Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Virus Protection Software

RSS Feed   
Virus Protection Software Reports
 
Advanced cyber-security intelligence
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

TOPICS: 
ComputerWeekly.com

Understanding behavioural detection of antivirus
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

TOPICS: 
ComputerWeekly.com

How to collect Windows Event logs to detect a targeted attack
sponsored by M86 Security
EGUIDE: Targeted attacks are growing, and eventually your enterprise will be a target. In this e-guide, expert Richard Bejtlich covers how to collect Windows Event logs to detect an intrusion.
Posted: 13 Jul 2011 | Published: 13 Jul 2011

TOPICS: 
M86 Security

Eight threats your antivirus won't stop
sponsored by Sophos
WHITE PAPER: News headlines are a constant reminder that malware attacks and data leakage are on the rise. High-profile incidents that make big news might seem out of the ordinary. Yet businesses of every size face similar risks in the everyday acts of using digital technology and the internet for legitimate purposes.
Posted: 23 Dec 2011 | Published: 23 Dec 2011

TOPICS: 
Sophos

Kaspersky Anti-Virus for Lotus Notes/Domino
sponsored by Kaspersky Lab
PRODUCT LITERATURE: Kaspersky Anti-Virus integrates with the Lotus Notes/Domino server as an additional module, and scans in real-time mode all messages transmitted by the system.
Posted: 16 Sep 2004 | Published: 01 Sep 2004

TOPICS: 
Kaspersky Lab

Why Traditional Anti-Malware Solutions Are No Longer Enough
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: Security used to be a straightforward matter. Email was the primary attack vector. Simply installing an anti-virus product and using caution with attachments was enough. Today's threats are rapidly evolving, stealthy, and targeted. Read this paper to find out where your current security solutions may be lacking and how to close that gap.
Posted: 17 Nov 2009 | Published: 17 Nov 2009

TOPICS: 
AVG Technologies USA, Inc.

Information Security Magazine - March 2013
sponsored by SearchSecurity.com
EZINE: This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.
Posted: 28 Feb 2013 | Published: 01 Mar 2013

TOPICS: 
SearchSecurity.com

Cyber Attacks on the Rise: IBM 2007 Report
sponsored by IBM
WHITE PAPER: This white paper shows how the IBM Internet Security Systems™ X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.
Posted: 19 Nov 2007 | Published: 01 Aug 2007

TOPICS: 
IBM

Presentation Transcript: Why Small Businesses Should Think Outside the Box When Choosing Endpoint Security Solutions
sponsored by Sunbelt Software
PRESENTATION TRANSCRIPT: In this presentation transcript of the webinar "Why Small Businesses Should Think Outside the Box When Choosing Endpoint Security Solutions" you’ll learn why "bigger isn't necessarily better" when it comes to selecting an antivirus vendor.
Posted: 18 Aug 2009 | Published: 18 Aug 2009

TOPICS: 
Sunbelt Software

Protect Yourself From Antivirus
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS: 
Palo Alto Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement