New & Notable
Antivirus, antispyware management News
October 26, 2010
Security researchers from Trustwave's Spiderlabs research team demonstrated malware,--including a Windows credential stealer--that uses automated processes to avoid detection and dupe forensics investigators.
June 29, 2010
McAfee fully integrates its acquisition of MX Logic, rolling out a cloud-based antimalware Web filtering service aimed primarily at small- and mid-sized -businesses.
Antivirus, antispyware management Get Started
Bring yourself up to speed with our introductory content
Unified threat management (UTM) is an approach to security management that allows an administrator to monitor and manage a wide variety of security-related applications and infrastructure components through a single management console. Continue Reading
Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted. Continue Reading
IPsec (Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication. Continue Reading
Evaluate Antivirus, antispyware management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Single vendor centralized management of endpoint security suites, including policy creation and management, and compliance reporting is the primary consideration when choosing and buying an endpoint security suite Continue Reading
Midmarket organizations should prioritize endpoint security management over perimeter defenses. Continue Reading
Learn about desktop security software and policy options, and why deperimeterization may be the best approach for securing desktops. Continue Reading
Manage Antivirus, antispyware management
Learn to apply best practices and optimize your operations.
Taking the shortcut of optimizing your email antivirus scanners to improve performance will eventually compromise your organization's security. Continue Reading
Beyond firewalls, unified threat management appliances offer additional features including antimalware, content filtering and intrusion prevention. Learn which fit best in your IT infrastructure. Continue Reading
Too many organizations make the mistake of not aggressively mitigating spyware at all levels -- the desktop, server and network edge. According to network security expert Lisa Phifer, a unified threat management appliance can strengthen enterprise ... Continue Reading
Problem Solve Antivirus, antispyware management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
You don't have to rely on Adobe's Acrobat Reader as your only PDF viewer; Google Chrome provides a secure PDF viewer that cuts down on your chances of falling victim to a PDF exploit. Continue Reading
Social engineering attacks trick users into installing rogue security software. Users need to be educated to avoid falling prey, and IT needs the tools to remove the fake security software. Continue Reading
When attackers can place malicious sites high in Google rankings, you may be at risk. Learn how to defend against SEO poisoning. Continue Reading