Computer Virus Protection Reports

E Is for Endpoint: Six Security Strategies for Highly Effective IT Professionals
sponsored by Lumension
WHITE PAPER: Security professionals know that effective endpoint protection calls for a layered, defense-in-depth approach. But endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enable operational improvement. Read this whitepaper to learn the six steps you need to think different about endpoint security.
Posted: 23 Jan 2012 | Published: 23 Jan 2012

Lumension

E-Guide: How antivirus software works: Virus detection techniques
sponsored by M86 Security
EGUIDE: Antivirus software uses several different virus detection techniques, as described in this tip by expert Lenny Zeltser.
Posted: 05 Oct 2011 | Published: 05 Oct 2011

M86 Security

Buyer's Guide to Antimalware
sponsored by TechTarget Security
EGUIDE: Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

TechTarget Security

E-Book: Technical Guide on Combatting Emerging Web Threats
sponsored by TechTarget Security
EBOOK: Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.
Posted: 09 Jun 2010 | Published: 09 Jun 2010

TechTarget Security

2012 Endpoint Security Best Practices Survey Results
sponsored by Symantec Corporation
WHITE PAPER: This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.
Posted: 08 Apr 2013 | Published: 08 Apr 2013

Symantec Corporation

Bit9 Parity for Servers: International Communications Company Locks Down Domain controllers
sponsored by Bit9, Inc.
CASE STUDY: Domain controllers have become an increasingly popular target for malicious hackers for its access to an organization’s sensitive and intellectual property. This case study uncovers how one international communications firm was able to protect 225 of its domain controllers using Bit9 Parity for Servers and the key benefits they gained.
Posted: 23 May 2012 | Published: 23 May 2012

Bit9, Inc.

The Evolution of Threat Detection and Management
sponsored by TechTarget Security
EGUIDE: This e-guide from SearchSecurity.com explores the [evolution of threat detection and management] and offers advice on how to tackle potentially disastrous APTs, detailing multiple mitigation methods, from SIEMs and big data to sandboxing and whitelisting.
Posted: 19 Jun 2013 | Published: 19 Jun 2013

TechTarget Security

Worry-Free Business Security Standard
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.
Posted: 26 Oct 2010 | Premiered: 26 Oct 2010

Trend Micro, Inc.

Endpoint Security Management: Beyond Antivirus
sponsored by TechTarget Security
EBOOK: Access this e-book for expert tips from security experts on endpoint security that moves beyond outdated signature-based tools.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

TechTarget Security

FireEye 1H 2011 Advanced Threat Report
sponsored by FireEye
ANALYST REPORT: This FireEye Advanced Threat report offers a global view into the cyber attacks that routinely bypass traditional defenses, using the threat data shared by thousands of FireEye Malware Protection Systems (MPS) deployments. View now to explore key findings in this analysis that uncover the real security issues enterprises face today.
Posted: 14 Nov 2011 | Published: 14 Nov 2011

FireEye