Antispyware Software Reports

A Closer Look at Windows Vista
sponsored by National Instruments
WHITE PAPER: One of the stated goals of the Microsoft Windows Vista release is to greatly improve the overall security of the Windows operating system and curb the impact of malware. To this end, Microsoft redesigned both the least user and administrative...
Posted: 19 Feb 2008 | Published: 19 Feb 2008

National Instruments

Information Security Essential Guide: The Evolution of Threat Detection and Management
sponsored by TechTarget Security
ESSENTIAL GUIDE: This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.
Posted: 18 Jul 2013 | Published: 31 May 2013

TechTarget Security

Symantec Report on Rogue Security Software
sponsored by Symantec Corporation
WHITE PAPER: The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. Read this report to learn the specifics about security software scams.
Posted: 10 Dec 2009 | Published: 01 Oct 2009

Symantec Corporation

Total E-mail Security
sponsored by Sunbelt Software
WHITE PAPER: Malware is becoming ever more sophisticated every day. Only through effective tools that incorporate fast responses against all categories of malware will organizations be able to maintain the health of their critical business systems.
Posted: 11 Nov 2008 | Published: 11 Nov 2008

Sunbelt Software

Network Security Report: The State of Network Security in Schools
sponsored by Threat Track Security
WHITE PAPER: Access this comprehensive resource to learn how to overcome the challenges of securing school networks. Discover ways to control sources of vulnerability that are inherently difficult to control. Additionally, achieve a better understanding of the ever-changing landscape of technology and malware.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security

Case Study: School District Switches to Trend Micro™ Enterprise Security-- Camden County Schools Virtualize Gateway Security, Increase Spam and Spyware Protection
sponsored by Trend Micro, Inc.
WHITE PAPER: Read this case study to learn Camden County Schools provide students with information technology that increases learning and achievement while simultaneously driving administrative efficiencies and effectiveness.  
Posted: 27 Aug 2010 | Published: 27 Aug 2010

Trend Micro, Inc.

Case Study: ORDISMATIC Uses Panda Cloud Email Protection to Protect Its Clients from Spam
sponsored by Panda Security
CASE STUDY: Read this brief case study to learn how Panda Cloud Email Protection helped ORDISMATIC, an IT vendor, to simplify risk management, reduce operating costs, increase productivity, and achieve significant decreases in spam.
Posted: 02 Dec 2009 | Published: 20 Nov 2009

Panda Security

Drive-by Downloads--The Web Under Siege
sponsored by Kaspersky
WHITE PAPER: In this white paper, we will explore what actually happens during a drive-by attack, the lures used to perpetrate attacks, the technology behind the attacks, and the use of drive-by download attacks in personal data theft and computer takeovers.
Posted: 19 Aug 2009 | Published: 19 Aug 2009

Kaspersky

A Guide to Evaluating Email Security Solutions
sponsored by SonicWALL
WHITE PAPER: E-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.
Posted: 15 Nov 2007 | Published: 01 Jan 2005

SonicWALL

How Malware Can Sneak Into Your Company Networks and How to Deal With It
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: Taking your network offline might sound like the only effective way to keep viruses and other so-called malware out of your business. But even without the internet, there are still plenty of ways for malicious code to worm its way onto your network. Read this quick white paper for an overview of the main threats and how to protect against them.
Posted: 31 Mar 2010 | Published: 31 Mar 2010

AVG Technologies USA, Inc.