Antispyware Software Reports

SymEd Solutions from Symantec: Endpoint Management and Mobility
sponsored by Insight Public Sector and Symantec
WHITE PAPER: Uncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.
Posted: 29 Apr 2013 | Published: 31 Dec 2012

Insight Public Sector and Symantec

Endpoint Protection Platforms for Enterprises
sponsored by Symantec Corporation
WHITE PAPER: This guide explores a unique enterprise endpoint protection platform that encompasses a multitude of security tools.
Posted: 14 Feb 2014 | Published: 08 Jan 2014

Symantec Corporation

Antivirus: The Hippest New Apple Accessory
sponsored by Threat Track Security
WHITE PAPER: For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security

Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER: Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013

Symantec Corporation

Guide: Desktop Authority
sponsored by ScriptLogic Corporation
WHITE PAPER: Desktop Authority comprehensively manages the Windows desktop throughout the desktop lifecycle, reducing the total cost of desktop and application ownership.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

Presentation Transcript: Rogue Security Software - An In-Depth Look And The Challenges For Business
sponsored by Sunbelt Software
PRESENTATION TRANSCRIPT: In this presentation transcript, Chris Boyd, GFI Software’s Senior Threat Researcher, provides an in-depth look into Rogue antivirus. He details the damage it can cause and how they have been tailored to look like legitimate products. You will also learn what businesses can do to better protect their network and end users from these threats.
Posted: 03 Dec 2010 | Published: 03 Dec 2010

Sunbelt Software

Case Study: ORDISMATIC Uses Panda Cloud Email Protection to Protect Its Clients from Spam
sponsored by Panda Security
CASE STUDY: Read this brief case study to learn how Panda Cloud Email Protection helped ORDISMATIC, an IT vendor, to simplify risk management, reduce operating costs, increase productivity, and achieve significant decreases in spam.
Posted: 02 Dec 2009 | Published: 20 Nov 2009

Panda Security

Essential Enterprise Mobile Security Controls
sponsored by TechTarget Security
EGUIDE: How will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

TechTarget Security

AVG Anti-Virus Network Edition Delivers Rock Solid, Easy to Manage Protection for US Construction Firm
sponsored by AVG Technologies USA, Inc.
CASE STUDY: R&O Construction was having difficulty managing their mostly mobile network. With so many laptops and mobile devices in use remotely, the company was seeing an increase in security threats infecting the IT infrastructure. Their existing solution was overtaxing both system and human resources. Read on to learn how they overcame these challenges.
Posted: 31 Mar 2010 | Published: 31 Mar 2010

AVG Technologies USA, Inc.

IT Decision Checklist: Antimalware
sponsored by ESET
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.
Posted: 14 Jun 2010 | Published: 14 Jun 2010

ESET