Software  >   Systems Software  >   Security Software  >   Internet Security Software  >  

Antispyware Software

RSS Feed    Add to Google    Add to My Yahoo!
Antispyware SoftwareReports
 
Essential Enterprise Mobile Security Controls
sponsored by SearchSecurity.com
EGUIDE: How will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

SearchSecurity.com

Protecting Commercial Online Banking Customers from Next-Generation Malware
sponsored by IronKey
WHITE PAPER: Cybercriminals are now using advanced malicious software (malware) to attack the computers of finance professionals in companies and government agencies. Read this paper now to learn how your business can stay protected from these threats.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

IronKey

Achieving PCI Compliance at the Point Of Sale Using Bit9 Parity™ to Protect Cardholder Data
sponsored by Bit9, Inc.
WHITE PAPER: As the technology used by merchants and their partners has evolved, card fraud has become more sophisticated. In response to this evolving threat, the major credit card companies have created a set of security standards to protect their customers from security breaches. Read this whitepaper to find out how Bit9 Parity helps achieve compliance...
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.

Symantec Internet Security Threat Report: Trends for 2008
sponsored by Symantec Corporation
WHITE PAPER: This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.
Posted: 09 Jun 2009 | Published: 01 Apr 2009

Symantec Corporation

The Evolving Landscape of Desktop Security
sponsored by McAfee, Inc.
WHITE PAPER: This resource will help you learn about an application control solution coupled with traditional anti-virus technology can help you address threats quickly and effectively while also keeping close track of unauthorized applications. Read on to learn more.
Posted: 30 May 2013 | Published: 30 May 2013

McAfee, Inc.

Internet Security… a Priority you can Forget About: High on protection low on maintenance, AVG frees the support team.
sponsored by AVG Technologies USA, Inc.
CASE STUDY: Waingels College in Wokingham is a successful secondary school with almost 500 workstations and servers across the campus. They are challenged with maintaining the efficient running of back office and classroom systems with limited ICT support resources. Read this short case study to learn more about how Waingels College manage their IT security.
Posted: 31 Mar 2010 | Published: 31 Mar 2010

AVG Technologies USA, Inc.

Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
sponsored by Imperva
EGUIDE: In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
Posted: 17 Jun 2013 | Published: 17 Jun 2013

Imperva

Integrated Software Enhances Enterprise Security
sponsored by Intel Corporation
PRODUCT LITERATURE: Intel IT is deploying an integrated security software solution that cuts response time to threats by 90 percent, while addressing enterprise needs for rapid software installation, scalability, reliability, and reporting.
Posted: 12 Aug 2008 | Published: 01 Nov 2005

Intel Corporation

The Extraordinary Failure of Anti-Virus Technology
sponsored by SecureWave
WHITE PAPER: Anti-Virus technology fails to prevent computers from virus infections. This paper examines how whitelisting prevents malware and defends against evolving threats. Learn about five common security breaches and how whitelisting can help prevent them.
Posted: 02 Feb 2007 | Published: 01 Feb 2007

SecureWave

AVG Anti-Virus Network Edition Delivers Rock Solid, Easy to Manage Protection for US Construction Firm
sponsored by AVG Technologies USA, Inc.
CASE STUDY: R&O Construction was having difficulty managing their mostly mobile network. With so many laptops and mobile devices in use remotely, the company was seeing an increase in security threats infecting the IT infrastructure. Their existing solution was overtaxing both system and human resources. Read on to learn how they overcame these challenges.
Posted: 31 Mar 2010 | Published: 31 Mar 2010

AVG Technologies USA, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement