Research Library

Powered by

All Research Sponsored By:ESET

  • A Buyer’s Guide to Extended Detection and Response

    The prerequisite question before even thinking of buying an extended detection and response (XDR) solution is: Do you need it? Multiple pain points could trigger such a need ranging from the rise of ransomware, the risk of supply-chain attacks, to regulatory and insurance requirements. Download this e-book for a buyer’s guide to XDR.

  • A Buyer’s Guide To Managed Detection And Response

    Cloud systems, distracted home workers, remote access infrastructure, and more present large and attractive targets for threat actors. Enter managed detection and response (MDR), a type of managed security service that provides organizations with powerful detection and response capabilities. Download this eBook for a buyer’s guide to MDR.

  • APT Activity Report

    In this report, you’ll discover key findings about the activities of selected advanced persistent threat (APT) groups and learn how you can protect your organization from the malicious activities described within. Download the report now to gain a deeper understanding of the modern threat landscape.

  • Outsmarting Generative AI Cyberattacks

    As enterprises leverage generative AI for business transformation, threat actors are employing the same technology for malicious purposes. So, how are bad actors using generative AI, and how can you defend your organization against their attacks? Find answers in this white paper.

  • ESET Online Scanner

    ESET Online Scanner is designed only to detect and remove threats via on-demand scan and is not a permanent proactive antivirus solution. To receive complete proactive protection, get a free custom business trial and find out why IT pros worldwide recommend ESET for server-to-endpoint security.

  • IT Decision Checklist: Antimalware

    Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. This IT Decision Checklist on Antimalware can help you sort through these challenges and offers a list of antimalware products available today.

  • Protecting Your Multi-Platform Network: The New Wave of Attacks

    Join us to examine some of the malware risks associated with heterogeneous computing environments and solutions to protect your valuable business assets.

  • Mail Security for Microsoft Exchange Server

    ESET Mail Security for Microsoft Exchange Server blocks all types of email-borne malware and spam. It scans your email traffic with industry-leading precision, low system footprint and high scanning speed - so slowdowns will be a thing of the past

  • E-Guide: Why attackers exploit multiple zero-day attacks and how to respond

    The Stuxnet worm has received significant media coverage for the large number of different types of systems it has infected. Symantec Corp. published an informative technical write-up that explains Stuxnet in detail and reports that around 100,000 systems have been infected.

  • Virus Bulletin: Comparative Reviews August-December 2010

    Read this paper to view the latest news and information about VB100 testing,  Windows Vista,  Windows 7, Windows Server 2003, Windows 7 Professional, and  so much more.

  • The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape

    In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more. 

  • ESET: Threat Center

    IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.

  • IT Decision Checklist: Antimalware

    Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.

  • Presentation Transcript: WWW - World Wide Weaponization

    The growth of the internet brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.