IT Management  >   Systems Operations  >   Security  >  

Anti Virus Protection

RSS Feed    Add to Google    Add to My Yahoo!
Anti Virus Protection Reports
 
Information security breaches survey 2012
sponsored by ComputerWeekly.com
IT BRIEFING: Rising security breaches cost UK billions over the last 12 months as cyber attacks reached record levels, according to the 2012 Information Security Breaches survey.
Posted: 24 Apr 2012 | Published: 24 Apr 2012

ComputerWeekly.com

About to Buy Guide: Spam/virus protection for Exchange
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide explores the value of a comprehensive email security strategy, and compares the pros and cons of various approaches. Discover how you can gain the antispam and antivirus protection you need to keep email threats at bay and productivity high.
Posted: 05 Jun 2012 | Published: 05 Jun 2012

SearchSecurity.com

Technical Guide on Malware Trends
sponsored by SearchSecurity.com
EGUIDE: TechTarget’s Security Media Group presents a comprehensive guide to malware trends. Our experts help you adopt your security strategies, policies and spending to address the ever-changing and customized world of malware to keep targeted attacks, phishing scams and other malware-based attacks at bay.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

SearchSecurity.com

After Antimalware: Moving Toward Endpoint Antivirus Alternatives
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com outlines why - although endpoint antimalware has become ineffective - organizations today cannot live without it. In addition, learn about alternative methods available to protect your network and endpoints.
Posted: 06 May 2013 | Published: 06 May 2013

SearchSecurity.com

Information Security Essential Guide: The Evolution of Threat Detection and Management
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.
Posted: 18 Jul 2013 | Published: 31 May 2013

SearchSecurity.com

The Compliance and Security Balancing Act
sponsored by Mimecast
EGUIDE: In this expert guide, Karen Scarfone provides several practical tips on technologies that improve enterprise email security, and Christine Parizo discusses how to strike an ideal balance between compliance and security, when "compliant" doesn't necessarily mean "secure."
Posted: 22 Dec 2014 | Published: 22 Dec 2014

Mimecast

Information Security Magazine - March 2013
sponsored by SearchSecurity.com
EZINE: This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.
Posted: 28 Feb 2013 | Published: 01 Mar 2013

SearchSecurity.com

Simplify Your Relationship with Endpoint Security
sponsored by Symantec Corporation
WHITE PAPER: View this paper to explore the key reasons why managing endpoint security is complex, why a hosted endpoint solution can ease this complexity, to uncover Symantec Endpoint Protection.cloud and more.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Symantec Corporation

Antivirus: The Hippest New Apple Accessory
sponsored by Threat Track Security
WHITE PAPER: For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security

When Malware Goes Mobile: Causes, Outcomes and Cures
sponsored by Sophos, Inc.
WHITE PAPER: This whtie paper will review a step-by-step approach you can take in order to strengthen your abaility to ward of malware attacks and keep mobile data secure. Read on to learn about platform specific policies, effective prevention strategies, and more.
Posted: 23 May 2013 | Published: 17 May 2013

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement