ComputerWeekly.com Research Library

Powered by Bitpipe.com

Virus Detection Software Research

  • Symantec Report on Rogue Security Software

    Sponsored by: Symantec Corporation

    The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. Read this report to learn the specifics about security software scams.

  • Why Traditional Anti-Malware Solutions Are No Longer Enough

    Sponsored by: AVG Technologies USA, Inc.

    Security used to be a straightforward matter. Email was the primary attack vector. Simply installing an anti-virus product and using caution with attachments was enough. Today's threats are rapidly evolving, stealthy, and targeted. Read this paper to find out where your current security solutions may be lacking and how to close that gap.

  • Novell® Sentinel™: Active Event Monitoring for Improved Security and Compliance Management

    Sponsored by: Novell, Inc.

    Novell Sentinel combines the benefits of identity and systems management with real-time security event management and monitoring. It gives you a comprehensive, real-time dashboard view of user, network and application events, so your IT staff can be much more responsive to potential threats.

  • Case Study: Panda Security Enables Gloucestershire NHS to Communicate Effectively and Safely

    Sponsored by: Panda Security

    Learn how Gloucestershire NHS was able to help 1700 client computers send and receive vital information safely and efficiently by installing Panda's Managed Office Protection Antivirus solution.

  • Guide: Patch Authority Ultimate

    Sponsored by: ScriptLogic Corporation

    With exploits for known vulnerabilities unleashed on the Internet within as little as 5 days from the release of new patches from Microsoft, it is imperative your desktops and servers be regularly updated to keep them safe from attack.

  • Presentation Transcript: Why Small Businesses Should Think Outside the Box When Choosing Endpoint Security Solutions

    Sponsored by: Sunbelt Software

    In this presentation transcript of the webinar "Why Small Businesses Should Think Outside the Box When Choosing Endpoint Security Solutions" you’ll learn why "bigger isn't necessarily better" when it comes to selecting an antivirus vendor.

  • Symantec Protection Suite Enterprise Edition

    Sponsored by: Symantec Corporation

    Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.

  • Top Benefits of Symantec Protection Suite

    Sponsored by: Symantec Corporation

    Anti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.

  • Symantec Internet Security Threat Report: Trends for 2008

    Sponsored by: Symantec Corporation

    This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.

  • TechTalk: Stop Malware at the Web Gateway

    Sponsored by: BlueCoat

    Safeguarding your data from malware and other Web threats takes a layered approach. In this TechTalk webinar Blue Coat Technical Marketing Engineers will lead a discussion on how the Blue Coat ProxyAV works with the ProxySG to create a community-watch based security.

  • Symantec Endpoint Protection 11.0.3

    Sponsored by: Symantec Corporation

    In this Tolly Group competitive performance evaluation, learn how Symantec Endpoint Protection 11.0.3 consistently delivered faster response time than competing products tested.

  • Symantec Internet Security Threat Report: Trends for July-December 07

    Sponsored by: Symantec Corporation

    This summary of the Internet Security Threat Report will alert readers to current trends and impending threats that Symantec has observed for the six-month period from July 1 to December 31, 2007.

  • The Impact of Messaging and Web Threats

    Sponsored by: Trend Micro, Inc.

    This Osterman Research white paper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks.

  • Cyber Attacks on the Rise: IBM 2007 Report

    Sponsored by: IBM

    This white paper shows how the IBM Internet Security Systems™ X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.

  • Kaspersky Internet Security 7.0

    Sponsored by: Kaspersky

    Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.

  • A Guide to Evaluating Email Security Solutions

    Sponsored by: SonicWALL

    E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.

  • Potomac Hospital Case Study

    Sponsored by: SonicWALL

    In this case study Potomac Hospital installed SonicWALL PRO 5060 across their hospital’s network. Learn how SonicWALL’s CDP appliances deliver complete, disk-based backup and recovery solutions that replicate data in real-time.

  • Symantec Mail Security for SMTP 5.0

    Sponsored by: Symantec Corporation

    This white paper examines the filtering capabilities, threat protection, and message management capabilities available in Symantec Mail Security for SMTP 5.0. Learn how to prevent rapid email virus outbreaks and respond to evolving email securi...

  • Symantec Mail Security for SMTP

    Sponsored by: Symantec Corporation

    Try this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway.

  • Messaging and Collaboration Security: Microsoft's Multi-layer Approach - Podcast

    Sponsored by: Microsoft

    Attend this podcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.

  • Webroot Enterprise Spy Audit

    Sponsored by: OpenText Security Solutions

    Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.

  • Messaging and Collaboration Security: Microsoft's Multi-layer Approach

    Sponsored by: Microsoft

    Attend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.

  • Microsoft Forefront Security for Exchange Server Beta

    Sponsored by: Microsoft

    Forefront Security for Exchange helps protect your email infrastructure from infection and downtime through an approach that emphasizes layered defenses, optimization of Exchange Server performance and availability, and simplified management control.

  • Why One Virus Engine Is Not Enough

    Sponsored by: GFI Software

    This white paper explains the importance of response time, shows the response time differences between virus engines, and explains why having multiple scanners at mail server level decreases the average response time.

  • Kaspersky Anti-Virus for Lotus Notes/Domino

    Sponsored by: Kaspersky

    Kaspersky Anti-Virus integrates with the Lotus Notes/Domino server as an additional module, and scans in real-time mode all messages transmitted by the system.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.