ComputerWeekly.com Research Library

Powered by Bitpipe.com

Virus Protection Research

  • Overcoming APT and Today’s Sophisticated Malware

    Sponsored by: SearchSecurity.com

    In this e-guide from SearchSecurity.com, hear from experts as they discuss the dangers behind malware and APT attacks and offer effective virus detection techniques to help you address them.

  • What to think about when utilizing endpoint securities

    Sponsored by: SearchSecurity.com

    There’s a lot to consider when establishing a proper endpoint security plan for your organization. And with so many tools available today, it is easy to forget the very basics of security. View this e-guide to help you refocus on the priorities and discover how to choose, keep or upgrade your endpoint security systems.

  • Best Practices for Preventing Malware

    Sponsored by: SearchSecurity.com

    Preventing malware has been a constant issue for both consumers and businesses since the beginning. Malware can often present itself in all areas of an industry, including both new and old methods. Check out this E-Guide to discover the best practices for inhibiting malware from affecting both your business and your customers.

  • Technical Guide on Malware Trends

    Sponsored by: SearchSecurity.com

    TechTarget’s Security Media Group presents a comprehensive guide to malware trends. Our experts help you adopt your security strategies, policies and spending to address the ever-changing and customized world of malware to keep targeted attacks, phishing scams and other malware-based attacks at bay.

  • Antimalware IT Checklist: RFP Technology Decisions Part 2

    Sponsored by: SearchSecurity.com

    Part 2 of SearchSecurity.com's 3-part guide on antimalware products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the RFI process. Get an overview of technical requirements, questions to ask potential vendors, and a list of products that may meet your needs.

  • Antimalware IT Checklist: From Business Problem to Technical Solution Part 1

    Sponsored by: SearchSecurity.com

    In the first of SearchSecurity.com's three-part guide on selecting antimalware products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of antimalware solutions.

  • Security For Virtualization: Finding the Right Balance

    Sponsored by: Kaspersky

    While virtualization is becoming a standard practice, the security of those environments is lagging behind. It's clear that the options for securing VMs have created an unhappy compromise between protection, performance and management. Discover how to avoid undercutting the benefits of virtualization while maintaining a well-protected environment.

  • E Is for Endpoint: Six Security Strategies for Highly Effective IT Professionals

    Sponsored by: Lumension

    Security professionals know that effective endpoint protection calls for a layered, defense-in-depth approach. But endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enable operational improvement. Read this whitepaper to learn the six steps you need to think different about endpoint security.

  • Eight threats your antivirus won't stop

    Sponsored by: Sophos

    News headlines are a constant reminder that malware attacks and data leakage are on the rise. High-profile incidents that make big news might seem out of the ordinary. Yet businesses of every size face similar risks in the everyday acts of using digital technology and the internet for legitimate purposes.

  • Social Networking malware: The dangers facing SMBs

    Sponsored by: GFI Software

    View this paper to explore the rise of social networking, the types of malware targeting social platforms, how SMBs can protect themselves against today’s social threats, and more.

  • ESET Online Scanner

    Sponsored by: ESET

    ESET Online Scanner is designed only to detect and remove threats via on-demand scan and is not a permanent proactive antivirus solution. To receive complete proactive protection, get a free custom business trial and find out why IT pros worldwide recommend ESET for server-to-endpoint security.

  • FireEye 1H 2011 Advanced Threat Report

    Sponsored by: FireEye

    This FireEye Advanced Threat report offers a global view into the cyber attacks that routinely bypass traditional defenses, using the threat data shared by thousands of FireEye Malware Protection Systems (MPS) deployments. View now to explore key findings in this analysis that uncover the real security issues enterprises face today.

  • Endpoint Protection Solutions: Why the Traditional Model is Broken

    Sponsored by: Webroot

    Securing the enterprise may never have been a simple task, but now it is far more complex as hackers have become more creative and as the enterprise itself has extended into remote locations and as far as “the cloud.”

  • The True Cost of Protection: Five Ways Your Anti-Malware Solution is Draining your Budget

    Sponsored by: Kaspersky

    This paper uncovers five ways your current anti-malware is draining your budget and offers a new approach to take when evaluating new anti-malware solutions.

  • IT Decision Checklist: Antimalware

    Sponsored by: ESET

    Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. This IT Decision Checklist on Antimalware can help you sort through these challenges and offers a list of antimalware products available today.

  • E-Guide: How antivirus software works: Virus detection techniques

    Sponsored by: M86 Security

    Antivirus software uses several different virus detection techniques, as described in this tip by expert Lenny Zeltser.

  • The N-able MSP Sales & Marketing Digital Binder

    Sponsored by: Solarwinds N-able

    This digital binder was created to provide IT Service Providers with a set of ready-made marketing resources that can be easily customized to immediately start driving recurring revenue from their existing customers, and attract new prospects.

  • The New Status Quo: Zero-Day and Targeted APT Attacks

    Sponsored by: FireEye

    During the webcast, Dr. Wang of Forrester Research and Ashar Aziz of FireEye will provide insight on data breach incidents and how to protect your company from cybercrime.

  • Trend Micro Proven #1: Smart Protection Network powers Trend Micro Corporate endpoint solutions to top rankings

    Sponsored by: Trend Micro, Inc.

    3.5 new security threats emerge every second and most come from the web. That's why current methods of testing anti-malware on offline PCs and endpoints don't provide the best possible defense. Learn about an approach that tests for threats at multiple layers for comprehensive protection.

  • BDNA for Security: Strengthened Security Through Visibility

    Sponsored by: BDNA

    Lack of visibility is the root cause for security breaches. Without the enhanced protection of the latest discovery applications, your entire network will be exposed to high risk, lower revenue and lost customers. Read now to learn how the right discovery solutions offer enhanced and automated protection for your infrastructure.

  • 2010 Endpoint Risk Assessment: Internal Vulnerabilities

    Sponsored by: Promisec

    This study will show you the most common security issues that were found and how they were dealt with by the various organizations.

  • Comparative Analysis on Endpoint Security Solutions

    Sponsored by: Trend Micro

    As the threat landscape continues to evolve, it is essential to have the latest security software to reduce the risk of potential attacks. View this paper for a comparative analysis of top Endpoint security technologies. Explore the key features and performance measures of each solution.

  • Case Study: A Large Multi–Program National Laboratory Stays Ahead of Next-Generation Malware By Deploying FireEye Web Malware Protection System

    Sponsored by: FireEye

    This case study will outline how one company trusted FireEye's Web Malware Protection System to guard their highly sensitive information and how well the system performed. You will also learn about the features the security solutions contains and how it could be perfect for your business.  

  • Magic Quadrant for Mobile Data Protection

    Sponsored by: Sophos

    This Magic Quadrant is a snapshot of the overall market that ranks vendors against each other, according to competitive criteria. Vendors in any quadrant, as well as those not ranked on the Magic Quadrant, may be appropriate for your enterprise's needs and budget.

  • Mail Security for Microsoft Exchange Server

    Sponsored by: ESET

    ESET Mail Security for Microsoft Exchange Server blocks all types of email-borne malware and spam. It scans your email traffic with industry-leading precision, low system footprint and high scanning speed - so slowdowns will be a thing of the past

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.