IT Management  >   Systems Operations  >   Security  >  

Anti Virus Protection

RSS Feed    Add to Google    Add to My Yahoo!
Anti Virus Protection Reports
 
Advanced cyber-security intelligence
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

Enterprise antimalware excess? Managing antimalware security products
sponsored by SearchSecurity.com
EGUIDE: Antimalware products implemented on your networks can pile up overtime. And while layered security is traditionally the best way to mitigate risk, this accumulation can lead to a confusing, costly and inefficient mess. Access this guide for expert tips on how to manage antimalware products and determine how much is enough.
Posted: 27 Apr 2012 | Published: 27 Apr 2012

SearchSecurity.com

Bullet-Proofing Your Email with Cloud-Based Security
sponsored by LogicNow
WHITE PAPER: Since malicious software and web links can bring down entire enterprises, having an extra layer of defense in place has never been more important. Learn what you can do to protect users, and deliver highly accurate spam detection, and robust virus defense.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

LogicNow

The Compliance and Security Balancing Act
sponsored by Mimecast
EGUIDE: In this expert guide, Karen Scarfone provides several practical tips on technologies that improve enterprise email security, and Christine Parizo discusses how to strike an ideal balance between compliance and security, when "compliant" doesn't necessarily mean "secure."
Posted: 22 Dec 2014 | Published: 22 Dec 2014

Mimecast

Androids in the Enterprise
sponsored by McAfee, Inc.
WHITE PAPER: McAfee is expanding its support for Android use, and keeping pace with the maturation of enterprise features in the underlying platform, such as remote management, encryption, and other crucial minimum requirements.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

McAfee, Inc.

What to Look for in Endpoint Antimalware Tools
sponsored by SearchSecurity.com
EBOOK: Hackers are creating increasingly sophisticated malware, so anti-malware protection must be part of enterprise security. This guide explains what anti-malware tools do and how to select the best anti-malware product for your enterprise.
Posted: 08 Mar 2016 | Published: 07 Mar 2016

SearchSecurity.com

Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®

E-Guide: How antivirus software works: Virus detection techniques
sponsored by M86 Security
EGUIDE: Antivirus software uses several different virus detection techniques, as described in this tip by expert Lenny Zeltser.
Posted: 05 Oct 2011 | Published: 05 Oct 2011

M86 Security

Bit9 Parity for Servers: International Communications Company Locks Down Domain controllers
sponsored by Bit9, Inc.
CASE STUDY: Domain controllers have become an increasingly popular target for malicious hackers for its access to an organization’s sensitive and intellectual property. This case study uncovers how one international communications firm was able to protect 225 of its domain controllers using Bit9 Parity for Servers and the key benefits they gained.
Posted: 23 May 2012 | Published: 23 May 2012

Bit9, Inc.

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement