ComputerWeekly.com Research Library

Powered by Bitpipe.com

Virus Detection Software Research

  • Understanding behavioural detection of antivirus

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.

  • Bullet-Proofing Your Email with Cloud-Based Security

    Sponsored by: LogicNow

    Since malicious software and web links can bring down entire enterprises, having an extra layer of defense in place has never been more important. Learn what you can do to protect users, and deliver highly accurate spam detection, and robust virus defense.

  • A Guide to Email Security for Mid-sized Businesses

    Sponsored by: LogicNow

    In this white paper, examine the current state of email security for mid-sized businesses and evaluate the key features of a successful email gateway security solution. View now to learn how you can mitigate your email risk with multiple antivirus engines, filtering for email exploits, and intelligent spam filtering.

  • CW Special Report on CA Technologies

    Sponsored by: ComputerWeekly.com

    This 9 page special independent report from Computer Weekly, updated for 2014, gives you the facts on CA, its strategy, products and services and financial performance.

  • Information Security Essential Guide: The Evolution of Threat Detection and Management

    Sponsored by: SearchSecurity.com

    This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.

  • Malware Attacks Demand a New Malware Defense Approach

    Sponsored by: SearchSecurity.com

    Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!

  • CW Special report on Symantec

    Sponsored by: ComputerWeekly.com

    This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.

  • After Antimalware: Moving Toward Endpoint Antivirus Alternatives

    Sponsored by: SearchSecurity.com

    This E-Guide from SearchSecurity.com outlines why - although endpoint antimalware has become ineffective - organizations today cannot live without it. In addition, learn about alternative methods available to protect your network and endpoints.

  • The Problem Facing Advanced Threat Defense

    Sponsored by: UnitedLex

    The biggest problem facing advanced threat defense is not necessarily the threat itself but rather uncertainty about which security strategy will offer the best results—and there's often not enough time to answer that question before making an investment. This e-guide provides expert commentary on how to address this problem in threat management.

  • Antivirus Evaluation Guide

    Sponsored by: Threat Track Security

    In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.

  • Corporate AV/EPP Comparative Analysis: Exploit Evasion Defenses

    Sponsored by: Intel Security

    NSS Labs conducted a report to reveal which endpoint protection platform provides the best protection against evasion techniques. View now to uncover how 11 different EPP products fared during analysis.

  • A Buyer's Guide to Endpoint Protection Platforms

    Sponsored by: Intel Security

    This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.

  • Endpoint Security Suites Take Center Stage in the Enterprise

    Sponsored by: Symantec Corporation

    This Forrester report on endpoint security explores how nine top vendors in the market – F-Secure, IBM, Kaspersky, LANDesk, Lumension, McAfee, Sophos, Symantec, and Trend Micro – stacked up against each other.

  • Symantec Intelligence Report – May 2013

    Sponsored by: Symantec Corporation

    Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.

  • Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data

    Sponsored by: Imperva

    In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.

  • McAfee Tackles the Complexities of Endpoint Security

    Sponsored by: Intel Security

    This white paper presents the myriad of enterprise endpoint threats today, and how you can conquer these difficult complexities.

  • The New Reality of Stealth Crimeware

    Sponsored by: Intel Security

    This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.

  • The Evolving Landscape of Desktop Security

    Sponsored by: Intel Security

    This resource will help you learn about an application control solution coupled with traditional anti-virus technology can help you address threats quickly and effectively while also keeping close track of unauthorized applications. Read on to learn more.

  • IT Administrator Saves Engineering Firm More than 200 Hour a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection

    Sponsored by: Webroot

    In this case study, learn how engineering and project management firm Doris, Inc. was able to combat slow scan times, complex management, and ineffective protection by investing in the right endpoint security solution.

  • Anittel Simplifies Managed Antivirus Service Case Study

    Sponsored by: Webroot

    This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.

  • Responding to—and recovering from—sophisticated security attacks

    Sponsored by: IBM

    In this resource, find four things you can do now to keep your organization safe. Learn what you need to know to effectively respond to and recover from sophisticated security attacks by reading on now.

  • Sophos Virus Removal Tool: Free virus detection and removal

    Sponsored by: Sophos, Inc.

    Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.

  • Threat Detection (Antivirus Intrusion Prevention)

    Sponsored by: SearchSecurity.com

    Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.

  • Online Enemy #1: Blackhole Exploit Kit

    Sponsored by: Threat Track Security

    This short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.

  • Antivirus: The Hippest New Apple Accessory

    Sponsored by: Threat Track Security

    For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.