ComputerWeekly.com Research Library

Powered by Bitpipe.com

Anti-Spyware Software Research

  • Recognizing a Zero-Day Attack Before It's Too Late

    Sponsored by: Check Point Software Technologies Ltd.

    In this infographic, learn how one cloud-based malware emulation platform can help protect your sensitive data and files from cyberattacks. View now to learn more.

  • The Best and Worst Antivirus Platforms Compared

    Sponsored by: Check Point Software Technologies Ltd.

    In this webcast, watch as top anti-malware platforms go head to head and see who has the best catch rates of known and unknown attacks and who lets the most slip through the cracks. View now to learn more.

  • Find Out What Malware is in that File

    Sponsored by: Check Point Software Technologies Ltd.

    Access this resource to test a threat emulation platform to uncover malicious attacks hiding in what appear to be routine files.

  • Preventing Malware: Every Second Counts

    Sponsored by: Check Point Software Technologies Ltd.

    View this brief webcast to examine a comparison of several leading anti-malware platforms. Watch now to learn how one solution kept malware off of the network and emulated it within four minutes.

  • Insider Strategies for Application Layer Security

    Sponsored by: Veracode, Inc.

    Join in this webcast to learn how a testing strategy can secure all of your apps and how one cloud-based service can help.

  • Top Malware Security Platforms Compared

    Sponsored by: Check Point Software Technologies Ltd.

    View this white paper for a comparison of the leading malware security platforms to see who comes out on top and who lets attacks slip through the cracks. Read on to learn more.

  • Information Security Essential Guide: The Evolution of Threat Detection and Management

    Sponsored by: SearchSecurity.com

    This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.

  • Endpoint Protection Platforms for Enterprises

    Sponsored by: Symantec Corporation

    This guide explores a unique enterprise endpoint protection platform that encompasses a multitude of security tools.

  • Antivirus Evaluation Guide

    Sponsored by: Threat Track Security

    In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.

  • A Buyer's Guide to Endpoint Protection Platforms

    Sponsored by: McAfee, Inc.

    This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.

  • Symantec Intelligence Report – May 2013

    Sponsored by: Symantec Corporation

    Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.

  • Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data

    Sponsored by: Imperva

    In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.

  • McAfee Tackles the Complexities of Endpoint Security

    Sponsored by: McAfee, Inc.

    This white paper presents the myriad of enterprise endpoint threats today, and how you can conquer these difficult complexities.

  • The New Reality of Stealth Crimeware

    Sponsored by: McAfee, Inc.

    This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.

  • McAfee Endpoint Protection Suite

    Sponsored by: McAfee, Inc.

    This whitepaper will introduce you to a security solution that addresses advanced malware, data loss, and other issues from a single, manageable environment and can help limit your exposure to Internet threats. Read on and discover how this solution can offer you advanced e-mail virus and spam protection, comprehensive device control, and more.

  • The Evolving Landscape of Desktop Security

    Sponsored by: McAfee, Inc.

    This resource will help you learn about an application control solution coupled with traditional anti-virus technology can help you address threats quickly and effectively while also keeping close track of unauthorized applications. Read on to learn more.

  • McAfee Application Control

    Sponsored by: McAfee, Inc.

    This whitepaper will help you learn more about a security offering that can provide complete protection from unwanted applications and code, as well as block advanced threats without requiring signature updates. Read on to learn more.

  • Sophos Virus Removal Tool: Free virus detection and removal

    Sponsored by: Sophos, Inc.

    Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.

  • Threat Detection (Antivirus Intrusion Prevention)

    Sponsored by: SearchSecurity.com

    Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.

  • SymEd Solutions from Symantec: Endpoint Management and Mobility

    Sponsored by: Insight Public Sector and Symantec

    Uncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.

  • Online Enemy #1: Blackhole Exploit Kit

    Sponsored by: Threat Track Security

    This short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.

  • Antivirus: The Hippest New Apple Accessory

    Sponsored by: Threat Track Security

    For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.

  • Network Security Report: The State of Network Security in Schools

    Sponsored by: Threat Track Security

    Access this comprehensive resource to learn how to overcome the challenges of securing school networks. Discover ways to control sources of vulnerability that are inherently difficult to control. Additionally, achieve a better understanding of the ever-changing landscape of technology and malware.

  • Case Study: Antivirus Business Exceeds Mitsubishi Polysilicon’s Needs for Malware Protection

    Sponsored by: Threat Track Security

    This brief case study demonstrates how Mitsubishi Polysilicon implemented an improved anti-malware solution that eliminated downtime during scans, resulting in improved productivity and streamlined business processes.

  • Information Security Magazine - March 2013

    Sponsored by: SearchSecurity.com

    This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.