ComputerWeekly.com Research Library

Powered by Bitpipe.com

Virus Protection Research

  • Buyer's Guide to Antimalware

    Sponsored by: TechTarget Security

    Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.

  • Essential Guide to Threat Management

    Sponsored by: TechTarget Security

    Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.

  • E-Book: Technical Guide on Combatting Emerging Web Threats

    Sponsored by: TechTarget Security

    Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.

  • Intelligent real-time protection and application control

    Sponsored by: SonicWALL

    It is no longer sufficient to rely on outdated firewall technology that only looks at the port, protocol, source IP and destination IP to determine if a session from the outside should be allowed inside the network.

  • E-Guide: Why attackers exploit multiple zero-day attacks and how to respond

    Sponsored by: ESET

    The Stuxnet worm has received significant media coverage for the large number of different types of systems it has infected. Symantec Corp. published an informative technical write-up that explains Stuxnet in detail and reports that around 100,000 systems have been infected.

  • Fortune 200 Firm Achieves Global Email Protection

    Sponsored by: WatchGuard Technologies, Inc.

    Eaton Corporation, a premier industrial manufacturer, is an industry leader in diversified power management and ranks in the Fortune 200.

  • Why Customers Love VIPRE Business

    Sponsored by: GFI Software

    This paper examines that selecting and anti-virus solution for your organization is an important decision. VIPRE Business offers an easy-to-use management console that gets you up and running fast.

  • SonicWALL TZ Series

    Sponsored by: SonicWALL

    Factors like Web 2.0 applications, streaming video, evolving threats and new threat delivery vectors are overwhelming both the security and performance of traditional firewalls.

  • Trend Micro Endpoint Comparative Report Performed by AV-Test.org

    Sponsored by: Trend Micro, Inc.

    In May of 2010, AV-Test.org performed endpoint security benchmark testing on five market-leading Enterprise endpoint solutions from Symantec, McAfee, Microsoft, Sophos and Trend Micro. Read this comparative report to see the results of these tests and how Trend Micro Worry-Free Business Security stands distinctly apart from other products.

  • A Hack Attack: Six Steps to Recovery

    Sponsored by: Cisco Systems, Inc.

    It’s startling when malware hits your network, or an intruder enters by password cracking. You’ve been hacked—now what? Don’t panic. Read about the six steps that your business can take to respond and protect itself.

  • NETGEAR ProSecure STM150 Helps Prepress Solutions Provider Double its Sales Prospects

    Sponsored by: NETGEAR Inc.

    Agfa Graphics is a world leader in prepress solutions for the printing and publishing industries. Read this case study to learn how they maximize productivity gains from virtualization technology, without sacrificing network security with NETGEAR ProSecure STM150.

  • Virus Bulletin: Comparative Reviews August-December 2010

    Sponsored by: ESET

    Read this paper to view the latest news and information about VB100 testing,  Windows Vista,  Windows 7, Windows Server 2003, Windows 7 Professional, and  so much more.

  • Presentation Transcript: Rogue Security Software - An In-Depth Look And The Challenges For Business

    Sponsored by: Sunbelt Software

    In this presentation transcript, Chris Boyd, GFI Software’s Senior Threat Researcher, provides an in-depth look into Rogue antivirus. He details the damage it can cause and how they have been tailored to look like legitimate products. You will also learn what businesses can do to better protect their network and end users from these threats.

  • E-Book: Technical Guide on Network Security Monitoring

    Sponsored by: AVG Technologies USA, Inc.

    Your organization’s network is more than a collection of pipes through which traffic flows: it’s your business’ fundamental IT architecture. Your security devices keep a watchful eye on traffic and systems, and maintain the integrity of your data and systems. Check out this guide to network security monitoring from SearchMidmarketSecurity.com.

  • Top 10 Tips to Keep Your Small Business Safe

    Sponsored by: Trend Micro, Inc.

    Read this paper to learn the top ten ways to protect your small business against web threats. Learn what you need to know about security and what are the key elements to address.

  • Worry-Free Business Security Standard

    Sponsored by: Trend Micro, Inc.

    Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.

  • Worry-Free Business Security Services

    Sponsored by: Trend Micro, Inc.

    Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.

  • ESET: Threat Center

    Sponsored by: ESET

    IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.

  • Reduce Risks and Protect Critical Information with Ease - Presentation Transcript

    Sponsored by: Symantec

    The threat landscape is consistently evolving and today's cyber threats are getting stealthier. With these changes, businesses are finding that anti-virus only solutions are not enough to completely protect their business from risk.

  • First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies

    Sponsored by: ArcSight, an HP Company

    The purpose of this benchmark study is twofold. First, we wanted to quantify the economic impact of a cyber attack. Second, we believed a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.

  • Four Principles of Effective Threat Protection: Defining the right strategy and tools to defend your business against malware

    Sponsored by: Sophos

    Threat protection requires an updated approach now that the classic model of anti-virus plus firewall is no longer enough. Best practice calls for interlocking layers of protection that support your business processes and digital assets. Read on to learn principles you can use to strike a balance between enabling business and ensuring security.

  • Approaches to Distributed Denial of Service (DDoS) Protection: A Cost Analysis

    Sponsored by: VeriSign, Inc

    Do you know what a Distributed Denial of Service (DDoS) attack might cost your organization? This white paper defines DDoS, examines the elements that make up a DDoS protection solution, and compares three different approaches to DDoS protection. Read this paper to learn how to ramp up protection and reduce costs.

  • Solving Four Primary Security Challenges of Microsoft SharePoint

    Sponsored by: Sophos UK

    This white paper examines SharePoint's benefits and risks and recommends best practices for protecting an organisation's digital assets.

  • Threatsaurus: The A-Z of Computer and Data Security Threats

    Sponsored by: Sophos UK

    Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.

  • ZeuS: A Persistent Criminal Enterprise

    Sponsored by: Trend Micro

    This research paper, presented by Trend Micro, examines the ZeuS botnet; a cyber-criminal tool primarily used to steal money. Access this paper now to learn how ZeuS works, who is behind this crimeware, ZeuS variants now emerging and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.