ComputerWeekly.com Research Library

Powered by Bitpipe.com

Anti-Spyware Software Research

  • Reduce Risks and Protect Critical Information with Ease - Presentation Transcript

    Sponsored by: Symantec

    The threat landscape is consistently evolving and today's cyber threats are getting stealthier. With these changes, businesses are finding that anti-virus only solutions are not enough to completely protect their business from risk.

  • IT Decision Checklist: Antimalware

    Sponsored by: ESET

    Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.

  • Threatsaurus: The A-Z of Computer and Data Security Threats

    Sponsored by: Sophos UK

    Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.

  • Sophos Computer Security Scan

    Sponsored by: Sophos

    Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.

  • Not all Malware Detection is Created Equal

    Sponsored by: Sophos

    The internet is now the number-one conduit for infecting users with malware. Sophos detects a new infected web page every few seconds. This white paper outlines the terms you need to know and the steps you should take to stay safe.

  • Internet Security… a Priority you can Forget About: High on protection low on maintenance, AVG frees the support team.

    Sponsored by: AVG Technologies USA, Inc.

    Waingels College in Wokingham is a successful secondary school with almost 500 workstations and servers across the campus. They are challenged with maintaining the efficient running of back office and classroom systems with limited ICT support resources. Read this short case study to learn more about how Waingels College manage their IT security.

  • AVG Anti-Virus Network Edition Delivers Rock Solid, Easy to Manage Protection for US Construction Firm

    Sponsored by: AVG Technologies USA, Inc.

    R&O Construction was having difficulty managing their mostly mobile network. With so many laptops and mobile devices in use remotely, the company was seeing an increase in security threats infecting the IT infrastructure. Their existing solution was overtaxing both system and human resources. Read on to learn how they overcame these challenges.

  • How Malware Can Sneak Into Your Company Networks and How to Deal With It

    Sponsored by: AVG Technologies USA, Inc.

    Taking your network offline might sound like the only effective way to keep viruses and other so-called malware out of your business. But even without the internet, there are still plenty of ways for malicious code to worm its way onto your network. Read this quick white paper for an overview of the main threats and how to protect against them.

  • Fast-Growing Municipality in Southeast USA Secures IT Operations and Services with AVG Anti-Virus Network Edition

    Sponsored by: AVG Technologies USA, Inc.

    The city of Brentwood’s IT environment is made up of 450 computers and counting. Increased population growth brings greater IT infrastructure needs. Brentwood’s old security provider couldn’t keep up. Read this brief case study to find out how Brentwood managed to meet their growing IT security needs.

  • Symantec Report on Rogue Security Software

    Sponsored by: Symantec Corporation

    The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. Read this report to learn the specifics about security software scams.

  • Enhanced Detection of Malware

    Sponsored by: Intel

    We present a cloud-computing-based architecture that improves the resiliency of the existing solutions anti-malware solutions, and we describe our prototype that is based on existing Intel platforms.

  • Case Study: ORDISMATIC Uses Panda Cloud Email Protection to Protect Its Clients from Spam

    Sponsored by: Panda Security

    Read this brief case study to learn how Panda Cloud Email Protection helped ORDISMATIC, an IT vendor, to simplify risk management, reduce operating costs, increase productivity, and achieve significant decreases in spam.

  • Buyer’s Guide to Antimalware

    Sponsored by: AVG Technologies USA, Inc.

    Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products.

  • Buyer’s Guide to Antimalware

    Sponsored by: Panda Security

    Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products.

  • Guide: Patch Authority Ultimate

    Sponsored by: ScriptLogic Corporation

    With exploits for known vulnerabilities unleashed on the Internet within as little as 5 days from the release of new patches from Microsoft, it is imperative your desktops and servers be regularly updated to keep them safe from attack.

  • Guide: Desktop Authority

    Sponsored by: ScriptLogic Corporation

    Desktop Authority comprehensively manages the Windows desktop throughout the desktop lifecycle, reducing the total cost of desktop and application ownership.

  • Drive-by Downloads--The Web Under Siege

    Sponsored by: Kaspersky

    In this white paper, we will explore what actually happens during a drive-by attack, the lures used to perpetrate attacks, the technology behind the attacks, and the use of drive-by download attacks in personal data theft and computer takeovers.

  • When Less Is More: Why Small Companies Should Think Outside the (Red/ Yellow) Box for Protecting Endpoints

    Sponsored by: Sunbelt Software

    Endpoint security issues simply can't be ignored, regardless of the size of the organization. This paper will discuss how internet threats and vulnerabilities affect us all and what criteria businesses should use in order to pick out a proper endpoint security solution.

  • VIPRE Takes A Bite Out Of Bloatware

    Sponsored by: Sunbelt Software

    Sunbelt Software's new VIPRE Enterprise package is ideally suited to combating legacy and new blended malware threats from traditional viruses to the newest spam and Trojans.

  • Symantec Internet Security Threat Report: Trends for 2008

    Sponsored by: Symantec Corporation

    This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.

  • Symantec Endpoint Protection 11.0.3

    Sponsored by: Symantec Corporation

    In this Tolly Group competitive performance evaluation, learn how Symantec Endpoint Protection 11.0.3 consistently delivered faster response time than competing products tested.

  • Total E-mail Security

    Sponsored by: Sunbelt Software

    Malware is becoming ever more sophisticated every day. Only through effective tools that incorporate fast responses against all categories of malware will organizations be able to maintain the health of their critical business systems.

  • Importance of Web Application Firewall Technology for Protecting Web-based Resources

    Sponsored by: Imperva

    ICSA Labs presents this paper to discuss why dedicated web application firewall technology is necessary to protect web-facing resources.

  • A Closer Look at Windows Vista

    Sponsored by: National Instruments

    One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative...

  • Cyber Attacks on the Rise: IBM 2007 Report

    Sponsored by: IBM

    This white paper shows how the IBM Internet Security Systems™ X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.