ComputerWeekly.com Research Library

Powered by Bitpipe.com

Virus Protection Research

  • Malware Attacks Demand a New Malware Defense Approach

    Sponsored by: TechTarget Security

    Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!

  • The Evolution of Threat Detection and Management

    Sponsored by: TechTarget Security

    This e-guide from SearchSecurity.com explores the [evolution of threat detection and management] and offers advice on how to tackle potentially disastrous APTs, detailing multiple mitigation methods, from SIEMs and big data to sandboxing and whitelisting.

  • E-Guide: New Malware Threats Require New Antimalware Protection Strategy

    Sponsored by: TechTarget Security

    This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.

  • About to Buy Guide: Spam/virus protection for Exchange

    Sponsored by: TechTarget Security

    This expert e-guide explores the value of a comprehensive email security strategy, and compares the pros and cons of various approaches. Discover how you can gain the antispam and antivirus protection you need to keep email threats at bay and productivity high.

  • Enterprise antimalware excess? Managing antimalware security products

    Sponsored by: TechTarget Security

    Antimalware products implemented on your networks can pile up overtime. And while layered security is traditionally the best way to mitigate risk, this accumulation can lead to a confusing, costly and inefficient mess. Access this guide for expert tips on how to manage antimalware products and determine how much is enough.

  • Antimalware IT Checklist: Decision Time Part 3

    Sponsored by: TechTarget Security

    This is the third piece in SearchSecurity.com's three-part guide on antimalware products. This expert asset, written by security researcher Mike Rothman, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.

  • Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data

    Sponsored by: Imperva

    In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.

  • Managing Web Security in an Increasing Challenging Threat Landscape

    Sponsored by: TechTarget Security

    This resource offers guidance to help your organization manage web security in an increasingly dangerous threat landscape. Learn how cybercriminals are targeting web-based vulnerabilities and see what you can do to stay safe by reading on now.

  • When Malware Goes Mobile: Causes, Outcomes and Cures

    Sponsored by: Sophos

    This whtie paper will review a step-by-step approach you can take in order to strengthen your abaility to ward of malware attacks and keep mobile data secure. Read on to learn about platform specific policies, effective prevention strategies, and more.

  • IT Administrator Saves Engineering Firm More than 200 Hour a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection

    Sponsored by: OpenText Security Solutions

    In this case study, learn how engineering and project management firm Doris, Inc. was able to combat slow scan times, complex management, and ineffective protection by investing in the right endpoint security solution.

  • Anittel Simplifies Managed Antivirus Service Case Study

    Sponsored by: OpenText Security Solutions

    This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.

  • Responding to—and recovering from—sophisticated security attacks

    Sponsored by: IBM

    In this resource, find four things you can do now to keep your organization safe. Learn what you need to know to effectively respond to and recover from sophisticated security attacks by reading on now.

  • Sophos Virus Removal Tool: Free virus detection and removal

    Sponsored by: Sophos

    Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.

  • Threat Detection (Antivirus Intrusion Prevention)

    Sponsored by: TechTarget Security

    Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.

  • Online Enemy #1: Blackhole Exploit Kit

    Sponsored by: Threat Track Security

    This short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.

  • Antivirus: The Hippest New Apple Accessory

    Sponsored by: Threat Track Security

    For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.

  • 2012 Endpoint Security Best Practices Survey Results

    Sponsored by: Symantec Corporation

    This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.

  • The Deloitte Consumer Review: A more secure customer

    Sponsored by: TechTarget ComputerWeekly.com

    This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.

  • Information Security Magazine - March 2013

    Sponsored by: TechTarget Security

    This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.

  • Remote Vendor Access: Not All Access Should Be Treated Equally

    Sponsored by: Dell Software

    This white paper explains why Remote Vendor Access (RVA) should not be treated the same as traditional remote access for employees. Explore how a new set of remote access requirements can ensure that your enterprise remains in step with both compliance regulations and security expectations.

  • Defending Systems on a Wide-open Network with Symantec Endpoint Protection

    Sponsored by: Symantec Corporation

    Advertising agency, Direct Agents, needed protection at each individual computer because their employees routinely accessed websites and opened emails that were potentially harmful. In this case study, learn how Symantec Endpoint Protection was able to meet their needs, providing simplified management and protection while saving on costs.

  • Bit9 Parity for Servers: International Communications Company Locks Down Domain controllers

    Sponsored by: Bit9, Inc.

    Domain controllers have become an increasingly popular target for malicious hackers for its access to an organization’s sensitive and intellectual property. This case study uncovers how one international communications firm was able to protect 225 of its domain controllers using Bit9 Parity for Servers and the key benefits they gained.

  • Antimalware IT Checklist: RFP Technology Decisions Part 2

    Sponsored by: TechTarget Security

    Part 2 of SearchSecurity.com's 3-part guide on antimalware products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the RFI process. Get an overview of technical requirements, questions to ask potential vendors, and a list of products that may meet your needs.

  • Antimalware IT Checklist: From Business Problem to Technical Solution Part 1

    Sponsored by: TechTarget Security

    In the first of SearchSecurity.com's three-part guide on selecting antimalware products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of antimalware solutions.

  • Security For Virtualization: Finding the Right Balance

    Sponsored by: Kaspersky

    While virtualization is becoming a standard practice, the security of those environments is lagging behind. It's clear that the options for securing VMs have created an unhappy compromise between protection, performance and management. Discover how to avoid undercutting the benefits of virtualization while maintaining a well-protected environment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.