Essential Guide

Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Antimalware tools and techniques security pros need right now

Everything you ever wanted to know about antimalware tools and techniques, from crafting an antimalware strategy to identifying the best tools and talking to vendors.


Even as attacks become more targeted and sophisticated, the delivery mechanism for the vast majority of outsider attacks comes in some form of malware. So detecting and mitigating malware remains a top priority, which means new and better antimalware tools are essential.

This guide reviews the latest malware attacks -- where they’re coming from and how they work -- and then delves into the specifics of malware defenses. It reviews the basics of how antimalware tools work, discusses the strategic decisions that need to be made to fight malware now and even provides a handy glossary so you can be sure you’re up to date on the latest terminology.

With this guide, you can begin to fight back against the malware already attempting to assault your enterprise systems.

1Antimalware basics-

The nuts and bolts of antimalware tools

Searching for products that will deliver the best antimalware protection can be complicated. How do you identify the antimalware tools suited to your organizations' needs? This collection of articles will help with your vendor and product selection process.


The fundamentals of antimalware products

Learn about antimalware protection and how endpoint security technology can prevent malware from infecting end-user computers and corporate networks. Continue Reading


Making the business case

All organizations need to protect their endpoints from outside malware with antimalware products, which are essential to an enterprise-wide security strategy. Continue Reading


Comparing antimalware protection products

Expert Ed Tittel examines the top endpoint antimalware protection products for small, midsize and large enterprises and how they stack up against one another. Continue Reading


Procuring antimalware protection

Expert contributor Ed Tittel explores key criteria for evaluating endpoint security products to determine the best option for antimalware protection for your organization. Continue Reading


How to buy the best antimalware tools to protect endpoints

This guide reviews the types of endpoint antimalware tools now available and offers instruction on how to determine which best suit your organization. Continue Reading

2Latest malware attacks-

Learn how the latest malware attacks work

Malware is an ongoing battle; we can be certain that attackers will continue to develop new malicious code to try to evade your antimalware systems. Here's a look at how some of the latest attacks work.


How does the OneSoftPerDay adware hide from antimalware systems?

OneSoftPerDay, an adware program can install backdoors on PCs, is able to avoid detection from antimalware tools. Expert Nick Lewis explains how to mitigate its effects. Continue Reading


How can Vonteera adware be prevented from disabling antimalware?

Vonteera adware has the ability to disable antimalware software on endpoint devices. Expert Nick Lewis explains how enterprises can prevent this attack. Continue Reading


How can enterprises protect against Rombertik malware?

Rombertik malware is a new advanced malware that can trigger a system to self-destruct if it's detected. Expert Nick Lewis explains Rombertik and how to keep it from crippling your system. Continue Reading


How does GreenDispenser self-deleting malware work?

A new type of self-deleting malware, known as GreenDispenser, allows attackers to rob ATMs of cash. Expert Nick Lewis explains how this threat works and how to prevent it. Continue Reading


ProxyBack malware: How does it affect Internet proxies?

ProxyBack malware turns infected user systems into Internet proxies, which can obfuscate the attack source. Expert Nick Lewis explains how the malware works, and its purpose. Continue Reading


How does the Mazar malware take control of Android devices?

The Mazar malware can wipe an entire Android device once it has been installed. Expert Nick Lewis explains how this malware works, and how attacks can be prevented. Continue Reading

3Antimalware strategies-

Malware today requires improved strategies

Security pros continue to fight increasingly clever attacks taking aim at lower-hanging fruit: smartphones, mobile apps, social media and other cloud services. These rich targets require new antimalware tools and protection strategies. Learn how to mitigate these multifaceted malware threats.


Antimalware technologies and techniques to the rescue

This ISM Insider Edition provides fresh thinking and new information on what antimalware detection and prevention is available to meet the modern malware threat. To best protect your organization and its unique assets, read on. Continue Reading


The rise of fileless malware attacks

New malware threats can infect systems without leaving any files behind. Expert Nick Lewis explains how fileless malware operates and the best ways for security programs to stop it. Continue Reading


Malware-free attacks: How can enterprises stop them?

New research shows that threat actors are "living off the land" and infiltrating corporate networks using malware-free attacks. Expert Nick Lewis explains how this is done. Continue Reading


De-anonymizing malware: Can a new tactic help?

Researchers have discovered a new technique for de-anonymizing software that could help infosec teams attribute malware attacks. Expert Nick Lewis explains how it works. Continue Reading

4Terms to know-

Key antimalware terms

To talk defense strategy and antimalware tools, you need to know the lingo first. Here are the key terms used when speaking about malware threats and antimalware techniques.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.