Browse communities
Browse communities
Presenting a webinar?

10 Ways to Tell If It's Time to Change Your Anti-Virus Software

Pete Streips, President, Network Security Group, ESET Research Team
If you are like most small businesses you have probably experienced issues with anti-malware software in the past. Do any of the issues below ring true when thinking about your current antivirus solution?

• When it performs scans it slows our systems to a crawl

• It creates too many alerts on files that aren’t malicious

• It is hard to manage across all our platforms and devices

• Our users want to turn it off because it is so annoying

If so, join Peter Streips, Network Security Group (ESET’s Gold Partner) President and ESET researchers for a panel discussion and learn why it’s time to change your antivirus solution.
Jun 6 2012
59 mins
10 Ways to Tell If It's Time to Change Your Anti-Virus Software
More from this community:

Cloud Computing

  • Live and recorded (4343)
  • Upcoming (130)
  • Date
  • Rating
  • Views
  • Join us this week for a special 30-minute live session on how RingCentral integrates with Zendesk for improved workflow and increased productivity.

    Tune in every Friday for RingCentral Live. We’ll tour the RingCentral interface, discuss the latest innovations and features available on the RingCentral platform, and share best practices on leveraging cloud communications for your business. This session also features a live demo of RingCentral Office and an open Q&A session led by a Sales Engineer.
  • L’ambiente dei tuoi clienti è sempre più complesso, Backup Exec 15 permette loro di esguire backup e recovery in modo semplice ed efficace, sempre e ovunque.
    Segui questo webinar e scopri come Backup Exec 15 può semplificare e rispondere alle esigenze delle diverse infrastrutture.
  • Want to turn data integration into a strategic opportunity? Join us to learn how Salesforce Lightning Connect can help you easily connect your back-end databases into your front-end Salesforce apps without writing any code.

    You’ll hear from Chase Schults at OC Tanner on how they:

    -Prototyped the integration in hours and deployed to production in days
    -Exposed data from back-end SAP system without copying the data to Salesforce
    -Let their Service Agents search and access SAP data without leaving Salesforce
  • Want to turn data integration into a strategic opportunity? Join us to learn how Salesforce Lightning Connect can help you easily connect your back-end databases into your front-end Salesforce apps without writing any code.

    You’ll hear from Chase Schults at OC Tanner on how they:

    -Prototyped the integration in hours and deployed to production in days
    -Exposed data from back-end SAP system without copying the data to Salesforce
    -Let their Service Agents search and access SAP data without leaving Salesforce
  • If your organization is reliant on a rapidly aging version of SQL Server, you need to join SQL Server experts Michael McCracken from HOSTING and Rodney Landrum, a Microsoft SQL Server MVP, from Ntirety for this in-depth discussion of the hows, whys and whats of upgrading from Microsoft SQL Server 200X to SQL Server 2014. The interactive webinar will cover:
    •The benefits of upgrading
    •Considerations to understand
    •How to smooth the transition
    •Q & A
  • The Fastest, Easiest Way to Backup and Store Data—so You Can Do More Important Things

    Are you still spending too much time backing up and storing data rather than using that information to drive business innovation? If so, it just might be time to consider an all-in-one backup target appliance (BTA).

    Join us as Seagate appliance experts Anne Haggar and Samuel Nagalingam will help you answer these important questions:

    1. Why are backup target appliances gaining steam in the market?
    2. How do you know if a BTA is right for you?
    3. How can Seagate’s BTA solve the problems you have managing your information and backing up enterprise applications?

    After taking a high-level look at the latest trends in BTA technology, Anne and Samuel will introduce you to the powerful, all-new Seagate Backup Target Appliance—an all-in-one solution that provides an onsite backup point for your most important information, let’s you optionally run the EVault Director Backup and Recovery Software, and allows you to replicate to another BTA or to the cloud.

    Find out how you can protect the information that matters most—wherever it resides—freeing you to use the information to drive innovation.
  • When it comes to B2B marketing, personalization is critical to successfully engage with both prospects and customers. But many companies struggle with personalized marketing interactions when dealing with a large and growing numbers of leads.

    How can you ensure that your leads are being accurately placed into appropriate campaigns, and that each one is getting optimally routed in order to turn prospects into customers? Join Salesforce and Salesforce customer Internap to learn how bringing together the right customer data with the right marketing and sales technology will allow you to get better results from your marketing efforts.
  • Are you looking to start an online business and wondering what technologies you should be using to accelerate growth or are you an existing business looking to get ahead of the game?

    According to the recent Neoworks & Econsultancy Technology for eCommerce survey, 34% of companies said that multichannel services and conversion rate optimisation are most likely to drive eCommerce growth. But just what other tips and trends should you be paying attention to in 2015 and how will these trends affect your online business?

    Join this 30-minute webinar on the 16th of April to get your need to know eCommerce tips and trends for 2015 as identified in the Neoworks & Econsultancy Technology for eCommerce report. Linus Gregoriadis will take you through the key findings of the report, discuss the impact of each trend on online retailers, as well as compare these to 2014.
  • Immer mehr Unternehmen evaluieren Amazon Web Services als Zielplattform für die Umsetzung von neuen Projekten. Dabei kann auf eine umfangreiche Auswahl von Services, die vom Virtualisierungsservice (EC2) über relationale Datenbanken (RDS) bis hin zur Echtzeitverarbeitung von Streaming Big Data (Kinesis) reichen, zurückgegriffen werden. Unabhängig von der Serviceauswahl, stellt sich in jedem Projekt die Frage nach der Integration mit bereits existierenden und zukünftig in Frage kommenden Systemen.

    Informatica Cloud bietet Unternehmen eine Integrationsplattform, die speziell für die Anforderungen von Cloud Applikationen entwickelt wurde. Mit Hilfe von verfügbaren Konnektoren zu internen und Cloud-basierten Anwendungen, Datenbanken, Flat Files und sozialen Netzwerken, lassen sich auch hybride Integrationsszenarien problemlos abbilden. Dabei bieten Schritt-für-Schritt Assistenten eine Anleitung für gängige Anwendungsfälle der Cloud-Integration und ermöglichen es so auch unerfahrenen Anwendern schnell erste Integrationsprozesse zu implementieren.

    Mit Informatica Cloud für Amazon Web Services können Unternehmen mit Hilfe von verfügbaren Konnektoren, Daten von und nach Amazon S3, Amazon RDS, Amazon DynamoDB und Amazon Redshift synchronisieren. Insbesondere der Redshift-Konnektor vereinfacht und automatisiert den komplexen Ladeprozess und stellt sicher, dass der von Amazon empfohlene hochparallele Lademechanismus genutzt wird.

    Nehmen Sie an diesem Webinar teil um zu erfahren wie die Informatica Cloud Plattform Unternehmen hilft, Amazon Web Services effizienter und komfortabler zu nutzen. Anhand einer Demo sehen Sie wie ein exemplarischer End-to-End Prozess von der initialen Beladung einer Redshift-Datenbank bis zur Auswertung der Daten mit Tableau, realisiert werden kann.
  • Software defined architectures are all the buzz, helping to start conversations about transforming customer data centers from cost centers into competitive advantages. But in today’s economy, no business can afford to stand still. And a business is only as agile as its IT organization allows. An agile data center and IT department can:

    •Protect the infrastructure and easily recover if faults are found or predicted
    •Control access to data while meeting compliance and regulatory requirements
    •Deliver services quickly, resiliently, and cost-effectively

