Spy Software Reports

Magic Quadrant for Mobile Data Protection
sponsored by Sophos
WHITE PAPER: This Magic Quadrant is a snapshot of the overall market that ranks vendors against each other, according to competitive criteria. Vendors in any quadrant, as well as those not ranked on the Magic Quadrant, may be appropriate for your enterprise's needs and budget.
Posted: 14 Apr 2011 | Published: 13 Apr 2011

Sophos

What to Look for in Endpoint Antimalware Tools
sponsored by TechTarget Security
EBOOK: Read this buyer's guide to uncover which types of endpoint and anti-malware tools best suit your enterprise by discovering what to look for in the strategies.
Posted: 08 Mar 2016 | Published: 07 Mar 2016

TechTarget Security

Cyber Attacks on the Rise: IBM 2007 Report
sponsored by IBM
WHITE PAPER: This white paper shows how the IBM Internet Security Systems™ X-Force® research and development team discovered, analyzed and recorded new vulnerabilities and the status of varying threats throughout the first six months of this year.
Posted: 19 Nov 2007 | Published: 01 Aug 2007

IBM

Case Study: Panda Security Enables Gloucestershire NHS to Communicate Effectively and Safely
sponsored by Panda Security
CASE STUDY: Learn how Gloucestershire NHS was able to help 1700 client computers send and receive vital information safely and efficiently by installing Panda's Managed Office Protection Antivirus solution.
Posted: 18 Sep 2009 | Published: 25 Jul 2009

Panda Security

Anonymous Proxy: A Growing Trend in Internet Abuse, and How to Defeat It
sponsored by Bloxx, Inc.
WHITE PAPER: The Internet is a marvelous tool, but it can also be a tremendous drain and a threat to our children. Tru-View Technology maximizes the positives and eliminates the negatives so that organizations can meet the challenges of an 8+ billion-page Internet.
Posted: 09 Sep 2008 | Published: 09 Sep 2008

Bloxx, Inc.

ESET: Threat Center
sponsored by ESET
PRODUCT DEMO: IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.
Posted: 02 Sep 2010 | Premiered: 02 Sep 2010

ESET

Threatsaurus: The A-Z of Computer and Data Security Threats
sponsored by Sophos UK
BOOK: Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
Posted: 25 May 2010 | Published: 01 Dec 2009

Sophos UK

IT Download: Symantec Endpoint Protection and Network Access Control 11.0.4 MR4
sponsored by Symantec Corporation
SOFTWARE DOWNLOAD: With this trial software, stop malware such as viruses, worms, Trojans, spyware, adware, bots, zero-day threats and rootkits. Prevent security outbreaks, reducing administrative overhead all while lowering total cost of ownership for endpoint security.
Posted: 13 Mar 2009 | Premiered: 13 Mar 2009

Symantec Corporation

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

Trend Micro Proven #1: Smart Protection Network powers Trend Micro Corporate endpoint solutions to top rankings
sponsored by Trend Micro, Inc.
WHITE PAPER: 3.5 new security threats emerge every second and most come from the web. That's why current methods of testing anti-malware on offline PCs and endpoints don't provide the best possible defense. Learn about an approach that tests for threats at multiple layers for comprehensive protection.
Posted: 28 Jun 2011 | Published: 28 Jun 2011

Trend Micro, Inc.