Problematic, Unloved, and Argumentative: What Is a Potentially Unwanted Application (PUA)?

  • Source: Eset
  • Written By:
  • Published:
  • (Originally Published On:) )
Determining when to classify a program as being either unwanted or unsafe can be particularly challenging, because a researcher has to look not just at what a program does, but what the intent is behind it. Business, ethical, and legal questions come into play, too. Read this white paper to understand the difference between the outright threats posed by malware such as viruses and worms and those that are classified as being potentially a threat.

Featured Software Research:

CMMS vs EAM: What Is the Difference?

  • Source: IFS
  • Written By:
  • Published:
Every enterprise asset management (EAM) application can be used as a computerized maintenance management system (CMMS), but not every CMMS can be used as, or has the broad functionality of, an EAM application. More specifically, CMMS is essentially about managing maintenance work necessary to sustain an asset, whereas EAM has more to do with managing the asset over its lifecycle to minimize cost and risk while maximizing return. This white paper explores how CMMS applications and EAM applications... Read More

TEC 2013 Market Survey Report: What Organizations Want in Business Intelligence (BI) Software

  • Source:
  • Written By:
  • Published: October 1 2013
This report gives an overview of current considerations for organizations seeking to purchase a business intelligence (BI) software solution. Based on aggregate data collected from more than 9,000 BI software comparisons performed using Technology Evaluation Centers’ (TEC’s) TEC Advisor software selection application during 2012, the report details what TEC data reveals about your peers' requirements for BI solutions, including functionalities, delivery models and access, customization and integration,... Read More

Application Rationalization and Modernization

Many data centers are aging and some organizations still use legacy applications. This drives up operational costs and limits the ability to upgrade software. This document looks at the need for IT modernization, what the biggest challenges are along the application transformation path, and how Delphix Data as a Service can potentially remove constraints and bottlenecks for an enterprise’s modernization project. Read More

You may also be interested in these related documents:

Bullet-proofing Instant Messaging

As more corporations adopt instant messaging (IM), chief information officers (CIOs) and IT managers are learning that it can be a serious source of liability and security exposure. Users, it seems, simply don’t understand the losses and exposures that can result from incautious IM use. Find out how security software solutions can help you reap the benefits of IM without exposing your company to unnecessary risk. Read More

Building a Business Case for Enterprise Spyware Protection

It is sometimes difficult to quantify the scope of spyware problems within corporate environments. The least noticeable effect of spyware is to slow network and desktop processing by tiny increments. But even the slightest slowdown, multiplied across the enterprise, adds up to a serious bottom line impact in decreased automated processing and worker productivity. Read More

Unwanted PopUp Ads: Intrusive Internet Advertisements

Unwanted pop-up ads are intrusive Internet advertisements that are displayed when you access web pages. This white paper provides information about different type of pop-up ads, losses they cause, how they work, and suggests key features that a good pop-up ad filter software should have. Read More
 
comments powered by Disqus