    Join us on at 10am GMT on 16th April 2015 and learn how Symantec’s view of the “Agile Data Center” covers delivering the right resources in the right way to the users. Whilst bringing a broader view on how you can introduce critical solutions and new revenues around disruptive customer events.
  • Channel
  • Channel profile
  • How to Assess and Manage Your Cyber Risk May 27 2015 5:00 pm UTC 60 mins
    Stephen Cobb, Senior Security Researcher, ESET
    Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
  • The Mobile Security Problem for Small Businesses May 6 2015 5:00 pm UTC 60 mins
    Cameron Camp, Security Researcher
    Mobility can be a challenge for small businesses, especially when it comes to managing various devices and keeping them secure. ESET Security Researcher, Cameron Camp, explores mobile device management, BYOD and other challenges discussed during National Small Business Week.
  • Planning for anything: business continuity and disaster recorvery Apr 22 2015 5:00 pm UTC 60 mins
    Mike Kunz, VP of Sales, StorageCraft
    Is your business prepared for a disaster? Join ESET and industry expert, StorageCraft, for a research overview presentation of modern business disasters. We'll look at the difference between back up and recovery and discuss best practice for building a recovery plan. Mike Kunz, VP of Sales with StorageCraft, will also look at specific solutions to quickly get your business up and running when disaster strikes.
  • Looking Forward to HIMSS 2015: What are the latest trends? Recorded: Apr 8 2015 49 mins
    Lysa Myers, Security Researcher III, ESET North America
    ESET security researcher Lysa Myers discusses developments in healthcare IT system security that you may see at the HIMSS conference in Chicago next week. Find out what is being done to better protect patient data privacy and more.
  • APTs: How to protect your business through multi-layered detection Recorded: Mar 18 2015 61 mins
    Ayreh Goretsky, Distinguished Researcher, and Don Lewis, Product Marketing Manager, ESET North America
    Advanced persistent threats (APT) are a growing concern to the world's companies and networks. This presentation will give an overview on how they work and examine real-world data breaches resulting from APTs. We’ll also look at how multi-layered proactive detection can combat this threat and offer a product overview of how ESET’s powerful endpoint solutions respond to APTs.

    Category: Research overview and ESET product presentation.
  • Endpoint Security Just Got Simpler Recorded: Mar 4 2015 37 mins
    Dave Howard, Instructional Designer, ESET North America
    From unobtrusive advanced malware detection technologies to automated threat response and actionable mobile-friendly dashboard – manage security from any device, any time, ESET will present new solutions for securing your endpoints and new ways to manage them.
  • 2015 Cybersecurity Legislation: Implications and opportunities Recorded: Feb 11 2015 58 mins
    Stephen Cobb, Sr. Security Researcher
    Cybersecurity legislation and related issues received unprecedented attention in President Obama’s 2015 State of the Union address, but what does this legislative agenda mean for businesses? Will your organization’s IT security strategy be impacted? Ahead of the Summit on Cybersecurity and Consumer Protection at Stanford on February 13, security expert Stephen Cobb offers answers to these questions and his perspective on cybercrime deterrence.

    Category: Research Overview
  • CES 2015: A security insider take on this year's new technology Recorded: Jan 21 2015 53 mins
    Cameron Camp, Security Researcher
    What were the biggest takeaways from the annual CES Conference this year? Join Security Researcher, Cameron Camp, as he examines the new technology presented at the show and offers an insider take on the associated security concerns including Internet of Things, privacy security, wearables and more.
  • 2015: Examining the threatscape for the year ahead Recorded: Jan 7 2015 58 mins
    Stephen Cobb, Sr. Security Researcher
    How is the landscape changing for cyber security and what do businesses need to know to protect themselves? From large scale data hacks to credit card breaches, Sr. Security Researcher, Stephen Cobb, looks at the major trends in cyber security for the upcoming year and discusses the tools and resources available to protect against them.
  • Why the mHealth Security Challenge is Way Bigger than HIPAA Recorded: Dec 17 2014 59 mins
    Stephen Cobb, Senior Security Researcher, ESET
    The potential benefits of mobile medical technology and telemedicine are enormous, from to better quality of life to saving lives, not to mention controlling healthcare costs. Yet keeping data safe when it is beyond the confines of hospitals and clinics is a serious challenge, one that cannot be met merely through regulatory compliance, as ESET Security Researcher Stephen Cobb explains.
  • Make 2015 More Secure: Lessons from 2014 Recorded: Dec 3 2014 60 mins
    Aryeh Goretsky, Distinguished Researcher, ESET
    Will 2014 be remembered as the year of the mega-breach or will we all just try to forget the drumbeat of criminal hacks? In this webinar ESET Distinguished Researcher Aryeh Goretsky takes a positive approach and examines the lessons that can be learned from the year’s events in IT.
  • Protect Your Data and Devices While Traveling Recorded: Nov 19 2014 43 mins
    Lysa Myers, Security Researcher at ESET
    Whether it is business travel during the busy conference season, or heading home for the holidays, taking our digital devices beyond the relative safety of home or office creates more security challenges than we may realize. ESET Security Researcher Lysa Myers talks about how you can protect your data and devices on the road or wherever you roam.
  • Keeping Wearable Technology Secure Recorded: Nov 5 2014 54 mins
    Cameron Camp, Security Researcher, ESET
    From bodycams to fitness gadgets and life-saving medical devices, wearable technology is coming on strong, but are there risks involved? As standalone devices or a sub-category of the Internet of Things, wearable technology raises security and privacy concerns that need to be addressed sooner rather than later, as ESET Security Researcher Cameron Camp explains.
  • What are the Top Topics during National Cyber Security Awareness Month? Recorded: Oct 22 2014 56 mins
    Stephen Cobb, Senior Security Researcher, ESET
    October is National Cyber Security Awareness Month and in 2014 it will be bigger than ever, surfacing the concerns of both companies and consumers. From the Twitter hashtag #NCSAM to events in your region and this webinar, this is a good time to get expert perspective on the hot topics in cyber security.
  • How do Open Source Tools Stay Secure? Recorded: Oct 8 2014 56 mins
    Cameron Camp, Security Researcher, ESET
    The Heartbleed flaw alerted the world to the security aspects of open source code which is now widely used everywhere from big enterprises to small businesses. ESET Security Researcher Cameron Camp draws on his many years of experience working with open source tools to the urgent and important issue of how to keep them secure.
  • How Can You Protect Sensitive Data in Education? Recorded: Sep 17 2014 38 mins
    Lysa Myers, Security Researcher at ESET
    Review the latest survey findings about the IT security challenges faced by educational institutions and the real world responses that are being deployed to protect systems and the very valuable data they process.
  • How Secure is Global Commerce Today? Recorded: Sep 3 2014 56 mins
    Stephen Cobb, Senior Security Researcher, ESET
    Act local but think global applies to IT security and data privacy as well as many other aspects of doing business. How does adding an international dimension to your business impact privacy and security? What does it mean if your business continuity depends on a global supply chain? This webinar will help you answer these questions and more.
  • The Evolution of Cybercrime Recorded: Aug 20 2014 57 mins
    Stephen Cobb, Senior Security Researcher, ESET
    Successfully defending IT systems and the valuable data they contain requires an up-to-date understanding of the scale and nature of security threats. For many organizations, the greatest IT security threat is cybercrime, the nature of which is evolving. This webinar explores the changing cybercrime threat and the use of layered defenses to defend your systems and data.
  • Mobility in Healthcare Recorded: Aug 13 2014 43 mins
    Lysa Myers, Security Researcher at ESET
    Explore how the use of mobile digital devices impacts efforts to ensure the confidentiality, integrity, and availability of medical data. Is there a way to BYOD safely? And can mobile devices help, rather than hinder, IT security.
  • Cloud vs. Virtual Environments: Which one Should you Trust? Recorded: Jul 9 2014 56 mins
    Cameron Camp, Security Researcher, ESET
    Today's companies face a confusing array of choices when it comes to IT services, from public to private clouds and different types of virtual environments. ESET Security Researcher Cameron Camp explains your options and the security pros and cons of each.
Keeping you and your business safe from IT security threats
ESET's Cybersecurity series is designed to connect you with the experts. As an IT Security professional you will gain access to analysis and commentary from industry experts on the Cybersecurity front. Join ESET's channel now >>

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 10 Ways to Tell If It's Time to Change Your Anti-Virus Software
  • Live at: Jun 6 2012 5:00 pm
  • Presented by: Pete Streips, President, Network Security Group, ESET Research Team
  • From:
Your email has been sent.
or close
You must be logged in to email this