Anti Virus Protection Reports

Essential Guide to Threat Management
sponsored by TechTarget Security
EGUIDE: Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

TechTarget Security

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE

Defending Systems on a Wide-open Network with Symantec Endpoint Protection
sponsored by Symantec Corporation
CASE STUDY: Advertising agency, Direct Agents, needed protection at each individual computer because their employees routinely accessed websites and opened emails that were potentially harmful. In this case study, learn how Symantec Endpoint Protection was able to meet their needs, providing simplified management and protection while saving on costs.
Posted: 02 Jul 2012 | Published: 02 Jul 2012

Symantec Corporation

Comparative Analysis on Endpoint Security Solutions
sponsored by Trend Micro
WHITE PAPER: As the threat landscape continues to evolve, it is essential to have the latest security software to reduce the risk of potential attacks. View this paper for a comparative analysis of top Endpoint security technologies. Explore the key features and performance measures of each solution.
Posted: 15 May 2011 | Published: 11 May 2011

Trend Micro

Fortune 200 Firm Achieves Global Email Protection
sponsored by WatchGuard Technologies, Inc.
CASE STUDY: Eaton Corporation, a premier industrial manufacturer, is an industry leader in diversified power management and ranks in the Fortune 200.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

WatchGuard Technologies, Inc.

Antivirus: The Hippest New Apple Accessory
sponsored by Threat Track Security
WHITE PAPER: For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security

E Is for Endpoint: Six Security Strategies for Highly Effective IT Professionals
sponsored by Lumension
WHITE PAPER: Security professionals know that effective endpoint protection calls for a layered, defense-in-depth approach. But endpoint security now requires a new way of thinking that goes beyond just battling threats to actually enable operational improvement. Read this whitepaper to learn the six steps you need to think different about endpoint security.
Posted: 23 Jan 2012 | Published: 23 Jan 2012

Lumension

Solving Four Primary Security Challenges of Microsoft SharePoint
sponsored by Sophos UK
WHITE PAPER: This white paper examines SharePoint's benefits and risks and recommends best practices for protecting an organisation's digital assets.
Posted: 25 May 2010 | Published: 01 Nov 2009

Sophos UK

Antivirus Evaluation Guide
sponsored by Threat Track Security
WHITE PAPER: In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.
Posted: 13 Sep 2013 | Published: 31 Dec 2012

Threat Track Security

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.