• How mobile antivirus software works and how to know if you need it

    Whether you require users to have mobile antivirus software on their devices depends on how much control you have and which devices workers use.

    EBeehler255 pointsBadges:
  • Application-layer security and the virus fight

    Application-layer security and the virus fight

    MMimoso3,355 pointsBadges:
  • ‘Poweliks’ malware variant employs new antivirus evasion techniques

    The file-less "Poweliks" malware incorporates a unique combination of antivirus evasion techniques involving the Windows registry to remain undetected on victims' machines.

    Brandan1,115 pointsBadges:
  • antivirus software

    Antivirus (or "anti-virus") software is a class of program that searches your hard drive and floppy disks for any known or potential viruses.

    ITKE357,100 pointsBadges:
  • Which antivirus products and strategies do you use to defend your VDI deployment?

    ITKE357,100 pointsBadges:
  • Do I need antivirus for VDI deployments?

    Virtual desktop environments aren't immune to viruses and malware, so it's important to have an antivirus tool and strategy in place before your deployment gets infected.

    ITKE357,100 pointsBadges:
  • PCI compliance requirement 5: Antivirus

    Diana Kelley and Ed Moyle of Security Curve review PCI compliance requirement 5: "Use and regularly update antivirus software."

    ITKE357,100 pointsBadges:
  • Don’t let antivirus software affect hypervisor performance

    Antivirus software has good intentions of protecting your environment, but sometimes can cause a hiccup in hypervisor performance.

    SteveBige014,115 pointsBadges:
  • ThreatTrack Security recruiting partners for its channel program

    ThreatTrack Security, maker of Vipre antivirus software, is recruiting partners that can handle enterprise installations of more than 2,000 endpoints.

    Lynn Haber2,250 pointsBadges:
  • Should you move your antivirus protection to the cloud? Page 3

    Do cloud-based antivirus products protect your systems as well -- or better than -- traditional software? Find out in this comparative review.

    ITKE357,100 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following