New & Notable
Antivirus, antispyware management News
October 26, 2010
Security researchers from Trustwave's Spiderlabs research team demonstrated malware,--including a Windows credential stealer--that uses automated processes to avoid detection and dupe forensics investigators.
June 29, 2010
McAfee fully integrates its acquisition of MX Logic, rolling out a cloud-based antimalware Web filtering service aimed primarily at small- and mid-sized -businesses.
Antivirus, antispyware management Get Started
Bring yourself up to speed with our introductory content
Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or critical projects in order to help organizations avoid or mitigate those risks. Continue Reading
IPsec, also known as the Internet Protocol Security or IP Security protocol, defines the architecture for security services for IP network traffic. Continue Reading
An email virus consists of malicious code that is distributed in email messages, and it can be activated when a user clicks on a link in an email message, opens an email attachment or interacts in some other way with the infected email message. Continue Reading
Evaluate Antivirus, antispyware management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Single vendor centralized management of endpoint security suites, including policy creation and management, and compliance reporting is the primary consideration when choosing and buying an endpoint security suite Continue Reading
Midmarket organizations should prioritize endpoint security management over perimeter defenses. Continue Reading
Learn the pros and cons of outsourcing antivirus services in this tip by Ed Skoudis. Continue Reading
Manage Antivirus, antispyware management
Learn to apply best practices and optimize your operations.
Taking the shortcut of optimizing your email antivirus scanners to improve performance will eventually compromise your organization's security. Continue Reading
Beyond firewalls, unified threat management appliances offer additional features including antimalware, content filtering and intrusion prevention. Learn which fit best in your IT infrastructure. Continue Reading
Learn about desktop security software and policy options, and why deperimeterization may be the best approach for securing desktops. Continue Reading
Problem Solve Antivirus, antispyware management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
You don't have to rely on Adobe's Acrobat Reader as your only PDF viewer; Google Chrome provides a secure PDF viewer that cuts down on your chances of falling victim to a PDF exploit. Continue Reading
Social engineering attacks trick users into installing rogue security software. Users need to be educated to avoid falling prey, and IT needs the tools to remove the fake security software. Continue Reading
When attackers can place malicious sites high in Google rankings, you may be at risk. Learn how to defend against SEO poisoning. Continue Reading