Kernel Root Kits Reports

Worry-Free Business Security Standard
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.
Posted: 26 Oct 2010 | Premiered: 26 Oct 2010

Trend Micro, Inc.

Sophos Computer Security Scan
sponsored by Sophos
TRIAL SOFTWARE: Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed.  Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and  recommendations for guarding against the threats found.
Posted: 07 Apr 2010 | Premiered: 07 Apr 2010

Sophos

Sophos Virus Removal Tool: Free virus detection and removal
sponsored by Sophos
TRIAL SOFTWARE: Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.
Posted: 09 May 2013 | Premiered: 09 May 2013

Sophos

Kaspersky Internet Security 7.0
sponsored by Kaspersky
TRIAL SOFTWARE: Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
Posted: 16 Nov 2007 | Premiered: 01 Nov 2007

Kaspersky

Computer Weekly – 21 May 2019: Managing software updates in Windows 10
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how technology is fighting poverty by increasing financial inclusion. We examine how best to manage the challenges of Microsoft's new plan for ongoing Windows 10 updates. And we find out how data innovation at Lloyd's of London is supporting a wider digital modernisation. Read the issue now.
Posted: 19 May 2019 | Published: 21 May 2019

TechTarget ComputerWeekly.com

Computer Weekly – 18 June 2019: Applying AI to road safety
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we visit a Tokyo project where artificial intelligence is helping to improve road safety by detecting potential subsidence. As bug bounty programmes become popular, we look at what's involved and the pitfalls to beware. And we discuss digital development in healthcare with NHS England. Read the issue now.
Posted: 08 Feb 2021 | Published: 18 Jun 2019

TechTarget ComputerWeekly.com

Computer Weekly - 7 April 2020: Adapting IT to the new normal
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.
Posted: 08 Feb 2021 | Published: 07 Apr 2020

TechTarget ComputerWeekly.com

The future of storage
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, we examine emerging technologies in storage such as helium disks and DNA. Ransomware is becoming more sophisticated and the attackers more tactical. And as the EU's top court challenges the UK over surveillance, we ask what this means for data privacy after Brexit. Read the issue now.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

TechTarget ComputerWeekly.com

SMB Cybersecurity: The Need for Better Protection
sponsored by Kaspersky
EGUIDE: Small and medium-sized businesses (SMBs) are failing to keep their remote working employees adequately protected against the vast range of cyber threats they face, according to a study by Kaspersky. Access this e-guide to learn why many SMBs are turning to managed detection and response today.
Posted: 07 Jul 2020 | Published: 01 Jul 2020

Kaspersky

Why EDR Technologies are Essential for Endpoint Protection
sponsored by TechTarget Security
EBOOK: While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

TechTarget Security