Preventing malicious spyware in the enterprise
Source: - Posted by LogError   
Security Spyware threats are becoming more sophisticated; hackers are finding ways to lodge key logging, backdoor programs and trojans onto more desktops. However, anti-spyware tools have not kept up with this increased complexity.

This white paper reviews the major technology approaches to spyware: signature and rules-based methods and points out the strengths and weaknesses of these approaches. The white paper aims to help admins critically assess the claims of spyware tools when they say they are "enterprise-strength".

Read this full article at

Only registered users can write comments.
Please login or register.

Powered by AkoComment!