Email Virus Protection Reports

Royal Holloway: Testing antivirus efficacy in Linux
sponsored by TechTarget ComputerWeekly.com
EZINE: Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

TechTarget ComputerWeekly.com

E-Book: Technical Guide on Network Security Monitoring
sponsored by AVG Technologies USA, Inc.
EBOOK: Your organization’s network is more than a collection of pipes through which traffic flows: it’s your business’ fundamental IT architecture. Your security devices keep a watchful eye on traffic and systems, and maintain the integrity of your data and systems. Check out this guide to network security monitoring from SearchMidmarketSecurity.com.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

AVG Technologies USA, Inc.

Four Principles of Effective Threat Protection: Defining the right strategy and tools to defend your business against malware
sponsored by Sophos
WHITE PAPER: Threat protection requires an updated approach now that the classic model of anti-virus plus firewall is no longer enough. Best practice calls for interlocking layers of protection that support your business processes and digital assets. Read on to learn principles you can use to strike a balance between enabling business and ensuring security.
Posted: 25 Jun 2010 | Published: 24 Jun 2010

Sophos

ZeuS: A Persistent Criminal Enterprise
sponsored by Trend Micro
WHITE PAPER: This research paper, presented by Trend Micro, examines the ZeuS botnet; a cyber-criminal tool primarily used to steal money. Access this paper now to learn how ZeuS works, who is behind this crimeware, ZeuS variants now emerging and more.
Posted: 11 May 2010 | Published: 24 Mar 2010

Trend Micro

Worry-Free Business Security Standard
sponsored by Trend Micro, Inc.
SOFTWARE DOWNLOAD: Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.
Posted: 26 Oct 2010 | Premiered: 26 Oct 2010

Trend Micro, Inc.

NETGEAR ProSecure STM150 Helps Prepress Solutions Provider Double its Sales Prospects
sponsored by NETGEAR Inc.
CASE STUDY: Agfa Graphics is a world leader in prepress solutions for the printing and publishing industries. Read this case study to learn how they maximize productivity gains from virtualization technology, without sacrificing network security with NETGEAR ProSecure STM150.
Posted: 17 Dec 2010 | Published: 17 Dec 2010

NETGEAR Inc.

TechGuide: Endpoint Security Management
sponsored by TechTarget Security
EBOOK: This expert e-guide will help you sort through your endpoint security management troubles by redefining and transitioning your strategy to fit the growing requirement for defending against malware.
Posted: 12 Sep 2013 | Published: 11 Sep 2013

TechTarget Security

How Malware Can Sneak Into Your Company Networks and How to Deal With It
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: Taking your network offline might sound like the only effective way to keep viruses and other so-called malware out of your business. But even without the internet, there are still plenty of ways for malicious code to worm its way onto your network. Read this quick white paper for an overview of the main threats and how to protect against them.
Posted: 31 Mar 2010 | Published: 31 Mar 2010

AVG Technologies USA, Inc.

Fortune 200 Firm Achieves Global Email Protection
sponsored by WatchGuard Technologies, Inc.
CASE STUDY: Eaton Corporation, a premier industrial manufacturer, is an industry leader in diversified power management and ranks in the Fortune 200.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

WatchGuard Technologies, Inc.

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by TechTarget Security
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

TechTarget Security