IT Management  >   Systems Operations  >   Security  >  

e-Mail Virus Protection

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Virus ProtectionReports
 
Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Improving Windows Client Performance and Security: An Impact Comparison of AC and Traditional AV
sponsored by Lumension
WHITE PAPER: This Tolly Test report compares the effectiveness of both anti-virus and application control solutions to help you decide which would work best for your enterprise. View now to uncover which approach provides greater performance across diverse workloads and protects against more threats to keep your endpoints safe and secure.
Posted: 24 Jul 2013 | Published: 03 May 2013

Lumension

How traditional firewalls fail
sponsored by Dell Software
WHITE PAPER: Did you know that your current firewall may be jeopardizing your network security? Traditional firewalls that only focus on stateful packet inspection and access control rules aren't effective in today's world. This e-book explains where traditional firewalls fall short – and what you can do about it.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

Dell Software

Information security trends
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from CompTIA, based on original research, assesses the current trends in information security.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Mail Security for Microsoft Exchange Server
sponsored by ESET
DATA SHEET: ESET Mail Security for Microsoft Exchange Server blocks all types of email-borne malware and spam. It scans your email traffic with industry-leading precision, low system footprint and high scanning speed - so slowdowns will be a thing of the past
Posted: 25 Mar 2011 | Published: 25 Mar 2011

ESET

Malware Attacks Demand a New Malware Defense Approach
sponsored by Imperva
EGUIDE: Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
Posted: 19 Jun 2013 | Published: 19 Jun 2013

Imperva

Corporate AV/EPP Comparative Analysis: Exploit Evasion Defenses
sponsored by McAfee, Inc.
ANALYST REPORT: NSS Labs conducted a report to reveal which endpoint protection platform provides the best protection against evasion techniques. View now to uncover how 11 different EPP products fared during analysis.
Posted: 02 Aug 2013 | Published: 02 Aug 2013

McAfee, Inc.

Global Threat Report January 2012: Where are the 419s of Yesteryear?
sponsored by ESET
WHITE PAPER: This January 2012 Global Threat report offers information and articles on today's threat environment including the lastest list of the top 10 threats. View now to gain key insight from security researchers and experts exploring 419s, the need for need anti-virus, anti-malware or anti-spam, 2012 trends, PUAs and more.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

ESET

2010 Endpoint Risk Assessment: Internal Vulnerabilities
sponsored by Promisec
WHITE PAPER: This study will show you the most common security issues that were found and how they were dealt with by the various organizations.
Posted: 23 May 2011 | Published: 23 May 2011

Promisec

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement