Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Worm Detection Software

RSS Feed    Add to Google    Add to My Yahoo!
Worm Detection SoftwareReports
 
Best Practices for Preventing Malware
sponsored by SearchSecurity.com
EGUIDE: Preventing malware has been a constant issue for both consumers and businesses since the beginning. Malware can often present itself in all areas of an industry, including both new and old methods. Check out this E-Guide to discover the best practices for inhibiting malware from affecting both your business and your customers.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

SearchSecurity.com

E-Book: Technical Guide on Combatting Emerging Web Threats
sponsored by SearchSecurity.com
EBOOK: Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.
Posted: 09 Jun 2010 | Published: 09 Jun 2010

SearchSecurity.com

Antivirus: The Hippest New Apple Accessory
sponsored by Threat Track Security
WHITE PAPER: For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security

What is FakeAV?
sponsored by Sophos, Inc.
WHITE PAPER: FakeAV, or Fake AntiVirus, is a class of malware that display false alert messages concerning threats that do not really exist. The alerts prompt users to visit a website where they will be asked to pay for these non-existent threats to be cleaned up. Read on to learn where FakeAV comes from, how they act, and how to protect yourself.
Posted: 25 Jun 2010 | Published: 24 May 2010

Sophos, Inc.

Case Study: San Diego Gastroenterology Medical Associates
sponsored by ESET
CASE STUDY: Read this case to learn about one company's battle with virus protection and what they did to overcome it.
Posted: 06 Aug 2010 | Published: 06 Aug 2010

ESET

Anittel Simplifies Managed Antivirus Service Case Study
sponsored by Webroot
CASE STUDY: This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.
Posted: 14 May 2013 | Published: 14 May 2013

Webroot

Treehouse in the Glen: Green Toy Store Grows with Symantec Endpoint Protection
sponsored by Symantec Corporation
CASE STUDY: The owner of Treehouse in the Glen had found himself spread too thin trying to manage his toy business and the mix of security products they had implemented. In this case study, uncover how he was able to reduce the time spent on managing information security, defend against virus outbreaks and enable faster system performance.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

Symantec Corporation

Novell® Sentinel™: Active Event Monitoring for Improved Security and Compliance Management
sponsored by Novell, Inc.
WHITE PAPER: Novell Sentinel combines the benefits of identity and systems management with real-time security event management and monitoring. It gives you a comprehensive, real-time dashboard view of user, network and application events, so your IT staff can be much more responsive to potential threats.
Posted: 06 Oct 2009 | Published: 06 Oct 2009

Novell, Inc.

How to collect Windows Event logs to detect a targeted attack
sponsored by M86 Security
EGUIDE: Targeted attacks are growing, and eventually your enterprise will be a target. In this e-guide, expert Richard Bejtlich covers how to collect Windows Event logs to detect an intrusion.
Posted: 13 Jul 2011 | Published: 13 Jul 2011

M86 Security

Responding to—and recovering from—sophisticated security attacks
sponsored by IBM
WHITE PAPER: In this resource, find four things you can do now to keep your organization safe. Learn what you need to know to effectively respond to and recover from sophisticated security attacks by reading on now.
Posted: 14 May 2013 | Published: 28 Feb 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement