ComputerWeekly.com Research Library

Powered by Bitpipe.com

Virus Protection White Papers

  • Royal Holloway: Testing antivirus efficacy in Linux

    Sponsored by: TechTarget ComputerWeekly.com

    Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.

  • Audi fine-tunes its digital performance to boost online car sales

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.

  • Understanding behavioural detection of antivirus

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.

  • Security Threat Report: July 2009 Update

    Sponsored by: Sophos

    Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.

  • Presentation Transcript: Endpoint security fundamentals

    Sponsored by: Sophos

    This presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight.

  • Understanding the Total Cost of Ownership for Endpoint Security Solutions

    Sponsored by: Sophos

    When moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison.

  • Managed Office Protection: Switching from AV to SaaS

    Sponsored by: Panda Security

    Antivirus products require too much time and effort for small and mid-sized companies. Security as a Service (SaaS) means delivering traditional security applications as an Internet-based service to customers. Now you can focus on your core business, switch from Antivirus to Security as a Service and start enjoying the benefits of SaaS.

  • Symantec Internet Security Threat Report: Trends for 2008

    Sponsored by: Symantec Corporation

    This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.

  • Blue Coat WebFilter

    Sponsored by: BlueCoat

    Review this brief data sheet to learn how WebFilter helps prevent Internet attacks from spyware, phishing, peer-to-peer (P2P) traffic, viral content and more. WebFilter also includes Dynamic Real-Time Rating (DRTR), a patented technology that can instantly categorize Web sites when a user attempts to access them.

  • Magic Quadrant for Endpoint Protection Platforms

    Sponsored by: Sophos

    Gartner's Magic Quadrant for Endpoint Protection Platforms assesses a company's ability to execute and its completeness of vision. According to Gartner, Sophos continues to have a strong reputation for support and service from customers and the management interface achieves a good balance of simplicity without sacrificing depth of control.

  • Exchange Insider E-Zine Volume 1: The Importance of Lifecycle Planning for Email Archives

    Sponsored by: TechTarget Search Windows Server

    In this premier issue of Exchange Insider, you'll learn the importance of properly archiving email messages in your Exchange environment, learn how implementing SSL concepts is required for proper Exchange infrastructure management, and what the requirements are to securely migrate to Exchange Server 2007 from previous, legacy versions.

  • Symantec Endpoint Protection 11.0.3

    Sponsored by: Symantec Corporation

    In this Tolly Group competitive performance evaluation, learn how Symantec Endpoint Protection 11.0.3 consistently delivered faster response time than competing products tested.

  • The CIO's Guide to Mobile Security

    Sponsored by: BlackBerry

    Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.

  • Five Ways to Improve Your Wireless Security

    Sponsored by: Cisco Systems, Inc.

    A wireless network can help your employees stay productive as they move around your company, but to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users.

  • Symantec Internet Security Threat Report: Trends for July-December 07

    Sponsored by: Symantec Corporation

    This summary of the Internet Security Threat Report will alert readers to current trends and impending threats that Symantec has observed for the six-month period from July 1 to December 31, 2007.

  • The Impact of Messaging and Web Threats

    Sponsored by: Trend Micro, Inc.

    This Osterman Research white paper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks.

  • Symantec Backup Exec™ System Recovery 8: The Gold Standard in Complete Windows System Recovery

    Sponsored by: Symantec Corporation

    Symantec Backup Exec™ System Recovery 8 is the gold standard in complete Windows® system recovery, allowing businesses and IT to recover from system loss or disaster in minutes, not hours or days.

  • Secure Enterprise e-mail Solutions with Microsoft® Exchange

    Sponsored by: OnX USA LLC

    This white paper describes HP's set of add-on Microsoft Exchange solutions that protect against security, performance and availability risks and enable e-mail administrators to set and better enforce message handling policies.

  • Intel Centrino Pro and Intel vPro Processor Technology

    Sponsored by: Intel Corporation

    Learn how to improve security and management capabilities with Intel vPro processor technology. This white paper discusses how remote management can simplify systems management and save time for IT administrators.

  • Cyber Attacks on the Rise: IBM 2007 Report

    Sponsored by: IBM

    This white paper shows how the IBM Internet Security Systems™ X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.

  • A Guide to Evaluating Email Security Solutions

    Sponsored by: SonicWALL

    E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.

  • Potomac Hospital Case Study

    Sponsored by: SonicWALL

    In this case study Potomac Hospital installed SonicWALL PRO 5060 across their hospital’s network. Learn how SonicWALL’s CDP appliances deliver complete, disk-based backup and recovery solutions that replicate data in real-time.

  • Stratecast: An SSL VPN Selection Framework: One Size Does Not Fit All

    Sponsored by: SonicWALL

    SSL VPN is an important layer of protection for your company. This paper details an SSL VPN selection framework to help you evaluate the best option for your organization and how to save time and money when selecting your next SSL VPN.

  • Best Practices for Windows Vista Planning, Migration, and Ongoing Management

    Sponsored by: Symantec Corporation

    It is vital to ensure PC system and data security during migration to Windows Vista. This white paper highlights considerations that must be addressed over the entire migration process.

  • Symantec Mail Security for SMTP 5.0

    Sponsored by: Symantec Corporation

    This white paper examines the filtering capabilities, threat protection, and message management capabilities available in Symantec Mail Security for SMTP 5.0. Learn how to prevent rapid email virus outbreaks and respond to evolving email securi...

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.