ComputerWeekly.com Research Library

Powered by Bitpipe.com

Virus Protection Research

  • Symantec Mail Security for SMTP 5.0

    Sponsored by: Symantec Corporation

    This white paper examines the filtering capabilities, threat protection, and message management capabilities available in Symantec Mail Security for SMTP 5.0. Learn how to prevent rapid email virus outbreaks and respond to evolving email securi...

  • Symantec Mail Security for SMTP

    Sponsored by: Symantec Corporation

    Try this download and see how Symantec's Mail Security for SMTP can help your company defend against viruses, spam, and other unwanted content. It also provides high-performance, integrated protection against threats at the Internet email gateway.

  • Messaging and Collaboration Security: Microsoft's Multi-layer Approach - Podcast

    Sponsored by: Microsoft

    Attend this podcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.

  • Enterprise Messaging Security and Management

    Sponsored by: Symantec Corporation

    Email is a mission-critical application for business and will grow annually 25-30% through 2009. This paper examines how to secure and simplify the management of your messaging infrastructure and ensure the security your electronic communic...

  • Webroot Enterprise Spy Audit

    Sponsored by: OpenText Security Solutions

    Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.

  • Justifying an Active Directory Disaster Recovery Plan

    Sponsored by: Dell Software

    Active Directory (AD) downtime can be disastrous to organizations. Learn the risks, costs and unexpected consequences associated with AD interruptions, the importance of an AD recovery plan and the pitfalls of relying solely on native recovery methods.

  • Messaging and Collaboration Security: Microsoft's Multi-layer Approach

    Sponsored by: Microsoft

    Attend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.

  • Microsoft Forefront Security for Exchange Server Beta

    Sponsored by: Microsoft

    Forefront Security for Exchange helps protect your email infrastructure from infection and downtime through an approach that emphasizes layered defenses, optimization of Exchange Server performance and availability, and simplified management control.

  • Protecting Web Applications from Attack and Misuse

    Sponsored by: Citrix

    Application-layer attacks against business-critical web applications are the most serious IT security threat facing enterprises today. Read this white paper to learn how to improve web application security for your enterprise.

  • Managing Instant Messaging For Business Advantage: Phase One - Assessing IM Usage

    Sponsored by: Symantec Corporation

    Instant Messaging (IM) is a valuable business communications tool for your company but its widespread adoption brings the risk of potential worms and viruses. This paper examines seven steps for managing, securing, and auditing your company's use of IM.

  • Kaspersky Anti-Virus for Lotus Notes/Domino

    Sponsored by: Kaspersky

    Kaspersky Anti-Virus integrates with the Lotus Notes/Domino server as an additional module, and scans in real-time mode all messages transmitted by the system.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.