Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Virus Scanning Software

RSS Feed    Add to Google    Add to My Yahoo!
Virus Scanning Software Reports
 
Antimalware IT Checklist: Decision Time Part 3
sponsored by SearchSecurity.com
EGUIDE: This is the third piece in SearchSecurity.com's three-part guide on antimalware products. This expert asset, written by security researcher Mike Rothman, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

SearchSecurity.com

IT Security Purchasing Intentions 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

ComputerWeekly.com

Global Threat Trends: October 2010
sponsored by ESET
WHITE PAPER: Read this month's Global Threat Trends to learn about the top 10 security threats in October. Discover what’s new on the cyber front and get an inside look at this year's eCity Symposium, and more!
Posted: 10 Nov 2010 | Published: 10 Nov 2010

ESET

Case Study: GoldenTree Asset Management
sponsored by ESET
CASE STUDY: In this case study you’ll learn how one London finance company did the following: found malware other AV products weren’t finding; secured the environment; witnessing virus protection doing what it is designed to do. Read on to learn so much more.
Posted: 22 Oct 2010 | Published: 22 Oct 2010

ESET

McAfee Tackles the Complexities of Endpoint Security
sponsored by Intel Security
WHITE PAPER: This white paper presents the myriad of enterprise endpoint threats today, and how you can conquer these difficult complexities.
Posted: 04 Jun 2013 | Published: 29 Mar 2013

Intel Security

Guide: Patch Authority Ultimate
sponsored by ScriptLogic Corporation
WHITE PAPER: With exploits for known vulnerabilities unleashed on the Internet within as little as 5 days from the release of new patches from Microsoft, it is imperative your desktops and servers be regularly updated to keep them safe from attack.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

Symantec Report on Rogue Security Software
sponsored by Symantec Corporation
WHITE PAPER: The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. Read this report to learn the specifics about security software scams.
Posted: 10 Dec 2009 | Published: 01 Oct 2009

Symantec Corporation

Global Threat Trends - December 2009
sponsored by ESET
WHITE PAPER: Review this report to see what threats had the highest number of detections in the past month according to the results of a sophisticated analysis provided by ESET's ThreatSense.Net.
Posted: 16 Sep 2009 | Published: 02 Sep 2009

ESET

Stuxnet Under the Microscope
sponsored by ESET
WHITE PAPER: This report is devoted to the analysis of the notorious Stuxnet worm (Win32/Stuxnet) that suddenly attracted the attention of virus researchers this summer. This report is primarily intended to describe targeted and semi-targeted attacks, and how they are implemented, focusing mainly on the most recent, namely Stuxnet.
Posted: 04 Oct 2010 | Published: 04 Oct 2010

ESET

Think Your Anti-Virus Software Is Working? Think Again
sponsored by Lumension
WHITE PAPER: Many people who subscribe to anti-virus offers think that's enough, however, studies show that more and more organizations are suffering from attacks because the software is inefficient. In order to prevent attacks, businesses need to take other steps for further protection.
Posted: 13 Jul 2012 | Published: 31 Mar 2011

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement