e-Mail Virus Protection Reports

2012 Endpoint Security Best Practices Survey Results
sponsored by Symantec Corporation
WHITE PAPER: This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.
Posted: 08 Apr 2013 | Published: 08 Apr 2013

Symantec Corporation

IT Administrator Saves Engineering Firm More than 200 Hour a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection
sponsored by OpenText Security Solutions
CASE STUDY: In this case study, learn how engineering and project management firm Doris, Inc. was able to combat slow scan times, complex management, and ineffective protection by investing in the right endpoint security solution.
Posted: 15 May 2013 | Published: 31 Dec 2012

OpenText Security Solutions

How to take Advantage of Security Ops that go Beyond the OS
sponsored by Intel and McAfee
WEBCAST: In this webcast, get security advice from Ed Metcalf, Director of Product and Solution Marketing at McAfee and his colleague, Deepak Kolingivadi, Senior Product Manager, and discover how to gain full value from one security system solution that will reduce costs and increase business productivity.
Posted: 21 Oct 2013 | Premiered: Oct 15, 2013

Intel and McAfee

Magic Quadrant for Mobile Data Protection
sponsored by Sophos
WHITE PAPER: This Magic Quadrant is a snapshot of the overall market that ranks vendors against each other, according to competitive criteria. Vendors in any quadrant, as well as those not ranked on the Magic Quadrant, may be appropriate for your enterprise's needs and budget.
Posted: 14 Apr 2011 | Published: 13 Apr 2011

Sophos

BYOD: Bring Your Own Device – or Bring Your Own Danger?
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success.
Posted: 26 Aug 2013 | Published: 11 Jan 2013

WatchGuard Technologies, Inc.

Vantage Point Solutions Group Cut Costs and Strengthens Client Relationships with Webroot
sponsored by OpenText Security Solutions
CASE STUDY: This brief case study shows how one IT services company deployed a standardized single endpoint security solution and saw improved efficiency and performance.
Posted: 18 Apr 2014 | Published: 28 Feb 2014

OpenText Security Solutions

About to Buy Guide: Spam/virus protection for Exchange
sponsored by TechTarget Security
EGUIDE: This expert e-guide explores the value of a comprehensive email security strategy, and compares the pros and cons of various approaches. Discover how you can gain the antispam and antivirus protection you need to keep email threats at bay and productivity high.
Posted: 05 Jun 2012 | Published: 05 Jun 2012

TechTarget Security

E-Guide: How antivirus software works: Virus detection techniques
sponsored by M86 Security
EGUIDE: Antivirus software uses several different virus detection techniques, as described in this tip by expert Lenny Zeltser.
Posted: 05 Oct 2011 | Published: 05 Oct 2011

M86 Security

MicroScope May 2014: An issue covering changes in the security market
sponsored by MicroScope
EZINE: An issue highlighting the changing security landscape and the opportunities for resellers.
Posted: 07 May 2014 | Published: 08 May 2014

MicroScope

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM