New & Notable
Antivirus, antispyware management News
October 26, 2010
Security researchers from Trustwave's Spiderlabs research team demonstrated malware,--including a Windows credential stealer--that uses automated processes to avoid detection and dupe forensics investigators.
June 29, 2010
McAfee fully integrates its acquisition of MX Logic, rolling out a cloud-based antimalware Web filtering service aimed primarily at small- and mid-sized -businesses.
Antivirus, antispyware management Get Started
Bring yourself up to speed with our introductory content
A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services -- each associated with a "well-known" port number -- the computer provides. Continue Reading
Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal devices and await a response. Continue Reading
Malware, or malicious software, is any program or file that is harmful to a computer user. Continue Reading
Evaluate Antivirus, antispyware management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Single vendor centralized management of endpoint security suites, including policy creation and management, and compliance reporting is the primary consideration when choosing and buying an endpoint security suite Continue Reading
Midmarket organizations should prioritize endpoint security management over perimeter defenses. Continue Reading
Learn about desktop security software and policy options, and why deperimeterization may be the best approach for securing desktops. Continue Reading
Manage Antivirus, antispyware management
Learn to apply best practices and optimize your operations.
Taking the shortcut of optimizing your email antivirus scanners to improve performance will eventually compromise your organization's security. Continue Reading
Beyond firewalls, unified threat management appliances offer additional features including antimalware, content filtering and intrusion prevention. Learn which fit best in your IT infrastructure. Continue Reading
Too many organizations make the mistake of not aggressively mitigating spyware at all levels -- the desktop, server and network edge. According to network security expert Lisa Phifer, a unified threat management appliance can strengthen enterprise ... Continue Reading
Problem Solve Antivirus, antispyware management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The web is moving to HTTPS. Find out how to encrypt websites using HTTPS to stop eavesdroppers from snooping around sensitive and restricted web data. Continue Reading
You don't have to rely on Adobe's Acrobat Reader as your only PDF viewer; Google Chrome provides a secure PDF viewer that cuts down on your chances of falling victim to a PDF exploit. Continue Reading
Social engineering attacks trick users into installing rogue security software. Users need to be educated to avoid falling prey, and IT needs the tools to remove the fake security software. Continue Reading