ComputerWeekly.com Research Library

Powered by Bitpipe.com

Anti-Spam Software White Papers

  • A Computer Weekly buyer's guide to Threat Management

    Sponsored by: TechTarget ComputerWeekly.com

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

  • A Computer Weekly buyer's guide to Threat Management

    Sponsored by: TechTarget ComputerWeekly.com

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

  • What to Look for in Endpoint Antimalware Tools

    Sponsored by: TechTarget Security

    Read this buyer's guide to uncover which types of endpoint and anti-malware tools best suit your enterprise by discovering what to look for in the strategies.

  • Advanced Persistent Threat Detection: Can It Find Custom Malware?

    Sponsored by: UnitedLex

    A recent test showed that some well-known threat detection products were unable to detect custom-written malware samples thrown at them. Access this resource and find out if APT detection is an effective way to find custom malware, and why signature-based antimalware tools can't keep up with today's evolving security risks.

  • Shore Up Your Office 365 Attack Surface

    Sponsored by: Proofpoint

    This exclusive e-guide reviews the Office 365 suite's security features, including how to take advantage of its benefits and what challenges you may encounter.

  • Adapting to the new web security and email security threats

    Sponsored by: Cisco Systems, Inc.

    In this expert e-guide from SearchSecurity.com, industry leaders Karen Scarfone and Nick Lewis offer critical tips to securing email and Web use – given the latest advanced, targeted threats.

  • Symantec Intelligence Report – May 2013

    Sponsored by: Symantec Corporation

    Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.

  • Threat Detection (Antivirus Intrusion Prevention)

    Sponsored by: TechTarget Security

    Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.

  • Online Enemy #1: Blackhole Exploit Kit

    Sponsored by: Threat Track Security

    This short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.

  • Antivirus: The Hippest New Apple Accessory

    Sponsored by: Threat Track Security

    For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.

  • Network Security Report: The State of Network Security in Schools

    Sponsored by: Threat Track Security

    Access this comprehensive resource to learn how to overcome the challenges of securing school networks. Discover ways to control sources of vulnerability that are inherently difficult to control. Additionally, achieve a better understanding of the ever-changing landscape of technology and malware.

  • Information Security Magazine - March 2013

    Sponsored by: TechTarget Security

    This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.

  • The N-able MSP Sales & Marketing Digital Binder

    Sponsored by: Solarwinds N-able

    This digital binder was created to provide IT Service Providers with a set of ready-made marketing resources that can be easily customized to immediately start driving recurring revenue from their existing customers, and attract new prospects.

  • E-Guide: Enterprise UTM Security: The Best Threat Management Solution?

    Sponsored by: NETGEAR Inc.

    If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information security. However, I've never met a security professional who believes everything they read. UTM provides decent network security for small to midsized businesses, but probably has no place in the enterprise.

  • Presentation Transcript: Rogue Security Software - An In-Depth Look And The Challenges For Business

    Sponsored by: Sunbelt Software

    In this presentation transcript, Chris Boyd, GFI Software’s Senior Threat Researcher, provides an in-depth look into Rogue antivirus. He details the damage it can cause and how they have been tailored to look like legitimate products. You will also learn what businesses can do to better protect their network and end users from these threats.

  • Case Study: School District Switches to Trend Micro™ Enterprise Security-- Camden County Schools Virtualize Gateway Security, Increase Spam and Spyware Protection

    Sponsored by: Trend Micro, Inc.

    Read this case study to learn Camden County Schools provide students with information technology that increases learning and achievement while simultaneously driving administrative efficiencies and effectiveness.  

  • Threatsaurus: The A-Z of Computer and Data Security Threats

    Sponsored by: Sophos UK

    Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.

  • Not all Malware Detection is Created Equal

    Sponsored by: Sophos

    The internet is now the number-one conduit for infecting users with malware. Sophos detects a new infected web page every few seconds. This white paper outlines the terms you need to know and the steps you should take to stay safe.

  • Internet Security… a Priority you can Forget About: High on protection low on maintenance, AVG frees the support team.

    Sponsored by: AVG Technologies USA, Inc.

    Waingels College in Wokingham is a successful secondary school with almost 500 workstations and servers across the campus. They are challenged with maintaining the efficient running of back office and classroom systems with limited ICT support resources. Read this short case study to learn more about how Waingels College manage their IT security.

  • AVG Anti-Virus Network Edition Delivers Rock Solid, Easy to Manage Protection for US Construction Firm

    Sponsored by: AVG Technologies USA, Inc.

    R&O Construction was having difficulty managing their mostly mobile network. With so many laptops and mobile devices in use remotely, the company was seeing an increase in security threats infecting the IT infrastructure. Their existing solution was overtaxing both system and human resources. Read on to learn how they overcame these challenges.

  • How Malware Can Sneak Into Your Company Networks and How to Deal With It

    Sponsored by: AVG Technologies USA, Inc.

    Taking your network offline might sound like the only effective way to keep viruses and other so-called malware out of your business. But even without the internet, there are still plenty of ways for malicious code to worm its way onto your network. Read this quick white paper for an overview of the main threats and how to protect against them.

  • Fast-Growing Municipality in Southeast USA Secures IT Operations and Services with AVG Anti-Virus Network Edition

    Sponsored by: AVG Technologies USA, Inc.

    The city of Brentwood’s IT environment is made up of 450 computers and counting. Increased population growth brings greater IT infrastructure needs. Brentwood’s old security provider couldn’t keep up. Read this brief case study to find out how Brentwood managed to meet their growing IT security needs.

  • Symantec Report on Rogue Security Software

    Sponsored by: Symantec Corporation

    The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. Read this report to learn the specifics about security software scams.

  • Case Study: ORDISMATIC Uses Panda Cloud Email Protection to Protect Its Clients from Spam

    Sponsored by: Panda Security

    Read this brief case study to learn how Panda Cloud Email Protection helped ORDISMATIC, an IT vendor, to simplify risk management, reduce operating costs, increase productivity, and achieve significant decreases in spam.

  • Buyer’s Guide to Antimalware

    Sponsored by: Panda Security

    Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.