IT Management  >   Systems Operations  >   Security  >  

Email Virus Protection

RSS Feed    Add to Google    Add to My Yahoo!
Email Virus Protection Reports
 
Technical Guide on Malware Trends
sponsored by SearchSecurity.com
EGUIDE: TechTarget’s Security Media Group presents a comprehensive guide to malware trends. Our experts help you adopt your security strategies, policies and spending to address the ever-changing and customized world of malware to keep targeted attacks, phishing scams and other malware-based attacks at bay.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

SearchSecurity.com

Best Practices for Preventing Malware
sponsored by SearchSecurity.com
EGUIDE: Preventing malware has been a constant issue for both consumers and businesses since the beginning. Malware can often present itself in all areas of an industry, including both new and old methods. Check out this E-Guide to discover the best practices for inhibiting malware from affecting both your business and your customers.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

SearchSecurity.com

After Antimalware: Moving Toward Endpoint Antivirus Alternatives
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com outlines why - although endpoint antimalware has become ineffective - organizations today cannot live without it. In addition, learn about alternative methods available to protect your network and endpoints.
Posted: 06 May 2013 | Published: 06 May 2013

SearchSecurity.com

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

An Expert Guide to the PCI DSS 3.0
sponsored by SearchSecurity.com
EBOOK: This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

SearchSecurity.com

E-Guide: How antivirus software works: Virus detection techniques
sponsored by M86 Security
EGUIDE: Antivirus software uses several different virus detection techniques, as described in this tip by expert Lenny Zeltser.
Posted: 05 Oct 2011 | Published: 05 Oct 2011

M86 Security

Vantage Point Solutions Group Cut Costs and Strengthens Client Relationships with Webroot
sponsored by Webroot
CASE STUDY: This brief case study shows how one IT services company deployed a standardized single endpoint security solution and saw improved efficiency and performance.
Posted: 18 Apr 2014 | Published: 28 Feb 2014

Webroot

Simplify Your Relationship with Endpoint Security
sponsored by Symantec Corporation
WHITE PAPER: View this paper to explore the key reasons why managing endpoint security is complex, why a hosted endpoint solution can ease this complexity, to uncover Symantec Endpoint Protection.cloud and more.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Symantec Corporation

Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®

Case Study: Antivirus Business Exceeds Mitsubishi Polysilicon’s Needs for Malware Protection
sponsored by Threat Track Security
CASE STUDY: This brief case study demonstrates how Mitsubishi Polysilicon implemented an improved anti-malware solution that eliminated downtime during scans, resulting in improved productivity and streamlined business processes.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement