Trojan

(redirected from Blended threat)
Also found in: Dictionary, Thesaurus, Legal, Encyclopedia, Wikipedia.
A proprietary condom which, like Hoovers in the UK and Kleenex in the US, has become a genericised trademark

Trojan

A proprietary condom–the term is used in the US like Kleenex
References in periodicals archive ?
A blended threat can automatically exploit one of many vulnerabilities to compromise a system.
Customers can also add the Blended Threat Module to any existing or new MailMarshal SMTP subscription.
The Blended Threat Module[TM] for MailMarshal SMTP and the R3000 will be available as an optional service that installs easily and connects to Marshal8e6's in-the-cloud Blended Threat Service[TM].
One of the key areas we anticipate using their technology is in blocking blended threats, an area that has successfully thwarted other Web and email security products.
The NEWT agent and more information about blended threats can be found at www.
When these technologies combine to work together as part of an integrated solution, the enterprise enjoys complete protection against both simpler and more sophisticated threats, including viruses, worms, Trojan horses, blended threats and hackers.
The tightly coupled and highly optimized solution from NetLogic Microsystems and AMD are targeted at applications such as Layer 7 switching and routing, Unified Threat Management (UTM) systems, intrusion prevention and detection systems, malware and virus protection gateways that provide network managers with application awareness and unified layers of defense to more effectively manage and protect their networks against an increasing variety of blended threats.
The highly optimized solution from NetLogic Microsystems is targeted at applications such as Unified Threat Management (UTM) systems, intrusion prevention and detection systems, malware and virus protection gateways, and Layer 7 switches and routers that provide network managers with application awareness and unified layers of defense to more effectively manage and protect their networks against an increasing variety of blended threats.
The IMP can be deployed to protect an E-mail infrastructure from blended threats including spam, viruses, denial-of-service and harvest attacks.
With the growth of the blended threats -- industry security firms will be forced to adapt by offering best in class anti-spyware with industry certified anti-virus and firewall solutions.
More robust anti-spyware provides an additional layer of defense against blended threats.
The release also introduces integrated anti-virus for enhanced protection against blended threats, and dynamic-port application support for VoIP, P2P and IM security.