IT Management  >   Systems Operations  >   Security  >  

Virus Prevention

RSS Feed    Add to Google    Add to My Yahoo!
Virus PreventionReports
 
About to Buy Guide: Spam/virus protection for Exchange
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide explores the value of a comprehensive email security strategy, and compares the pros and cons of various approaches. Discover how you can gain the antispam and antivirus protection you need to keep email threats at bay and productivity high.
Posted: 05 Jun 2012 | Published: 05 Jun 2012

SearchSecurity.com

How traditional firewalls fail
sponsored by Dell Software
WHITE PAPER: Did you know that your current firewall may be jeopardizing your network security? Traditional firewalls that only focus on stateful packet inspection and access control rules aren't effective in today's world. This e-book explains where traditional firewalls fall short – and what you can do about it.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

Dell Software

Global profiles of the fraudster
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

Live Demo: How to Detect a Cryptolocker Infection
sponsored by AlienVault
WEBCAST: This informative webcast explains how CryptoLocker, a type of ransomware, gains access to your computer, and how to use a Unified Security Management platform to monitor and detect these dangerous threats.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault

Defending Systems on a Wide-open Network with Symantec Endpoint Protection
sponsored by Symantec Corporation
CASE STUDY: Advertising agency, Direct Agents, needed protection at each individual computer because their employees routinely accessed websites and opened emails that were potentially harmful. In this case study, learn how Symantec Endpoint Protection was able to meet their needs, providing simplified management and protection while saving on costs.
Posted: 02 Jul 2012 | Published: 02 Jul 2012

Symantec Corporation

Lowering IT Costs: How to Reduce the Need for Desktop Remediation and Shave Millions off IT Expenses
sponsored by M86 Security
WHITE PAPER: The average malware attack can cause significant damage, forcing organizations to exceed their budgets. In this paper, gain a better understanding of how much the next-generation threats impact remediation costs and discover a solution to minimize those cost, while maximizing efficiency.
Posted: 18 Nov 2011 | Published: 18 Nov 2011

M86 Security

Problematic - Unloved - Argumentative (PUA): What is a potentially unwanted app
sponsored by ESET
WHITE PAPER: In this paper, discover what is a Potentially Unwanted Application (PUA) and explore the differences between threats posed by malicious types of software such as computer viruses and worms, and those which are classified as being potentially unwanted.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

ESET

The New Reality of Stealth Crimeware
sponsored by McAfee, Inc.
WHITE PAPER: This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.
Posted: 31 May 2013 | Published: 31 May 2013

McAfee, Inc.

Treehouse in the Glen: Green Toy Store Grows with Symantec Endpoint Protection
sponsored by Symantec Corporation
CASE STUDY: The owner of Treehouse in the Glen had found himself spread too thin trying to manage his toy business and the mix of security products they had implemented. In this case study, uncover how he was able to reduce the time spent on managing information security, defend against virus outbreaks and enable faster system performance.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

Symantec Corporation

FireEye 1H 2011 Advanced Threat Report
sponsored by FireEye
ANALYST REPORT: This FireEye Advanced Threat report offers a global view into the cyber attacks that routinely bypass traditional defenses, using the threat data shared by thousands of FireEye Malware Protection Systems (MPS) deployments. View now to explore key findings in this analysis that uncover the real security issues enterprises face today.
Posted: 14 Nov 2011 | Published: 14 Nov 2011

FireEye
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement