Virus Detection Software Research
-
Royal Holloway: Testing antivirus efficacy in Linux
Sponsored by: TechTarget ComputerWeekly.comAntivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
-
Understanding behavioural detection of antivirus
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.
-
Information Security Essential Guide: The Evolution of Threat Detection and Management
Sponsored by: TechTarget SecurityThis Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.
-
Malware Attacks Demand a New Malware Defense Approach
Sponsored by: TechTarget SecurityCustomized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
-
After Antimalware: Moving Toward Endpoint Antivirus Alternatives
Sponsored by: TechTarget SecurityThis E-Guide from SearchSecurity.com outlines why - although endpoint antimalware has become ineffective - organizations today cannot live without it. In addition, learn about alternative methods available to protect your network and endpoints.
-
Enterprise antimalware excess? Managing antimalware security products
Sponsored by: TechTarget SecurityAntimalware products implemented on your networks can pile up overtime. And while layered security is traditionally the best way to mitigate risk, this accumulation can lead to a confusing, costly and inefficient mess. Access this guide for expert tips on how to manage antimalware products and determine how much is enough.
-
Antimalware IT Checklist: Decision Time Part 3
Sponsored by: TechTarget SecurityThis is the third piece in SearchSecurity.com's three-part guide on antimalware products. This expert asset, written by security researcher Mike Rothman, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.
-
Overcoming APT and Today’s Sophisticated Malware
Sponsored by: TechTarget SecurityIn this e-guide from SearchSecurity.com, hear from experts as they discuss the dangers behind malware and APT attacks and offer effective virus detection techniques to help you address them.
-
Protect Yourself From Antivirus
Sponsored by: Palo Alto NetworksTraditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
-
5 Steps to Raising Ransomware Resistance
Sponsored by: TechTarget SecurityThis TechGuide explores the nature of the threat and the latest ransomware trends. It outlines several steps information security pros should take in order to heighten their organization's resistance and prevent ransomware attacks.
-
The Problem Facing Advanced Threat Defense
Sponsored by: UnitedLexThe biggest problem facing advanced threat defense is not necessarily the threat itself but rather uncertainty about which security strategy will offer the best results—and there's often not enough time to answer that question before making an investment. This e-guide provides expert commentary on how to address this problem in threat management.
-
Antivirus Evaluation Guide
Sponsored by: Threat Track SecurityIn this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.
-
Symantec Intelligence Report – May 2013
Sponsored by: Symantec CorporationKeeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
-
Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
Sponsored by: ImpervaIn this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
-
IT Administrator Saves Engineering Firm More than 200 Hour a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection
Sponsored by: OpenText Security SolutionsIn this case study, learn how engineering and project management firm Doris, Inc. was able to combat slow scan times, complex management, and ineffective protection by investing in the right endpoint security solution.
-
Anittel Simplifies Managed Antivirus Service Case Study
Sponsored by: OpenText Security SolutionsThis case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.
-
Responding to—and recovering from—sophisticated security attacks
Sponsored by: IBMIn this resource, find four things you can do now to keep your organization safe. Learn what you need to know to effectively respond to and recover from sophisticated security attacks by reading on now.
-
Sophos Virus Removal Tool: Free virus detection and removal
Sponsored by: SophosDownload your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.
-
Threat Detection (Antivirus Intrusion Prevention)
Sponsored by: TechTarget SecurityAntivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
-
Online Enemy #1: Blackhole Exploit Kit
Sponsored by: Threat Track SecurityThis short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.
-
Antivirus: The Hippest New Apple Accessory
Sponsored by: Threat Track SecurityFor organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
-
Information Security Magazine - March 2013
Sponsored by: TechTarget SecurityThis issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.
-
Defending Systems on a Wide-open Network with Symantec Endpoint Protection
Sponsored by: Symantec CorporationAdvertising agency, Direct Agents, needed protection at each individual computer because their employees routinely accessed websites and opened emails that were potentially harmful. In this case study, learn how Symantec Endpoint Protection was able to meet their needs, providing simplified management and protection while saving on costs.
-
Antimalware IT Checklist: RFP Technology Decisions Part 2
Sponsored by: TechTarget SecurityPart 2 of SearchSecurity.com's 3-part guide on antimalware products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the RFI process. Get an overview of technical requirements, questions to ask potential vendors, and a list of products that may meet your needs.
-
Antimalware IT Checklist: From Business Problem to Technical Solution Part 1
Sponsored by: TechTarget SecurityIn the first of SearchSecurity.com's three-part guide on selecting antimalware products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of antimalware solutions.