IT Management  >   Systems Operations  >   Security  >  

e-Mail Virus Protection

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Virus ProtectionReports
 
Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

About to Buy Guide: Spam/virus protection for Exchange
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide explores the value of a comprehensive email security strategy, and compares the pros and cons of various approaches. Discover how you can gain the antispam and antivirus protection you need to keep email threats at bay and productivity high.
Posted: 05 Jun 2012 | Published: 05 Jun 2012

SearchSecurity.com

Antimalware IT Checklist: Decision Time Part 3
sponsored by SearchSecurity.com
EGUIDE: This is the third piece in SearchSecurity.com's three-part guide on antimalware products. This expert asset, written by security researcher Mike Rothman, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

SearchSecurity.com

Corporate AV/EPP Comparative Analysis: Exploit Evasion Defenses
sponsored by McAfee, Inc.
ANALYST REPORT: NSS Labs conducted a report to reveal which endpoint protection platform provides the best protection against evasion techniques. View now to uncover how 11 different EPP products fared during analysis.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

McAfee, Inc.

Antivirus: The Hippest New Apple Accessory
sponsored by Threat Track Security
WHITE PAPER: For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security

E-Guide: How antivirus software works: Virus detection techniques
sponsored by M86 Security
EGUIDE: Antivirus software uses several different virus detection techniques, as described in this tip by expert Lenny Zeltser.
Posted: 05 Oct 2011 | Published: 05 Oct 2011

M86 Security

IT Administrator Saves Engineering Firm More than 200 Hour a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection
sponsored by Webroot
CASE STUDY: In this case study, learn how engineering and project management firm Doris, Inc. was able to combat slow scan times, complex management, and ineffective protection by investing in the right endpoint security solution.
Posted: 15 May 2013 | Published: 31 Dec 2012

Webroot

The New Reality of Stealth Crimeware
sponsored by McAfee.
WHITE PAPER: The new reality of crimeware consists of the stealth, creativity and patience of stuxnet, and the commercialism, wide distribution and easy-to-use toolkits of Zeus, making it even more challenging to detect and protect against. Organisations must go beyond the traditional security to ensure their intellectual property is safe.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

McAfee.

Anittel Simplifies Managed Antivirus Service Case Study
sponsored by Webroot
CASE STUDY: This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.
Posted: 14 May 2013 | Published: 14 May 2013

Webroot

Treehouse in the Glen: Green Toy Store Grows with Symantec Endpoint Protection
sponsored by Symantec Corporation
CASE STUDY: The owner of Treehouse in the Glen had found himself spread too thin trying to manage his toy business and the mix of security products they had implemented. In this case study, uncover how he was able to reduce the time spent on managing information security, defend against virus outbreaks and enable faster system performance.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement