SearchSecurity.co.UK Research Library

Powered by Bitpipe.com

All Research Sponsored By:ESET

  • Global Threat Report January 2012: Where are the 419s of Yesteryear?

    This January 2012 Global Threat report offers information and articles on today's threat environment including the lastest list of the top 10 threats. View now to gain key insight from security researchers and experts exploring 419s, the need for need anti-virus, anti-malware or anti-spam, 2012 trends, PUAs and more.

  • Global Threat Report December 2011

    Stay informed about the most important cybersecurity issues facing the IT community today. Review this 2011 Global Threat report to help you protect your business in 2012 and beyond. Explore key topics including threat trends and security gains, monthly malware reports and the essential Top Ten Threats lists.

  • Global Threats Report Dec 2011

    The Global Threat Report offers a monthly overview of the most important cybersecurity issues facing the IT community today, offering informative articles, security tips, viral online resources, expert advice and opinions from ESET researchers, and the essential Top Ten Threats lists. Access now to learn how you can stay informed.

  • Ten Ways to Dodge CyberBullets: Reloaded

    In this paper, ESET research teams revisit their top ten list on what people can do to protect themselves against malicious activity, and offers key advice based on today’s changing environments, while still applying the basic principles.

  • ESET Online Scanner

    ESET Online Scanner is designed only to detect and remove threats via on-demand scan and is not a permanent proactive antivirus solution. To receive complete proactive protection, get a free custom business trial and find out why IT pros worldwide recommend ESET for server-to-endpoint security.

  • Global Threat Report - September 2011 Backup strategy for your home users

    This white paper underlines the importance of backing up your data, whether at home or within the enterprise. In addition, discover today's top ten security threats to look out for.

  • Fast and Effective Endpoint Security for Business

    This white paper demonstrates how, by combining powerful management tools, ease of use for end users, impressive performance and state-of-the-art proactive threat detection, ESET NOD32 Antivirus is the most effective way to protect your business’ valuable data assets while ensuring regulatory compliance.

  • Problematic - Unloved - Argumentative (PUA): What is a potentially unwanted app

    In this paper, discover what is a Potentially Unwanted Application (PUA) and explore the differences between threats posed by malicious types of software such as computer viruses and worms, and those which are classified as being potentially unwanted.

  • IT Decision Checklist: Antimalware

    Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. This IT Decision Checklist on Antimalware can help you sort through these challenges and offers a list of antimalware products available today.

  • Technical Guide on Malware Trends

    TechTarget’s Security Media Group presents a comprehensive guide to malware trends. Our experts help you adopt your security strategies, policies and spending to address the ever-changing and customized world of malware to keep targeted attacks, phishing scams and other malware-based attacks at bay.

  • Protecting Your Multi-Platform Network: The New Wave of Attacks

    Join us to examine some of the malware risks associated with heterogeneous computing environments and solutions to protect your valuable business assets.

  • File Security for Linux/BSD/Solaris: Antivirus Protection for your servers

    ESET File Security provides Linux, BSD and Solaris file servers with on-demand and on-access protection from known and emerging viruses, worms, trojans, spyware, rootkits and other Internet threats.

  • Mail Security for Microsoft Exchange Server

    ESET Mail Security for Microsoft Exchange Server blocks all types of email-borne malware and spam. It scans your email traffic with industry-leading precision, low system footprint and high scanning speed - so slowdowns will be a thing of the past

  • E-Guide: Why attackers exploit multiple zero-day attacks and how to respond

    The Stuxnet worm has received significant media coverage for the large number of different types of systems it has infected. Symantec Corp. published an informative technical write-up that explains Stuxnet in detail and reports that around 100,000 systems have been infected.

  • Buyer's Guide to Antimalware

    Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.

  • Excerpts from Virus Bulletin Comparative Reviews August-December 2010

    The basic requirements for a product to achieve VB100 certification status are that a product detects, both on demand and on access, in its default settings, all malware known to be ‘In the Wild’ at the time of the review, and generates no false positives when scanning a set of clean files.

  • Virus Bulletin: Comparative Reviews August-December 2010

    Read this paper to view the latest news and information about VB100 testing,  Windows Vista,  Windows 7, Windows Server 2003, Windows 7 Professional, and  so much more.

  • The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape

    In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more. 

  • Global Threat Trends: October 2010

    Read this month's Global Threat Trends to learn about the top 10 security threats in October. Discover what’s new on the cyber front and get an inside look at this year's eCity Symposium, and more!

  • Case Study: GoldenTree Asset Management

    In this case study you’ll learn how one London finance company did the following: found malware other AV products weren’t finding; secured the environment; witnessing virus protection doing what it is designed to do. Read on to learn so much more.

  • Stuxnet Under the Microscope

    This report is devoted to the analysis of the notorious Stuxnet worm (Win32/Stuxnet) that suddenly attracted the attention of virus researchers this summer. This report is primarily intended to describe targeted and semi-targeted attacks, and how they are implemented, focusing mainly on the most recent, namely Stuxnet.

  • Antivirus Testing and AMTSO Has anything changed?

    This paper looks at testing as it was, as it is, and as Anti-Malware Testing Standards Organization (AMTSO) would like it to be. Is testing really so difficult? Is it appropriate for the vendors who make the products under test to be so involved in the process of defining good practice?

  • ESET: Threat Center

    IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.

  • Global Threat Report: July 2010

    Read this paper to get a full analysis of ESET’s ThreatSense.Net®, a sophisticated malware reporting and tracking system, which shows that the highest number of detections this month with almost 12.47% of the total was scored by the Win32/Conficker class of threat.

  • Case Study: San Diego Gastroenterology Medical Associates

    Read this case to learn about one company's battle with virus protection and what they did to overcome it.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

SearchSecurity.co.UK Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.