All Research Sponsored By:ESET

A Buyer’s Guide to Extended Detection and Response
EBOOK: The prerequisite question before even thinking of buying an extended detection and response (XDR) solution is: Do you need it? Multiple pain points could trigger such a need ranging from the rise of ransomware, the risk of supply-chain attacks, to regulatory and insurance requirements. Download this e-book for a buyer’s guide to XDR.
Posted: 06 Apr 2024 | Published: 06 Apr 2024

TOPICS:  .NET

A Buyer’s Guide To Managed Detection And Response
EBOOK: Cloud systems, distracted home workers, remote access infrastructure, and more present large and attractive targets for threat actors. Enter managed detection and response (MDR), a type of managed security service that provides organizations with powerful detection and response capabilities. Download this eBook for a buyer’s guide to MDR.
Posted: 04 Apr 2024 | Published: 05 Apr 2024

TOPICS:  .NET

APT Activity Report
RESEARCH CONTENT: In this report, you’ll discover key findings about the activities of selected advanced persistent threat (APT) groups and learn how you can protect your organization from the malicious activities described within. Download the report now to gain a deeper understanding of the modern threat landscape.
Posted: 04 Apr 2024 | Published: 04 Apr 2024

TOPICS:  .NET

Outsmarting Generative AI Cyberattacks
WHITE PAPER: As enterprises leverage generative AI for business transformation, threat actors are employing the same technology for malicious purposes. So, how are bad actors using generative AI, and how can you defend your organization against their attacks? Find answers in this white paper.
Posted: 03 Apr 2024 | Published: 03 Apr 2024

TOPICS:  .NET

ESET Online Scanner
TRIAL SOFTWARE: ESET Online Scanner is designed only to detect and remove threats via on-demand scan and is not a permanent proactive antivirus solution. To receive complete proactive protection, get a free custom business trial and find out why IT pros worldwide recommend ESET for server-to-endpoint security.
Posted: 18 Nov 2011 | Premiered: 18 Nov 2011


IT Decision Checklist: Antimalware
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. This IT Decision Checklist on Antimalware can help you sort through these challenges and offers a list of antimalware products available today.
Posted: 27 Oct 2011 | Published: 27 Oct 2011


Protecting Your Multi-Platform Network: The New Wave of Attacks
WEBCAST: Join us to examine some of the malware risks associated with heterogeneous computing environments and solutions to protect your valuable business assets.
Posted: 20 Jun 2011 | Premiered: Jun 20, 2011


Mail Security for Microsoft Exchange Server
DATA SHEET: ESET Mail Security for Microsoft Exchange Server blocks all types of email-borne malware and spam. It scans your email traffic with industry-leading precision, low system footprint and high scanning speed - so slowdowns will be a thing of the past
Posted: 25 Mar 2011 | Published: 25 Mar 2011


E-Guide: Why attackers exploit multiple zero-day attacks and how to respond
EGUIDE: The Stuxnet worm has received significant media coverage for the large number of different types of systems it has infected. Symantec Corp. published an informative technical write-up that explains Stuxnet in detail and reports that around 100,000 systems have been infected.
Posted: 16 Mar 2011 | Published: 16 Mar 2011


Virus Bulletin: Comparative Reviews August-December 2010
WHITE PAPER: Read this paper to view the latest news and information about VB100 testing,  Windows Vista,  Windows 7, Windows Server 2003, Windows 7 Professional, and  so much more.
Posted: 14 Dec 2010 | Published: 14 Dec 2010


The Malware Report: The Evolution of Anti-malware and the 2011 Threat Landscape
PODCAST: In the 200th episode of “The Malware Report” Matt Grant talks with Randy Abrams and Paul Lansky about the past 4 years and how the threat landscape has evolved and changed over the years. In this podcast, Randy and Paul discuss many of these changes. Listen to this podcast to hear more. 
Posted: 02 Dec 2010 | Premiered: Dec 2, 2010


ESET: Threat Center
PRODUCT DEMO: IT managers need new solutions to combat ever changing threats to their security. ESET’s Internet Threat Map app shows you a map of global Infection rates, based on our daily analysis of over 100,000 samples of malware of all types.
Posted: 02 Sep 2010 | Premiered: 02 Sep 2010


IT Decision Checklist: Antimalware
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.
Posted: 14 Jun 2010 | Published: 14 Jun 2010


Presentation Transcript: WWW - World Wide Weaponization
PRESENTATION TRANSCRIPT: The growth of the internet brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software.
Posted: 10 Nov 2009 | Published: 10 Nov 2009