Virus Protection Research
-
Malware Attacks Demand a New Malware Defense Approach
Sponsored by: TechTarget SecurityCustomized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
-
The Evolution of Threat Detection and Management
Sponsored by: TechTarget SecurityThis e-guide from SearchSecurity.com explores the [evolution of threat detection and management] and offers advice on how to tackle potentially disastrous APTs, detailing multiple mitigation methods, from SIEMs and big data to sandboxing and whitelisting.
-
After Antimalware: Moving Toward Endpoint Antivirus Alternatives
Sponsored by: TechTarget SecurityThis E-Guide from SearchSecurity.com outlines why - although endpoint antimalware has become ineffective - organizations today cannot live without it. In addition, learn about alternative methods available to protect your network and endpoints.
-
E-Guide: New Malware Threats Require New Antimalware Protection Strategy
Sponsored by: TechTarget SecurityThis expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
-
Endpoint Protection Best Practices Manual: Combating issues, problems
Sponsored by: TechTarget SecurityConsult this expert E-Guide for an overview of the evolved threats that are putting your endpoints at risk. Discover the must-see strategies for ensuring endpoint defense by clicking through to read more today.
-
About to Buy Guide: Spam/virus protection for Exchange
Sponsored by: TechTarget SecurityThis expert e-guide explores the value of a comprehensive email security strategy, and compares the pros and cons of various approaches. Discover how you can gain the antispam and antivirus protection you need to keep email threats at bay and productivity high.
-
Threat Management: Devising a new strategy to tackle today's cyberattacks
Sponsored by: TechTarget SecurityThis Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
-
Enterprise antimalware excess? Managing antimalware security products
Sponsored by: TechTarget SecurityAntimalware products implemented on your networks can pile up overtime. And while layered security is traditionally the best way to mitigate risk, this accumulation can lead to a confusing, costly and inefficient mess. Access this guide for expert tips on how to manage antimalware products and determine how much is enough.
-
Antimalware IT Checklist: Decision Time Part 3
Sponsored by: TechTarget SecurityThis is the third piece in SearchSecurity.com's three-part guide on antimalware products. This expert asset, written by security researcher Mike Rothman, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.
-
Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
Sponsored by: ImpervaIn this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
-
Managing Web Security in an Increasing Challenging Threat Landscape
Sponsored by: TechTarget SecurityThis resource offers guidance to help your organization manage web security in an increasingly dangerous threat landscape. Learn how cybercriminals are targeting web-based vulnerabilities and see what you can do to stay safe by reading on now.
-
When Malware Goes Mobile: Causes, Outcomes and Cures
Sponsored by: SophosThis whtie paper will review a step-by-step approach you can take in order to strengthen your abaility to ward of malware attacks and keep mobile data secure. Read on to learn about platform specific policies, effective prevention strategies, and more.
-
IT Administrator Saves Engineering Firm More than 200 Hour a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection
Sponsored by: OpenText Security SolutionsIn this case study, learn how engineering and project management firm Doris, Inc. was able to combat slow scan times, complex management, and ineffective protection by investing in the right endpoint security solution.
-
Anittel Simplifies Managed Antivirus Service Case Study
Sponsored by: OpenText Security SolutionsThis case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.
-
Responding to—and recovering from—sophisticated security attacks
Sponsored by: IBMIn this resource, find four things you can do now to keep your organization safe. Learn what you need to know to effectively respond to and recover from sophisticated security attacks by reading on now.
-
Sophos Virus Removal Tool: Free virus detection and removal
Sponsored by: SophosDownload your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.
-
Threat Detection (Antivirus Intrusion Prevention)
Sponsored by: TechTarget SecurityAntivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
-
Online Enemy #1: Blackhole Exploit Kit
Sponsored by: Threat Track SecurityThis short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.
-
Antivirus: The Hippest New Apple Accessory
Sponsored by: Threat Track SecurityFor organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
-
2012 Endpoint Security Best Practices Survey Results
Sponsored by: Symantec CorporationThis informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.
-
The Deloitte Consumer Review: A more secure customer
Sponsored by: TechTarget ComputerWeekly.comThis report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.
-
Information Security Magazine - March 2013
Sponsored by: TechTarget SecurityThis issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.
-
Remote Vendor Access: Not All Access Should Be Treated Equally
Sponsored by: Dell SoftwareThis white paper explains why Remote Vendor Access (RVA) should not be treated the same as traditional remote access for employees. Explore how a new set of remote access requirements can ensure that your enterprise remains in step with both compliance regulations and security expectations.
-
Defending Systems on a Wide-open Network with Symantec Endpoint Protection
Sponsored by: Symantec CorporationAdvertising agency, Direct Agents, needed protection at each individual computer because their employees routinely accessed websites and opened emails that were potentially harmful. In this case study, learn how Symantec Endpoint Protection was able to meet their needs, providing simplified management and protection while saving on costs.
-
Bit9 Parity for Servers: International Communications Company Locks Down Domain controllers
Sponsored by: Bit9, Inc.Domain controllers have become an increasingly popular target for malicious hackers for its access to an organization’s sensitive and intellectual property. This case study uncovers how one international communications firm was able to protect 225 of its domain controllers using Bit9 Parity for Servers and the key benefits they gained.