Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Worm Detection Software

RSS Feed    Add to Google    Add to My Yahoo!
Worm Detection Software Reports
 
File Security for Linux/BSD/Solaris: Antivirus Protection for your servers
sponsored by ESET
DATA SHEET: ESET File Security provides Linux, BSD and Solaris file servers with on-demand and on-access protection from known and emerging viruses, worms, trojans, spyware, rootkits and other Internet threats.
Posted: 25 Mar 2011 | Published: 25 Mar 2011

ESET

Sophos Computer Security Scan
sponsored by Sophos, Inc.
TRIAL SOFTWARE: Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.
Posted: 07 Apr 2010 | Premiered: 07 Apr 2010

Sophos, Inc.

Case Study: Panda Security Enables Gloucestershire NHS to Communicate Effectively and Safely
sponsored by Panda Security
CASE STUDY: Learn how Gloucestershire NHS was able to help 1700 client computers send and receive vital information safely and efficiently by installing Panda's Managed Office Protection Antivirus solution.
Posted: 18 Sep 2009 | Published: 25 Jul 2009

Panda Security

Three Must-Have Capabilities for Managing Enterprise Desktop Environments
sponsored by Bit9, Inc.
WHITE PAPER: Today, more than ever, businesses rely on a dependable desktop and laptop environment to drive revenues and growth. This whitepaper will discuss the three must-have principles that represent the most fundamental components that every IT organization must employ to realize a winning desktop management strategy.
Posted: 10 Jun 2009 | Published: 10 Jun 2009

Bit9, Inc.

Not all Malware Detection is Created Equal
sponsored by Sophos, Inc.
WHITE PAPER: The internet is now the number-one conduit for infecting users with malware. Sophos detects a new infected web page every few seconds. This white paper outlines the terms you need to know and the steps you should take to stay safe.
Posted: 01 Apr 2010 | Published: 05 Nov 2009

Sophos, Inc.

April Issue of Information Security Magazine: Cloud Migration: Look before you leap
sponsored by Information Security Magazine
EZINE: This month’s Information Security Magazine Online cover story explores the need for careful planning when migrating to the cloud. The benefits of cloud computing are real; a lower IT profile, faster provisioning, and the global availability of new services hold incredible value for most organizations.
Posted: 05 Apr 2011 | Published: 05 Apr 2011

Information Security Magazine

Strategies for boosting your practice’s information immunity
sponsored by GFI LanGuard
WHITE PAPER: According to a 2011 patient privacy and data security study, 96 percent of health-care providers had at least one data breach during the previous two years. Consult this informative white paper to learn more about external threats and internal challenges of the evolving enterprise.
Posted: 31 Aug 2012 | Published: 31 Aug 2012

GFI LanGuard

Case Study: GoldenTree Asset Management
sponsored by ESET
CASE STUDY: In this case study you’ll learn how one London finance company did the following: found malware other AV products weren’t finding; secured the environment; witnessing virus protection doing what it is designed to do. Read on to learn so much more.
Posted: 22 Oct 2010 | Published: 22 Oct 2010

ESET

The New Reality of Stealth Crimeware
sponsored by McAfee.
WHITE PAPER: The new reality of crimeware consists of the stealth, creativity and patience of stuxnet, and the commercialism, wide distribution and easy-to-use toolkits of Zeus, making it even more challenging to detect and protect against. Organisations must go beyond the traditional security to ensure their intellectual property is safe.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

McAfee.

Why Traditional Anti-Malware Solutions Are No Longer Enough
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: Security used to be a straightforward matter. Email was the primary attack vector. Simply installing an anti-virus product and using caution with attachments was enough. Today's threats are rapidly evolving, stealthy, and targeted. Read this paper to find out where your current security solutions may be lacking and how to close that gap.
Posted: 17 Nov 2009 | Published: 17 Nov 2009

AVG Technologies USA, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement