Antivirus+management

Showing results 1 to 20 of 28

Free File Unlocker

Free File Unlocker is an essential free utility to delete currently Used, locked, undeletable, busy files. Works with all 32bit and...

July 24, 2013 by 4dots Software

MokaFive virtual desktops to integrate AVG protection

Antivirus vendor AVG has announced that it has entered into a partnership with MokaFive to provide protection for the company's virtual desktop products.MokaFive, which supplies virtual desktop management software (video) for consumers and enterprise customers, will begin integrating AVG's antivirus tools directly in the management suite immediately.

August 25, 2010 by

Another view: SOA is like a mosquito, spreading viral data

Just as the Internet has shown itself to be a speed-of-light carrier of rumors, gossip, and misinformation, so can service oriented architecture within an organization.I just came across new book titled "Viral Data in SOA: An Enterprise Pandemic," written by Neal Fishman, program director for information forensics within IBM's Information Management group, which highlights the risks that emerge as more and more applications are interconnected across and between enterprises.

August 17, 2009 by

Virtual labs and education

Yesterday, I asked for people to share their thoughts via a guest blog on virtualization in Ed Tech.   Guest blogger Erik Josowitz provided us with the following (thanks, Erik).  Feel free to talk back or submit your own guest blog with some specific experiences or implementation details. Virtualization is great tool but, like any Swiss-Army knife, success with it depends on the task at hand. One of the places that people get into trouble with virtualization is when they try to use out-of-the-box virtual infrastructure with non-technical audiences. Virtualization is a great solution but often is not a complete solution.In education we've frequently seen challenges that look like appropriate places to implement a virtualization solution, only to find that the end-result is not fully usable by the intended audience. One example is providing hands-on lab environments to support application training. Success in the workforce today depends on high-level application skills and there is no better way for students to attain those skills than through hands-on use of the software applications. Many educational institutions provide computer lab environments to help support their student population and provide access to necessary software applications. Many of these lab environments have become the source of IT management problems as they become virus-ridden, get subverted as distribution sites for pirated software or music, or just plain have the normal IT management issues associated with a shared resource in a public environment. For many institutions their student population brings with them their own PCs which solves one problem but creates another. The lab issues diminish but the problems of providing secure access to software (and software licenses) often takes its place.The answer, we've found, is virtual lab management - using virtualization to deliver secure computing environments as a shared resource. Virtual labs allow administrators to serve up a clean and unchangeable environment for each student - in the lab or on their own PC - on-demand. This makes it easy to provide access to applications that students either can't afford individually or that their home PCs cannot support. It makes it simple to track and monitor lab usage and to control the use of resources so that systems are not subverted into file servers. Virtual lab management sits on top of virtualization (from Microsoft or VMware) and tells it what to deliver and to who. It makes it easy for non-technical users to select the types of applications they need from a menu and to gain access to those environments without needing to understand virtualization, networking, hosts systems or anything about how it gets delivered. Best of all, virtual labs make it easy to manage capacity. By scheduling time in the lab environment the shared resource is managed for maximum utilization. If more capacity is needed it is simple to add additional resources to the system. The end-users simply see an increase in availability.Virtualization may not be a panacea for educational institutions, but for a subset of problems, a centralized virtual lab may enable technology administrators to focus their time and attention on enabling learning rather than administering systems.

December 19, 2007 by

Free File Unlocker Portable

Free File Unlocker is an essential free utility to delete currently Used, locked, undeletable, busy files. Works with all 32bit and...

July 17, 2013 by 4dots Software

BeyondTrust makes standard user usable in Windows

It's a well known fact that almost all IT organizations run their client Windows (typically 2000 or XP) computers in full administrative mode, which violates the fundamental security model of least privilege. The simple reason for this is that running Windows 2000 and XP in standard user mode is too difficult to manage for most businesses, and many "security" applications, like antivirus software or system management software, force the use of administrative privileges or they simply don't work.

March 7, 2007 by

OS X remains the safe option for now: Sophos

Apple's OS X remains a safe option when compared to Microsoft Windows XP or its successor, Vista, according to antivirus firm Sophos.The Sophos Security Threat Management Report 2006 (pdf), which was published on Thursday, highlights the fact that only one piece of malware targeting OS X has been found in the wild -- and even that has not really posed a threat.

July 5, 2006 by

ZyXEL ZyWALL 35 UTM

The ZyWALL 35 UTM appliance combines all the basic security tools required to protect a small business network, and deploys them at the Internet gateway where they are most useful. Professional help with deployment may be required, however, and it doesn’t do away entirely with the need for desktop and server-side protection.

November 24, 2005 by

Sony's antipiracy may end up on antivirus hit lists

Antivirus companies are considering protecting their customers from the digital rights management software used by Sony on some CDs.Kaspersky Lab has classed Sony's DRM software as spyware because, among other things, it can cause crashes and loss of data, and it can compromise system integrity and security.

November 6, 2005 by

Tumbleweed MailGate 2.2

This mail server security appliance is child’s play to set up and manage, and great for companies with limited technical expertise.

November 12, 2004 by

Norton AntiVirus ignores malicious WMI instructions

Symantec's flagship consumer antivirus application contains a vulnerability that can allow certain malicious scripts to pass through without being scanned, according to a security researcher.Dan Milisic, a security researcher based in Canada, told ZDNet Australia that Norton AntiVirus's script blocker ignores certain VBscript using Windows Management Instrumentation (WMI), which could allow an apparently protected PC to be infected by a Trojan without detection.

October 20, 2004 by

EmergeCore IT-100

The EmergeCore IT-100 has an impressive set of features, but is let down by a lack of documentation and tricky deployment.

October 12, 2004 by

Evolving the Secure Communications Infrastructure

Security solutions and services are hot topics with enterprises and security vendors alike as the market sorts out best practices for cost-effective security deployments. This research note takes a futuristic look at a secure communications infrastructure, encompassing the major technologies of anti-virus defense (AV), firewalls, intrusion detection systems (IDS), security event management (SEM), and professional services.

October 13, 2003 by

CA unveils antivirus, antispam product

Computer Associates announced on Monday new software aimed at filtering out spam and viruses, along with preventing hacking and unacceptable employee usage of the Web. Called eTrust Secure Content Management, the software ties desktop antivirus and gateway-server filtering software into a single platform.

June 16, 2003 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories