IT Management  >   Systems Operations  >   Security  >  

Virus Prevention

RSS Feed    Add to Google    Add to My Yahoo!
Virus Prevention Reports
 
DraftKings Replaces Traditional Antivirus with Next-Gen AV (NGAV)
sponsored by Carbon Black
RESOURCE: Discover how DraftKings went about finding a comprehensive next-generation antivirus solution that wouldn't impact business operations. While DraftKings evaluated over 100 different providers, only one allowed them to continue working as normal, while protecting their network in the background.
Posted: 28 Oct 2016 | Published: 25 Oct 2016

Carbon Black

The Evolution of Threat Detection and Management
sponsored by SearchSecurity.com
EGUIDE: This e-guide from SearchSecurity.com explores the [evolution of threat detection and management] and offers advice on how to tackle potentially disastrous APTs, detailing multiple mitigation methods, from SIEMs and big data to sandboxing and whitelisting.
Posted: 19 Jun 2013 | Published: 19 Jun 2013

SearchSecurity.com

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®

Managing Web Security in an Increasing Challenging Threat Landscape
sponsored by SearchSecurity.com
WHITE PAPER: This resource offers guidance to help your organization manage web security in an increasingly dangerous threat landscape. Learn how cybercriminals are targeting web-based vulnerabilities and see what you can do to stay safe by reading on now.
Posted: 31 May 2013 | Published: 31 May 2013

SearchSecurity.com

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE

EFT Server to Replace USB for SCADA; EFT Server Enterprise Helps to Reduce Risks through Multi-Zone Architecture
sponsored by Globalscape
WHITE PAPER: This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally.
Posted: 06 Mar 2014 | Published: 31 Dec 2012

Globalscape

Antivirus: The Hippest New Apple Accessory
sponsored by Threat Track Security
WHITE PAPER: For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security

Global Threats Report Dec 2011
sponsored by ESET
WHITE PAPER: The Global Threat Report offers a monthly overview of the most important cybersecurity issues facing the IT community today, offering informative articles, security tips, viral online resources, expert advice and opinions from ESET researchers, and the essential Top Ten Threats lists. Access now to learn how you can stay informed.
Posted: 26 Jan 2012 | Published: 26 Jan 2012

ESET

Antimalware IT Checklist: RFP Technology Decisions Part 2
sponsored by SearchSecurity.com
EGUIDE: Part 2 of SearchSecurity.com's 3-part guide on antimalware products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the RFI process. Get an overview of technical requirements, questions to ask potential vendors, and a list of products that may meet your needs.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement