ComputerWeekly.com Research Library

Powered by Bitpipe.com

Virus Detection Software Research

  • Antimalware IT Checklist: Decision Time Part 3

    Sponsored by: SearchSecurity.com

    This is the third piece in SearchSecurity.com's three-part guide on antimalware products. This expert asset, written by security researcher Mike Rothman, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.

  • Overcoming APT and Today’s Sophisticated Malware

    Sponsored by: SearchSecurity.com

    In this e-guide from SearchSecurity.com, hear from experts as they discuss the dangers behind malware and APT attacks and offer effective virus detection techniques to help you address them.

  • Best Practices for Preventing Malware

    Sponsored by: SearchSecurity.com

    Preventing malware has been a constant issue for both consumers and businesses since the beginning. Malware can often present itself in all areas of an industry, including both new and old methods. Check out this E-Guide to discover the best practices for inhibiting malware from affecting both your business and your customers.

  • Buyer's Guide to Antimalware

    Sponsored by: SearchSecurity.com

    Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.

  • E-Book: Technical Guide on Combatting Emerging Web Threats

    Sponsored by: SearchSecurity.com

    Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.

  • Antimalware IT Checklist: RFP Technology Decisions Part 2

    Sponsored by: SearchSecurity.com

    Part 2 of SearchSecurity.com's 3-part guide on antimalware products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the RFI process. Get an overview of technical requirements, questions to ask potential vendors, and a list of products that may meet your needs.

  • Antimalware IT Checklist: From Business Problem to Technical Solution Part 1

    Sponsored by: SearchSecurity.com

    In the first of SearchSecurity.com's three-part guide on selecting antimalware products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of antimalware solutions.

  • Eight threats your antivirus won't stop

    Sponsored by: Sophos

    News headlines are a constant reminder that malware attacks and data leakage are on the rise. High-profile incidents that make big news might seem out of the ordinary. Yet businesses of every size face similar risks in the everyday acts of using digital technology and the internet for legitimate purposes.

  • ESET Online Scanner

    Sponsored by: ESET

    ESET Online Scanner is designed only to detect and remove threats via on-demand scan and is not a permanent proactive antivirus solution. To receive complete proactive protection, get a free custom business trial and find out why IT pros worldwide recommend ESET for server-to-endpoint security.

  • Endpoint Protection Solutions: Why the Traditional Model is Broken

    Sponsored by: Webroot

    Securing the enterprise may never have been a simple task, but now it is far more complex as hackers have become more creative and as the enterprise itself has extended into remote locations and as far as “the cloud.”

  • The True Cost of Protection: Five Ways Your Anti-Malware Solution is Draining your Budget

    Sponsored by: Kaspersky Lab

    This paper uncovers five ways your current anti-malware is draining your budget and offers a new approach to take when evaluating new anti-malware solutions.

  • IT Decision Checklist: Antimalware

    Sponsored by: ESET

    Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. This IT Decision Checklist on Antimalware can help you sort through these challenges and offers a list of antimalware products available today.

  • E-Guide: How antivirus software works: Virus detection techniques

    Sponsored by: M86 Security

    Antivirus software uses several different virus detection techniques, as described in this tip by expert Lenny Zeltser.

  • Information Security Magazine September 2011—Reader’s Choice Awards

    Sponsored by: Information Security Magazine

    Brought to you by SearchSecurity.com, this month’s Information Security Magazine cover story unveils the 2011 Information Security Reader’s Choice Awards. Learn which products your peers voted as the best in the market spanning 14 different categories including; antimalware, mobile data security, vulnerability management and remote access.

  • How to collect Windows Event logs to detect a targeted attack

    Sponsored by: M86 Security

    Targeted attacks are growing, and eventually your enterprise will be a target. In this e-guide, expert Richard Bejtlich covers how to collect Windows Event logs to detect an intrusion.

  • GlobalSign Malware Monitoring: Protecting your website from distributing hidden malware

    Sponsored by: GlobalSign

    This paper gives you a solution to keeping your websites safe, protecting your customers and securing the reputation of your company.

  • Case Study: A Large Multi–Program National Laboratory Stays Ahead of Next-Generation Malware By Deploying FireEye Web Malware Protection System

    Sponsored by: FireEye

    This case study will outline how one company trusted FireEye's Web Malware Protection System to guard their highly sensitive information and how well the system performed. You will also learn about the features the security solutions contains and how it could be perfect for your business.  

  • April Issue of Information Security Magazine: Cloud Migration: Look before you leap

    Sponsored by: Information Security Magazine

    This month’s Information Security Magazine Online cover story explores the need for careful planning when migrating to the cloud. The benefits of cloud computing are real; a lower IT profile, faster provisioning, and the global availability of new services hold incredible value for most organizations.

  • Virus Bulletin: Comparative Reviews August-December 2010

    Sponsored by: ESET

    Read this paper to view the latest news and information about VB100 testing,  Windows Vista,  Windows 7, Windows Server 2003, Windows 7 Professional, and  so much more.

  • Worry-Free Business Security Standard

    Sponsored by: Trend Micro, Inc.

    Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.

  • Worry-Free Business Security Services

    Sponsored by: Trend Micro, Inc.

    Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.

  • Deep Security 7.5

    Sponsored by: Trend Micro, Inc.

    Protect your virtualized environment by learning what Deep Security 7.5 can do for you. Watch this video to learn so much more about Deep Security 7.5.

  • ESET: Threat Center

    Sponsored by: ESET

    IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.

  • Sophos Computer Security Scan

    Sponsored by: Sophos

    Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.

  • Not all Malware Detection is Created Equal

    Sponsored by: Sophos

    The internet is now the number-one conduit for infecting users with malware. Sophos detects a new infected web page every few seconds. This white paper outlines the terms you need to know and the steps you should take to stay safe.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.