Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Antivirus

RSS Feed    Add to Google    Add to My Yahoo!
AntivirusReports
 
Information Security Essential Guide: The Evolution of Threat Detection and Management
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.
Posted: 18 Jul 2013 | Published: 31 May 2013

SearchSecurity.com

File Security for Linux/BSD/Solaris: Antivirus Protection for your servers
sponsored by ESET
DATA SHEET: ESET File Security provides Linux, BSD and Solaris file servers with on-demand and on-access protection from known and emerging viruses, worms, trojans, spyware, rootkits and other Internet threats.
Posted: 25 Mar 2011 | Published: 25 Mar 2011

ESET

Presentation Transcript: Why Small Businesses Should Think Outside the Box When Choosing Endpoint Security Solutions
sponsored by Sunbelt Software
PRESENTATION TRANSCRIPT: In this presentation transcript of the webinar "Why Small Businesses Should Think Outside the Box When Choosing Endpoint Security Solutions" you’ll learn why "bigger isn't necessarily better" when it comes to selecting an antivirus vendor.
Posted: 18 Aug 2009 | Published: 18 Aug 2009

Sunbelt Software

Virus Bulletin: Comparative Reviews in 2010
sponsored by ESET
WHITE PAPER: This paper shows you the latest news about the VB100 testing, Linux Enterprise Server 11, Windows XP SP3, Windows Server 2008 R2 and so much more.
Posted: 16 Jun 2010 | Published: 16 Jun 2010

ESET

Global Threat Trends- Year-End Report 2009
sponsored by ESET
WHITE PAPER: In this paper you'll learn the most prevalent threats, including their percentage values relative to all the threats detected by ThreatSense.Net®.
Posted: 21 Jan 2010 | Published: 21 Jan 2010

ESET

Responding to—and recovering from—sophisticated security attacks
sponsored by IBM
WHITE PAPER: In this resource, find four things you can do now to keep your organization safe. Learn what you need to know to effectively respond to and recover from sophisticated security attacks by reading on now.
Posted: 14 May 2013 | Published: 28 Feb 2013

IBM

IT Administrator Saves Engineering Firm More than 200 Hour a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection
sponsored by Webroot
CASE STUDY: In this case study, learn how engineering and project management firm Doris, Inc. was able to combat slow scan times, complex management, and ineffective protection by investing in the right endpoint security solution.
Posted: 15 May 2013 | Published: 31 Dec 2012

Webroot

The New Reality of Stealth Crimeware
sponsored by McAfee.
WHITE PAPER: The new reality of crimeware consists of the stealth, creativity and patience of stuxnet, and the commercialism, wide distribution and easy-to-use toolkits of Zeus, making it even more challenging to detect and protect against. Organisations must go beyond the traditional security to ensure their intellectual property is safe.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

McAfee.

E-Guide: Run Antivirus Scans in Virtual Environments Without Compromising System Performance
sponsored by CA Technologies.
EGUIDE: This expert e-guide from SearchServerVirtualization.com explains considerations to keep in mind when planning antivirus scans in your virtual environment.
Posted: 15 Oct 2010 | Published: 15 Oct 2010

CA Technologies.

Not all Malware Detection is Created Equal
sponsored by Sophos, Inc.
WHITE PAPER: The internet is now the number-one conduit for infecting users with malware. Sophos detects a new infected web page every few seconds. This white paper outlines the terms you need to know and the steps you should take to stay safe.
Posted: 01 Apr 2010 | Published: 05 Nov 2009

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement