IT Management  >   Systems Operations  >   Security  >  

Virus Detection

RSS Feed    Add to Google    Add to My Yahoo!
Virus Detection Reports
The Compliance and Security Balancing Act
sponsored by Mimecast
EGUIDE: In this expert guide, Karen Scarfone provides several practical tips on technologies that improve enterprise email security, and Christine Parizo discusses how to strike an ideal balance between compliance and security, when "compliant" doesn't necessarily mean "secure."
Posted: 22 Dec 2014 | Published: 22 Dec 2014


Global profiles of the fraudster
sponsored by
ESSENTIAL GUIDE: Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

Information Security Breaches Survey 2013
sponsored by
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

Online Enemy #1: Blackhole Exploit Kit
sponsored by Threat Track Security
WHITE PAPER: This short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

Threat Track Security

The New Reality of Stealth Crimeware
sponsored by McAfee, Inc.
WHITE PAPER: This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.
Posted: 31 May 2013 | Published: 31 May 2013

McAfee, Inc.

Think Your Anti-Virus Software Is Working? Think Again
sponsored by Lumension
WHITE PAPER: Many people who subscribe to anti-virus offers think that's enough, however, studies show that more and more organizations are suffering from attacks because the software is inefficient. In order to prevent attacks, businesses need to take other steps for further protection.
Posted: 13 Jul 2012 | Published: 31 Mar 2011


BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Corporate AV/EPP Comparative Analysis: Exploit Evasion Defenses
sponsored by McAfee, Inc.
ANALYST REPORT: NSS Labs conducted a report to reveal which endpoint protection platform provides the best protection against evasion techniques. View now to uncover how 11 different EPP products fared during analysis.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

McAfee, Inc.

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013


IT Administrator Saves Engineering Firm More than 200 Hour a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection
sponsored by Webroot
CASE STUDY: In this case study, learn how engineering and project management firm Doris, Inc. was able to combat slow scan times, complex management, and ineffective protection by investing in the right endpoint security solution.
Posted: 15 May 2013 | Published: 31 Dec 2012

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement