We constantly monitor threats from all sources. But we don't stop there. Our research teams go deeper to find the details of threats and where they come from. Our threat analysis pages can help you discover what you need to know to protect your system.
You'll find all you need to know about viruses and spyware here. We've got details on known and new threats, plus our analysis and what it means for you. And we'll help remove threats as soon as you find them.
Our threat researchers find and analyze every bit of information on files that are either executing and behaving questionably, or that look questionable before they execute. You can see what we've discovered about suspicious files. And that can help you decide which files to trust.
We'll help make your security decisions easier with our controlled applications information. Our teams analyze the potential threats from applications like IM, games and VoIP. You can use that data to decide what to allow or block from your network.
Get all the information you need to keep a handle on devices on your network. We've got full details and analysis on things like USB keys and Bluetooth interfaces. Our data can help you choose your ideal security policies.
We've got all you need to know on adware and potentially unwanted applications (PUAs). You'll find details and help on getting rid of unwanted programs and freeing up your network.
We gather all the information we can on viruses and hoaxes, which are fake virus reports that spread by email. Our threat analysts update this page with new hoaxes that emerge. We'll help you stay ahead of virus hoaxes to protect your network and inboxes.