinkedIn and Bebo have permeated society and the workplace in recent years. With media giants such as ITV, News Corporation and Google buying up social networking sites - and other sites arriving on the scene constantly - there is little doubt that they are here to stay. Organisations are right to embrace these sites as an extra weapon in their sales and marketing armoury. However, they need to do so secure in the knowledge that organisational and employee security is not being compromised. Unfortunately, the extremely rapid growth in popularity of these sites risks catching many IT departments unprepared. Complacency is not an option for organisations faced with such a powerful, yet potentially problematic communications channel, which is why more and more organisations are turning to advanced content security technologies to mitigate the risks associated with social networking....

    White Papers
See more
Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.