QUE SEGREDOS ESCONDE A SUA INFRAESTRUTURA?
Informações preliminares mostram que a amostra do malware responsável pela infecção é quase um clone idêntico da família de ransomwares GoldenEye. Nesse momemtno não há informações sobre o vetor de... Read More
2 de Maio de 2012 – Bucareste, Romênia –Bitdefender, uma fornecedora premiada de soluções de segurança inovadora anunciou hoje que o Security for Virtualized Environments (SVE) foi verificado como Citrix... Read More
24 de abril de 2012 - Bucareste, Romênia e Stand A90 Infosecurity Europe, Londres, Inglaterra - Bitdefender, um provedor de soluções inovadoras de segurança premiado, anunciou hoje que a... Read More
Depois de testes mundiais bem sucedidos, a Bitdefender lança o Power Tune-Up, uma app gratuita que maximiza a performance do Android, ao mesmo tempo que poupa bateria e controla o tráfego... Read More
A Bitdefender®, galardoado provedor de soluções inovadoras de segurançapara Internet, volta a sagrar-se vencedora reinante nos anti-vírus depois de rigorosos testes da AV-TEST na sua suite Bitdefender Internet Security 2012.
A... Read More
Resumos de Soluções
Stop Fileless Attacks at Pre-execution
Threat actors are shifting to fileless attacks. Experts would tell you that these attacks cannot be prevented by endpoint security solutions. At Bitdefender, we challenge ourselves to protect our customers against the full spectrum of threats – file-based and fileless malware.
As 8 diferenças entre segurança "sem agentes" e as ferramentas do BD
Moving endpoints from traditional, physical systems to run on virtualized platforms is only the first step in an ongoing process. Virtualizing servers is perhaps more straightforward than desktops, but with all virtualization, the workloads that systems run need to be optimized for virtualization.
PCI DSS v3.0 Compliance
As retailers and e-commerce organizations continually examine security solutions to uphold PCI DSS requirements, they face a threat environment that is in constant change.
This solution brief describes an approach that goes beyond traditional endpoint security in physical, virtual and mobile environments, and describes how GravityZone delivers high performance in all three, without sacrificing protection and compliance needs for PCI DSS v3.0.
As soluções de segurança de virtualização fornecem uma vantagem competitiva a fornecedores de serviço - IaaS, PaaS e SaaS
Service providers – IaaS , PaaS and SaaS – that have invested in virtualized infrastructure should plan to look at security as a revenue opportunity and a competitive advantage.
AWS and the use of Gaming strategies: imitation and reality
Success with public cloud computing has interesting similarities to real-time strategy games.
In those games, the key is balancing the use of resources for defense against offence. Similarly, taking advantage of public cloud means balancing rapid build-out, while not forgetting to defend your resources.
The 6 Most Important Things to Know about VDI/DaaS Security
As organizations and service providers look to virtualizing desktops and laptops, security can become a complex issue, especially if one relies on traditional security. Companies like Citrix and Amazon are building advanced management features to make VDI and DaaS affordable and usable for their customers. But the complexity behind virtualized end-user systems and endpoint security requires a different perspective on security.
Segurança para ambientes virtualizados executados em Citrix Xen
Virtualization provides organizations with many costs savings and significant business agility. Among the most efficient datacenter operators are service providers, such as Cloud Service Providers (also known as infrastructure-as-a-service) and application-as-a-service providers.
Segurança centralizada na virtualização para ambientes VMware
In an ever-evolving virtualization landscape, security and compliance remain key concerns for organizations looking to adopt cloud computing models. Current approaches to security for datacenters still rely on traditional in-guest agents that are too resource-heavy and difﬁ cult to manage in virtualized environments