IT Management  >   Systems Operations  >   Security  >  

Virus Detection

RSS Feed    Add to Google    Add to My Yahoo!
Virus Detection Reports
 
E-Guide: New Malware Threats Require New Antimalware Protection Strategy
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

SearchSecurity.com

Meet N-able Security Manager
sponsored by Solarwinds N-able
VIDEO: Access this brief video to learn about an industry-awarded and industry-leading anti-virus solution that meets the need of your business while still allowing you to remain profitable.
Posted: 23 Sep 2014 | Premiered: 25 Feb 2014

Solarwinds N-able

CW Special report on Symantec
sponsored by ComputerWeekly.com
WHITE PAPER: This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com

E-Guide: How antivirus software works: Virus detection techniques
sponsored by M86 Security
EGUIDE: Antivirus software uses several different virus detection techniques, as described in this tip by expert Lenny Zeltser.
Posted: 05 Oct 2011 | Published: 05 Oct 2011

M86 Security

Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®

Simplify Your Relationship with Endpoint Security
sponsored by Symantec Corporation
WHITE PAPER: View this paper to explore the key reasons why managing endpoint security is complex, why a hosted endpoint solution can ease this complexity, to uncover Symantec Endpoint Protection.cloud and more.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Symantec Corporation

Endpoint Protection Solutions: Why the Traditional Model is Broken
sponsored by Webroot
WHITE PAPER: Securing the enterprise may never have been a simple task, but now it is far more complex as hackers have become more creative and as the enterprise itself has extended into remote locations and as far as “the cloud.”
Posted: 10 Nov 2011 | Published: 10 Nov 2011

Webroot

The N-able MSP Sales & Marketing Digital Binder
sponsored by Solarwinds N-able
RESOURCE: This digital binder was created to provide IT Service Providers with a set of ready-made marketing resources that can be easily customized to immediately start driving recurring revenue from their existing customers, and attract new prospects.
Posted: 03 Oct 2011 | Published: 03 Oct 2011

Solarwinds N-able

Responding to—and recovering from—sophisticated security attacks
sponsored by IBM
WHITE PAPER: In this resource, find four things you can do now to keep your organization safe. Learn what you need to know to effectively respond to and recover from sophisticated security attacks by reading on now.
Posted: 14 May 2013 | Published: 28 Feb 2013

IBM

Eight threats your antivirus won't stop
sponsored by Sophos, Inc.
WHITE PAPER: News headlines are a constant reminder that malware attacks and data leakage are on the rise. High-profile incidents that make big news might seem out of the ordinary. Yet businesses of every size face similar risks in the everyday acts of using digital technology and the internet for legitimate purposes.
Posted: 23 Dec 2011 | Published: 23 Dec 2011

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement