Virus Protection Research
-
Royal Holloway: Testing antivirus efficacy in Linux
Sponsored by: TechTarget ComputerWeekly.comAntivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
-
Audi fine-tunes its digital performance to boost online car sales
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.
-
Understanding behavioural detection of antivirus
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.
-
Security Threat Report: July 2009 Update
Sponsored by: SophosBusinesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
-
Presentation Transcript: Endpoint security fundamentals
Sponsored by: SophosThis presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight.
-
Understanding the Total Cost of Ownership for Endpoint Security Solutions
Sponsored by: SophosWhen moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison.
-
Managed Office Protection: Switching from AV to SaaS
Sponsored by: Panda SecurityAntivirus products require too much time and effort for small and mid-sized companies. Security as a Service (SaaS) means delivering traditional security applications as an Internet-based service to customers. Now you can focus on your core business, switch from Antivirus to Security as a Service and start enjoying the benefits of SaaS.
-
Symantec Protection Suite Enterprise Edition
Sponsored by: Symantec CorporationSymantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.
-
Symantec Internet Security Threat Report: Trends for 2008
Sponsored by: Symantec CorporationThis report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.
-
Blue Coat WebFilter
Sponsored by: BlueCoatReview this brief data sheet to learn how WebFilter helps prevent Internet attacks from spyware, phishing, peer-to-peer (P2P) traffic, viral content and more. WebFilter also includes Dynamic Real-Time Rating (DRTR), a patented technology that can instantly categorize Web sites when a user attempts to access them.
-
TechTalk: Stop Malware at the Web Gateway
Sponsored by: BlueCoatSafeguarding your data from malware and other Web threats takes a layered approach. In this TechTalk webinar Blue Coat Technical Marketing Engineers will lead a discussion on how the Blue Coat ProxyAV works with the ProxySG to create a community-watch based security.
-
Magic Quadrant for Endpoint Protection Platforms
Sponsored by: SophosGartner's Magic Quadrant for Endpoint Protection Platforms assesses a company's ability to execute and its completeness of vision. According to Gartner, Sophos continues to have a strong reputation for support and service from customers and the management interface achieves a good balance of simplicity without sacrificing depth of control.
-
Exchange Insider E-Zine Volume 1: The Importance of Lifecycle Planning for Email Archives
Sponsored by: TechTarget Search Windows ServerIn this premier issue of Exchange Insider, you'll learn the importance of properly archiving email messages in your Exchange environment, learn how implementing SSL concepts is required for proper Exchange infrastructure management, and what the requirements are to securely migrate to Exchange Server 2007 from previous, legacy versions.
-
IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4
Sponsored by: Symantec CorporationWith this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security.
-
Symantec Endpoint Protection 11.0.3
Sponsored by: Symantec CorporationIn this Tolly Group competitive performance evaluation, learn how Symantec Endpoint Protection 11.0.3 consistently delivered faster response time than competing products tested.
-
The CIO's Guide to Mobile Security
Sponsored by: BlackBerryLearn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
-
Endpoint Security and Control
Sponsored by: SophosLearn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
-
The Modern Security Threat and Regulatory Compliance
Sponsored by: Bytware, Inc.SOX-style legislation and the evolving threat from viruses is challenging the ability of IT management to keep up with security requirements. This webcast explains why so many systems are at risk and what you can do to mitigate these threats.
-
Five Ways to Improve Your Wireless Security
Sponsored by: Cisco Systems, Inc.A wireless network can help your employees stay productive as they move around your company, but to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users.
-
Symantec Internet Security Threat Report: Trends for July-December 07
Sponsored by: Symantec CorporationThis summary of the Internet Security Threat Report will alert readers to current trends and impending threats that Symantec has observed for the six-month period from July 1 to December 31, 2007.
-
The Impact of Messaging and Web Threats
Sponsored by: Trend Micro, Inc.This Osterman Research white paper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks.
-
Key Steps to Securing Your Organization and Evicting a Hacker
Sponsored by: Foundstone, Inc.This podcast will tech you key steps for getting your company back on track after a security breach. It discusses effective measures that can be put into place, and how to take a proactive approach in securing your company against malicious attacks.
-
Symantec Backup Exec System Recovery 8: The Gold Standard in Complete Windows System Recovery
Sponsored by: Symantec CorporationSymantec Backup Exec System Recovery 8 is the gold standard in complete Windows® system recovery, allowing businesses and IT to recover from system loss or disaster in minutes, not hours or days.
-
Secure Enterprise e-mail Solutions with Microsoft® Exchange
Sponsored by: OnX USA LLCThis white paper describes HP's set of add-on Microsoft Exchange solutions that protect against security, performance and availability risks and enable e-mail administrators to set and better enforce message handling policies.
-
Intel Centrino Pro and Intel vPro Processor Technology
Sponsored by: Intel CorporationLearn how to improve security and management capabilities with Intel vPro processor technology. This white paper discusses how remote management can simplify systems management and save time for IT administrators.