Malware Attacks Demand a New Malware Defense Approach
sponsored by TechTarget Security
EGUIDE:
Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
Posted: 19 Jun 2013 | Published: 19 Jun 2013
|
|
|
The Evolution of Threat Detection and Management
sponsored by TechTarget Security
EGUIDE:
This e-guide from SearchSecurity.com explores the [evolution of threat detection and management] and offers advice on how to tackle potentially disastrous APTs, detailing multiple mitigation methods, from SIEMs and big data to sandboxing and whitelisting.
Posted: 19 Jun 2013 | Published: 19 Jun 2013
|
|
|
After Antimalware: Moving Toward Endpoint Antivirus Alternatives
sponsored by TechTarget Security
EGUIDE:
This E-Guide from SearchSecurity.com outlines why - although endpoint antimalware has become ineffective - organizations today cannot live without it. In addition, learn about alternative methods available to protect your network and endpoints.
Posted: 06 May 2013 | Published: 06 May 2013
|
|
|
E-Guide: New Malware Threats Require New Antimalware Protection Strategy
sponsored by TechTarget Security
EGUIDE:
This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
Posted: 05 Dec 2012 | Published: 05 Dec 2012
|
|
|
Endpoint Protection Best Practices Manual: Combating issues, problems
sponsored by TechTarget Security
EGUIDE:
Consult this expert E-Guide for an overview of the evolved threats that are putting your endpoints at risk. Discover the must-see strategies for ensuring endpoint defense by clicking through to read more today.
Posted: 20 Nov 2012 | Published: 20 Nov 2012
|
|
|
About to Buy Guide: Spam/virus protection for Exchange
sponsored by TechTarget Security
EGUIDE:
This expert e-guide explores the value of a comprehensive email security strategy, and compares the pros and cons of various approaches. Discover how you can gain the antispam and antivirus protection you need to keep email threats at bay and productivity high.
Posted: 05 Jun 2012 | Published: 05 Jun 2012
|
|
|
Threat Management: Devising a new strategy to tackle today's cyberattacks
sponsored by TechTarget Security
ESSENTIAL GUIDE:
This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
Posted: 31 May 2012 | Published: 31 May 2012
|
|
|
Enterprise antimalware excess? Managing antimalware security products
sponsored by TechTarget Security
EGUIDE:
Antimalware products implemented on your networks can pile up overtime. And while layered security is traditionally the best way to mitigate risk, this accumulation can lead to a confusing, costly and inefficient mess. Access this guide for expert tips on how to manage antimalware products and determine how much is enough.
Posted: 27 Apr 2012 | Published: 27 Apr 2012
|
|
|
Antimalware IT Checklist: Decision Time Part 3
sponsored by TechTarget Security
EGUIDE:
This is the third piece in SearchSecurity.com's three-part guide on antimalware products. This expert asset, written by security researcher Mike Rothman, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.
Posted: 11 Apr 2012 | Published: 11 Apr 2012
|
|
|
Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
sponsored by Imperva
EGUIDE:
In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
Posted: 17 Jun 2013 | Published: 17 Jun 2013
|
|
|
Managing Web Security in an Increasing Challenging Threat Landscape
sponsored by TechTarget Security
WHITE PAPER:
This resource offers guidance to help your organization manage web security in an increasingly dangerous threat landscape. Learn how cybercriminals are targeting web-based vulnerabilities and see what you can do to stay safe by reading on now.
Posted: 31 May 2013 | Published: 31 May 2013
|
|
|
When Malware Goes Mobile: Causes, Outcomes and Cures
sponsored by Sophos
WHITE PAPER:
This whtie paper will review a step-by-step approach you can take in order to strengthen your abaility to ward of malware attacks and keep mobile data secure. Read on to learn about platform specific policies, effective prevention strategies, and more.
Posted: 23 May 2013 | Published: 17 May 2013
|
|
|
IT Administrator Saves Engineering Firm More than 200 Hour a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection
sponsored by OpenText Security Solutions
CASE STUDY:
In this case study, learn how engineering and project management firm Doris, Inc. was able to combat slow scan times, complex management, and ineffective protection by investing in the right endpoint security solution.
Posted: 15 May 2013 | Published: 31 Dec 2012
|
|
|
Anittel Simplifies Managed Antivirus Service Case Study
sponsored by OpenText Security Solutions
CASE STUDY:
This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.
Posted: 14 May 2013 | Published: 14 May 2013
|
|
|
Responding to—and recovering from—sophisticated security attacks
sponsored by IBM
WHITE PAPER:
In this resource, find four things you can do now to keep your organization safe. Learn what you need to know to effectively respond to and recover from sophisticated security attacks by reading on now.
Posted: 14 May 2013 | Published: 28 Feb 2013
|
|
|
Sophos Virus Removal Tool: Free virus detection and removal
sponsored by Sophos
TRIAL SOFTWARE:
Download your complimentary copy of Sophos Virus Removal Tool, a free antivirus solution that will identify and remove viruses from your computers quickly and easily.
Posted: 09 May 2013 | Premiered: 09 May 2013
|
|
|
Threat Detection (Antivirus Intrusion Prevention)
sponsored by TechTarget Security
EBOOK:
Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
Posted: 03 May 2013 | Published: 03 May 2013
|
|
|
Online Enemy #1: Blackhole Exploit Kit
sponsored by Threat Track Security
WHITE PAPER:
This short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.
Posted: 29 Apr 2013 | Published: 29 Apr 2013
|
|
|
Antivirus: The Hippest New Apple Accessory
sponsored by Threat Track Security
WHITE PAPER:
For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
Posted: 26 Apr 2013 | Published: 26 Apr 2013
|
|
|
2012 Endpoint Security Best Practices Survey Results
sponsored by Symantec Corporation
WHITE PAPER:
This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.
Posted: 08 Apr 2013 | Published: 08 Apr 2013
|
|
|
The Deloitte Consumer Review: A more secure customer
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.
Posted: 12 Mar 2013 | Published: 12 Mar 2013
|
|
|
Information Security Magazine - March 2013
sponsored by TechTarget Security
EZINE:
This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.
Posted: 28 Feb 2013 | Published: 01 Mar 2013
|
|
|
Remote Vendor Access: Not All Access Should Be Treated Equally
sponsored by Dell Software
WHITE PAPER:
This white paper explains why Remote Vendor Access (RVA) should not be treated the same as traditional remote access for employees. Explore how a new set of remote access requirements can ensure that your enterprise remains in step with both compliance regulations and security expectations.
Posted: 10 Sep 2012 | Published: 10 Sep 2012
|
|
|
Defending Systems on a Wide-open Network with Symantec Endpoint Protection
sponsored by Symantec Corporation
CASE STUDY:
Advertising agency, Direct Agents, needed protection at each individual computer because their employees routinely accessed websites and opened emails that were potentially harmful. In this case study, learn how Symantec Endpoint Protection was able to meet their needs, providing simplified management and protection while saving on costs.
Posted: 02 Jul 2012 | Published: 02 Jul 2012
|
|
|
Bit9 Parity for Servers: International Communications Company Locks Down Domain controllers
sponsored by Bit9, Inc.
CASE STUDY:
Domain controllers have become an increasingly popular target for malicious hackers for its access to an organization’s sensitive and intellectual property. This case study uncovers how one international communications firm was able to protect 225 of its domain controllers using Bit9 Parity for Servers and the key benefits they gained.
Posted: 23 May 2012 | Published: 23 May 2012
|
|