ESSENTIAL GUIDE:
This article in our Royal Holloway Security Series analyses the effectiveness and behavior of 32-bit and 64-bit antivirus software in Windows 7.
WHITE PAPER:
This Osterman Research white paper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks.
TRIAL SOFTWARE:
Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.
TRIAL SOFTWARE:
Use this tool to scan up to 200 computers on your network to discover threats that your existing security software might have missed. Scan for viruses, spyware, adware, rootkits, unwanted devices and applications, and suspicious files. You'll receive a comprehensive report of the results and recommendations for guarding against the threats found.
SOFTWARE DOWNLOAD:
Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.
EGUIDE:
In the first of SearchSecurity.com's three-part guide on selecting antimalware products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of antimalware solutions.
VIDEO:
Protect your virtualized environment by learning what Deep Security 7.5 can do for you. Watch this video to learn so much more about Deep Security 7.5.
TRIAL SOFTWARE:
Forefront Security for Exchange helps protect your email infrastructure from infection and downtime through an approach that emphasizes layered defenses, optimization of Exchange Server performance and availability, and simplified management control.
EZINE:
This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.
WHITE PAPER:
This short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.