Category Archives: Anti-Virus

Your Complete Guide to Windows Customization

By downloading this free guide, you agree to receive regular updates on the latest cool apps, product reviews, and giveaways from MakeUseOf. You can create a Windows desktop environment that not only accommodates your needs, but also looks stunningly beautiful.  If you’re anything like me, when you start to use […]

Read More

Take Action: Best Practices to Protect Against Targeted Malware

Download these best practices to prevent targeted and persistent threats. Only 12% of targeted malware was detected by traditional anti-virus solutions in 2011, based on investigations conducted by Trustwave SpiderLabs.Targeted attacks are highly successful because they focus on specific organizations and are crafted to elude traditional point product security controls, […]

Read More

A Multi-Level Approach to Addressing Targeted Attacks

88% of targeted malware is NOT detected by anti-virus according to research by Trustwave. Targeted malware is tailor-designed to take advantage of an organization’s specific device(s), data networks or a specific employee. Taking a multi-level approach, using many solutions, businesses can enable wider coverage for all types of targeted malware, […]

Read More

Using Defense-in-Depth to Combat Endpoint Malware: A Technical Paper

The signature-based model of classic antivirus (AV) and the teams and infrastructure behind it are increasingly stretched to keep up with the pace and sophistication of today’s financially motivated malware developers. This technical paper, written by Randy Franklin Smith, takes an in-depth look at Lumension® Intelligent Whitelisting™, which takes the […]

Read More

Finding an Effective Antivirus Solution

Having unprotected endpoints vulnerable to viruses, worms and other forms of malware just isn’t an option. Many antivirus solutions create nearly as many problems as they solve. A security solution that negatively impacts productivity and tempts users to find ways around it is not acceptable either. A solution must detect […]

Read More

Learn How To Save Money by Switching Antivirus Solutions

IT Professionals, learn what to ask when switching Antivirus Solutions and how this can save you money. If you are dissatisfied with your current Antivirus Solution, and are thinking about switching, now is the time! Vendors are more willing than ever to earn your business. Price concessions, upgraded suites, automated […]

Read More

PC Security Handbook – 2nd Edition

Defensive Computing Techniques to Help You Avoid Malware and Data Loss. This handbook is designed to help you find ways to protect your Windows XP/Vista/7 PC and ensure your data is safe. The author gets countless emails from site visitors who ask about the best anti-virus software, firewall program, backup […]

Read More

CISO Guide to Next Generation Threats

Learn how to combat advanced malware, zero-day and targeted APT attacks. To regain the upper hand against next-generation attacks, enterprises must turn to true next-generation protection: signature-less, proactive and real time. Through constant testing of any suspicious code and blocking of communications with malicious hosts, next-generation protections combat advanced malware, […]

Read More

VMware View and NetApp Storage: Best Practices for Design, Architecture, Deployment, and Management

This document provides NetApp best practices for architecting, sizing, and deploying a VMware® VDI environment on NetApp® storage. The NetApp solution enables companies to optimize their virtual infrastructures by providing advanced storage and data management capabilities. NetApp provides industry-leading storage solutions that simplify Virtual Machine (VM) provisioning; enable mass VM […]

Read More

Top Five Strategies for Combating Modern Threats: Is Anti-Virus Dead?

Learn the five key strategies to reduce the attack surface and protect the network, systems and data from malware. Today’s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce. Organizations need innovative approaches to protect the web, email servers and […]

Read More

ContentProtect Security Appliance: Web Content Filtering and Bandwidth Management

See a Secure Web Gateway that actually gives you back control of your network. You don’t have to choose between high performance and value, thanks to the ContentProtect Security Appliance. ContentProtect has combined the function of multiple devices—content filtering, bandwidth & application shaping, IM management, and anti-virus/anti-spyware—into one affordable plug-and-play […]

Read More

Leading Airline Soars with IronPort’s Email Security Appliances – JetBlue Case Study

IronPort provided JetBlue Airways with a multi-vendor, multi-layer email security solution that incorporates the industry’s best solutions from the market’s leading vendors of anti-spam, anti-virus, encryption, digital rights management and archiving technologies. JetBlue found its previous security system increasingly inadequate in its ability to block spam and viruses without creating […]

Read More

Cisco’s IronPort Spam and Virus Blocker

The IronPort Spam & Virus Blocker scans email traffic coming into your organization and prevents spam and viruses from ever reaching your inbox. Through the 2007 acquisition of IronPort Systems, Cisco is extending its Self-Defending Network strategy to include Email Security. The IronPort “Blocker” is the only SMB security appliance […]

Read More

Eliminating Your SSL Blind Spot: Managing and Securing HTTPS Traffic

Learn how HTTPS filtering extends Internet usage policies to HTTPS traffic and closes a major network security hole. Web encryption is indispensable for today’s businesses, but organizations with an open port 443 (HTTPS tunnel) on their firewall are left with a major security hole wide open in their network. Traditional […]

Read More

Enterprise Security for Financial Services

As commerce moves online to realize cost-savings and efficiency gains, financial services become a target for attack. This paper discusses challenges your company is faced with due to federal regulations and how to protect customer data from theft. Signature-based anti-virus and anti-spyware systems on your host do not provide sufficient […]

Read More