Virus Protection Research
-
Overcoming APT and Today’s Sophisticated Malware
Sponsored by: TechTarget SecurityIn this e-guide from SearchSecurity.com, hear from experts as they discuss the dangers behind malware and APT attacks and offer effective virus detection techniques to help you address them.
-
What to think about when utilizing endpoint securities
Sponsored by: TechTarget SecurityThere’s a lot to consider when establishing a proper endpoint security plan for your organization. And with so many tools available today, it is easy to forget the very basics of security. View this e-guide to help you refocus on the priorities and discover how to choose, keep or upgrade your endpoint security systems.
-
Best Practices for Preventing Malware
Sponsored by: TechTarget SecurityPreventing malware has been a constant issue for both consumers and businesses since the beginning. Malware can often present itself in all areas of an industry, including both new and old methods. Check out this E-Guide to discover the best practices for inhibiting malware from affecting both your business and your customers.
-
Technical Guide on Malware Trends
Sponsored by: TechTarget SecurityTechTarget’s Security Media Group presents a comprehensive guide to malware trends. Our experts help you adopt your security strategies, policies and spending to address the ever-changing and customized world of malware to keep targeted attacks, phishing scams and other malware-based attacks at bay.
-
Antimalware IT Checklist: RFP Technology Decisions Part 2
Sponsored by: TechTarget SecurityPart 2 of SearchSecurity.com's 3-part guide on antimalware products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the RFI process. Get an overview of technical requirements, questions to ask potential vendors, and a list of products that may meet your needs.
-
Antimalware IT Checklist: From Business Problem to Technical Solution Part 1
Sponsored by: TechTarget SecurityIn the first of SearchSecurity.com's three-part guide on selecting antimalware products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of antimalware solutions.
-
Security For Virtualization: Finding the Right Balance
Sponsored by: KasperskyWhile virtualization is becoming a standard practice, the security of those environments is lagging behind. It's clear that the options for securing VMs have created an unhappy compromise between protection, performance and management. Discover how to avoid undercutting the benefits of virtualization while maintaining a well-protected environment.
-
E Is for Endpoint: Six Security Strategies for Highly Effective IT Professionals
Sponsored by: LumensionSecurity professionals know that effective endpoint protection calls for a layered, defense-in-depth approach. But endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enable operational improvement. Read this whitepaper to learn the six steps you need to think different about endpoint security.
-
Eight threats your antivirus won't stop
Sponsored by: SophosNews headlines are a constant reminder that malware attacks and data leakage are on the rise. High-profile incidents that make big news might seem out of the ordinary. Yet businesses of every size face similar risks in the everyday acts of using digital technology and the internet for legitimate purposes.
-
Social Networking malware: The dangers facing SMBs
Sponsored by: GFI SoftwareView this paper to explore the rise of social networking, the types of malware targeting social platforms, how SMBs can protect themselves against today’s social threats, and more.
-
ESET Online Scanner
Sponsored by: ESETESET Online Scanner is designed only to detect and remove threats via on-demand scan and is not a permanent proactive antivirus solution. To receive complete proactive protection, get a free custom business trial and find out why IT pros worldwide recommend ESET for server-to-endpoint security.
-
FireEye 1H 2011 Advanced Threat Report
Sponsored by: FireEyeThis FireEye Advanced Threat report offers a global view into the cyber attacks that routinely bypass traditional defenses, using the threat data shared by thousands of FireEye Malware Protection Systems (MPS) deployments. View now to explore key findings in this analysis that uncover the real security issues enterprises face today.
-
Endpoint Protection Solutions: Why the Traditional Model is Broken
Sponsored by: OpenText Security SolutionsSecuring the enterprise may never have been a simple task, but now it is far more complex as hackers have become more creative and as the enterprise itself has extended into remote locations and as far as “the cloud.”
-
The True Cost of Protection: Five Ways Your Anti-Malware Solution is Draining your Budget
Sponsored by: KasperskyThis paper uncovers five ways your current anti-malware is draining your budget and offers a new approach to take when evaluating new anti-malware solutions.
-
IT Decision Checklist: Antimalware
Sponsored by: ESETCompanies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. This IT Decision Checklist on Antimalware can help you sort through these challenges and offers a list of antimalware products available today.
-
E-Guide: How antivirus software works: Virus detection techniques
Sponsored by: M86 SecurityAntivirus software uses several different virus detection techniques, as described in this tip by expert Lenny Zeltser.
-
The N-able MSP Sales & Marketing Digital Binder
Sponsored by: Solarwinds N-ableThis digital binder was created to provide IT Service Providers with a set of ready-made marketing resources that can be easily customized to immediately start driving recurring revenue from their existing customers, and attract new prospects.
-
The New Status Quo: Zero-Day and Targeted APT Attacks
Sponsored by: FireEyeDuring the webcast, Dr. Wang of Forrester Research and Ashar Aziz of FireEye will provide insight on data breach incidents and how to protect your company from cybercrime.
-
Trend Micro Proven #1: Smart Protection Network powers Trend Micro Corporate endpoint solutions to top rankings
Sponsored by: Trend Micro, Inc.3.5 new security threats emerge every second and most come from the web. That's why current methods of testing anti-malware on offline PCs and endpoints don't provide the best possible defense. Learn about an approach that tests for threats at multiple layers for comprehensive protection.
-
BDNA for Security: Strengthened Security Through Visibility
Sponsored by: BDNALack of visibility is the root cause for security breaches. Without the enhanced protection of the latest discovery applications, your entire network will be exposed to high risk, lower revenue and lost customers. Read now to learn how the right discovery solutions offer enhanced and automated protection for your infrastructure.
-
2010 Endpoint Risk Assessment: Internal Vulnerabilities
Sponsored by: PromisecThis study will show you the most common security issues that were found and how they were dealt with by the various organizations.
-
Comparative Analysis on Endpoint Security Solutions
Sponsored by: Trend MicroAs the threat landscape continues to evolve, it is essential to have the latest security software to reduce the risk of potential attacks. View this paper for a comparative analysis of top Endpoint security technologies. Explore the key features and performance measures of each solution.
-
Case Study: A Large Multi–Program National Laboratory Stays Ahead of Next-Generation Malware By Deploying FireEye Web Malware Protection System
Sponsored by: FireEyeThis case study will outline how one company trusted FireEye's Web Malware Protection System to guard their highly sensitive information and how well the system performed. You will also learn about the features the security solutions contains and how it could be perfect for your business.
-
Magic Quadrant for Mobile Data Protection
Sponsored by: SophosThis Magic Quadrant is a snapshot of the overall market that ranks vendors against each other, according to competitive criteria. Vendors in any quadrant, as well as those not ranked on the Magic Quadrant, may be appropriate for your enterprise's needs and budget.
-
Mail Security for Microsoft Exchange Server
Sponsored by: ESETESET Mail Security for Microsoft Exchange Server blocks all types of email-borne malware and spam. It scans your email traffic with industry-leading precision, low system footprint and high scanning speed - so slowdowns will be a thing of the past