ComputerWeekly.com Research Library

Powered by Bitpipe.com

Virus Protection Research

  • eGuide: Information Security - Buyer's Guide to Messaging Security

    Sponsored by: TechTarget Security

    Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.

  • Fast-Growing Municipality in Southeast USA Secures IT Operations and Services with AVG Anti-Virus Network Edition

    Sponsored by: AVG Technologies USA, Inc.

    The city of Brentwood’s IT environment is made up of 450 computers and counting. Increased population growth brings greater IT infrastructure needs. Brentwood’s old security provider couldn’t keep up. Read this brief case study to find out how Brentwood managed to meet their growing IT security needs.

  • Presentation Transcript: How Application Whitelisting Can Increase Your Desktop Security

    Sponsored by: Faronics

    In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this Presentation Transcript, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus utilities.

  • Symantec Report on Rogue Security Software

    Sponsored by: Symantec Corporation

    The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. Read this report to learn the specifics about security software scams.

  • Case Study: ORDISMATIC Uses Panda Cloud Email Protection to Protect Its Clients from Spam

    Sponsored by: Panda Security

    Read this brief case study to learn how Panda Cloud Email Protection helped ORDISMATIC, an IT vendor, to simplify risk management, reduce operating costs, increase productivity, and achieve significant decreases in spam.

  • How Application Whitelisting Can Increase Your Desktop Security

    Sponsored by: Faronics

    In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this webcast, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus.

  • Why Traditional Anti-Malware Solutions Are No Longer Enough

    Sponsored by: AVG Technologies USA, Inc.

    Security used to be a straightforward matter. Email was the primary attack vector. Simply installing an anti-virus product and using caution with attachments was enough. Today's threats are rapidly evolving, stealthy, and targeted. Read this paper to find out where your current security solutions may be lacking and how to close that gap.

  • Case Study: Panda Security Enables Gloucestershire NHS to Communicate Effectively and Safely

    Sponsored by: Panda Security

    Learn how Gloucestershire NHS was able to help 1700 client computers send and receive vital information safely and efficiently by installing Panda's Managed Office Protection Antivirus solution.

  • Information Security Magazine - September 2009: Readers’ Choice Awards

    Sponsored by: Information Security Magazine

    This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.

  • Presentation Transcript: The Future of Information-Centric Security

    Sponsored by: Palisade Systems, Inc.

    Read this presentation transcript to learn what speaker Rich Mogull has to say about the importance of data protection and the future of security in terms of the way security decisions and security breaches affect business.

  • Enhance Security with Intel® vPro™ Technology

    Sponsored by: Intel Corporation

    Security and compliance are strong values even in a down economy. Hear from a variety of clients that have used Intel® vPro™ Technology to identify problems, disable and enable the network, enhance patch management, and enabled them to isolate threats quickly and efficiently.

  • Guide: Patch Authority Ultimate

    Sponsored by: ScriptLogic Corporation

    With exploits for known vulnerabilities unleashed on the Internet within as little as 5 days from the release of new patches from Microsoft, it is imperative your desktops and servers be regularly updated to keep them safe from attack.

  • Presentation Transcript: A Look at Hosted Exchange and Hosted Email

    Sponsored by: USA.NET, Inc.

    Nowadays, more and more IT shops are considering hosted Exchange services rather than running their mail server locally. They need to decide whether or not it is right for their company. Take a deeper look at hosted Exchange and hybrid models in this presentation transcript of the 'A Look at Hosted Exchange and Hosted Email' webcast.

  • Presentation Transcript: Iron Mountain - E-mail Management

    Sponsored by: Iron Mountain

    Read this presentation transcript and free yourself from the daily hassles of e-mail management and fighting the inherent risks of e-mail Spam, viruses and noncompliance. Trust Iron Mountain's enterprise-class, cloud-based e-mail management service for 100% e-mail uptime at a cost savings of up to 60% versus on-premises solutions.

  • Drive-by Downloads--The Web Under Siege

    Sponsored by: Kaspersky

    In this white paper, we will explore what actually happens during a drive-by attack, the lures used to perpetrate attacks, the technology behind the attacks, and the use of drive-by download attacks in personal data theft and computer takeovers.

  • Presentation Transcript: Why Small Businesses Should Think Outside the Box When Choosing Endpoint Security Solutions

    Sponsored by: Sunbelt Software

    In this presentation transcript of the webinar "Why Small Businesses Should Think Outside the Box When Choosing Endpoint Security Solutions" you’ll learn why "bigger isn't necessarily better" when it comes to selecting an antivirus vendor.

  • Lumension Endpoint Protection - Whitelisting Technology Improves Security, Reliability, and Performance via Trusted Change

    Sponsored by: Lumension

    Learn how whitelisting guards your systems by allowing only approved processes and applications to run on the endpoint and preventing malware and viral programs. With whitelisting technology, you can improve total data security and overall system performance.

  • Security Threat Report: July 2009 Update

    Sponsored by: Sophos

    Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.

  • Presentation Transcript: Endpoint security fundamentals

    Sponsored by: Sophos

    This presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight.

  • Understanding the Total Cost of Ownership for Endpoint Security Solutions

    Sponsored by: Sophos

    When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison.

  • Managed Office Protection: Switching from AV to SaaS

    Sponsored by: Panda Security

    Antivirus products require too much time and effort for small and mid-sized companies. Security as a Service (SaaS) means delivering traditional security applications as an Internet-based service to customers. Now you can focus on your core business, switch from Antivirus to Security as a Service and start enjoying the benefits of SaaS.

  • Symantec Protection Suite Enterprise Edition

    Sponsored by: Symantec Corporation

    Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.

  • Symantec Internet Security Threat Report: Trends for 2008

    Sponsored by: Symantec Corporation

    This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.

  • Blue Coat WebFilter

    Sponsored by: BlueCoat

    Review this brief data sheet to learn how WebFilter helps prevent Internet attacks from spyware, phishing, peer-to-peer (P2P) traffic, viral content and more. WebFilter also includes Dynamic Real-Time Rating (DRTR), a patented technology that can instantly categorize Web sites when a user attempts to access them.

  • TechTalk: Stop Malware at the Web Gateway

    Sponsored by: BlueCoat

    Safeguarding your data from malware and other Web threats takes a layered approach. In this TechTalk webinar Blue Coat Technical Marketing Engineers will lead a discussion on how the Blue Coat ProxyAV works with the ProxySG to create a community-watch based security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.