anti virus

Results 176 - 200 of 227Sort Results By: Published Date | Title | Company Name

Manage Your Security and Your Budget with the Complimentary IT Security Kit

Published By: GFI     Published Date: Sep 11, 2012
Mitsubishi Polysilicon turned to VIPRE Antivirus Business to replace a major brand-name anti-malware product that was causing too many headaches for its IT department and its 100-plus users.
Tags : 
malware, anti-virus, case study, security solutions, anti-malware, auditing, gfi software, security
    
GFI

Manage Your Security and Your Budget with the Complimentary IT Security Kit

Published By: GFI     Published Date: Sep 17, 2012
The IT Security Kit provides everything you need to accurately assess antivirus solutions. Included in the kit is a 30-day trial of VIPRE Antivirus Business, the antivirus software proven to meet the security needs of IT professionals everywhere.
Tags : 
    
GFI

Manage Your Security and Your Budget with the Complimentary IT Security Kit

Published By: GFI     Published Date: Sep 18, 2012
Decreasing budgets, an increasingly mobile workforce, limited staff, time constraints, a growing dependence on e-solutions - you face unique challenges as an IT professional. And you can't afford to disrupt your end users or clientele to implement security solution after security solution. That's where the IT Security Kit comes in. This handy kit provides everything you need to quickly and easily find the antivirus product that's manageable, reliable, cost-effective and just right for your organization.
Tags : 
technology, security, it security, antivirus, antispam, virus detection, access control, anti virus, security management, vulnerability management
    
GFI

Assessing the Business Value of Endpoint Specialized Threat Analysis and Protection Solutions

Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco

Lenovo's 360° Approach to Security Available to You

Published By: Lenovo     Published Date: Aug 31, 2018
? Security threats are growing at an astronomical pace–theft, hacking, malware, ransomware... and the list goes on. That's why Lenovo integrates security at every level including built-in hardware, advanced software, a secure supply-chain, complete component validation and integrated services. In addition to Lenovo's own security features built into each device, Windows 10 Pro delivers comprehensive, built-in and ongoing security protections you can trust – including Windows Hello, Windows Defender Antivirus, firewall, and more. Read more in this comprehensive product guide, from personal device to data center, we'll show you how we're hard at work securing your devices from the threats.
Tags : 
    
Lenovo

Security Guide: How To Evade Anti-Virus Detection

Published By: Rapid7     Published Date: Mar 19, 2014
In this guide, penetration testers will learn how to evade anti-virus detection on target machines for your Metasploit pen tests. This guide will be most useful to readers who already have some penetration testing experience and are familiar with Metasploit Pro.
Tags : 
rapid7, security, anti virus, virus protection, antivirus, spam, hackers, internet security, penetration testing, intrusion prevention, network security, anti spam, application security, intrusion detection, phishing, data protection
    
Rapid7

December 2009 Spam Report

Published By: McAfee     Published Date: Dec 09, 2009
Despite the six-year-old CAN-SPAM Act, spammers routinely abuse the law and continue to deliver their obnoxious email. One year ago, a major spam-hosting ISP was shut down, causing an impressive drop in botnet activity. Today, however, spam authors are more active and smarter than ever. Spammers love to tailor their messages to the news and the season. Read this report to gain a greater understanding of current spam threats.
Tags : 
mcafee, spam, risk management, vulnerability, can-spam, anti-spam, virus, botnet, twitter, job spam, access control, anti spam, anti spyware, anti virus, identity management, internet security, security management, security policies, web service security, vulnerability management
    
McAfee

Astaro Replaces Cisco and Barracuda for Better Security Management at Frontier Nursing Service

Published By: Astaro     Published Date: Aug 10, 2009
Frontier Nursing Services (FNS, Inc.) of Hyden, Kentucky provides health care to the underserved population in rural areas of southeast Kentucky and is committed to advancing nursing through education.
Tags : 
frontier nursing, astaro, cisco, barracuda, pix, fns, network, it department, management, reporting, all-in-one security, vpn, firewall, email, antivirus, gateway, report manager, security, anti virus, firewalls
    
Astaro

Dennis Technology Labs Report: Enterprise Anti-Virus Protection June 2013

Published By: Symantec     Published Date: Aug 09, 2013
Anti-virus software is a crucial piece of any organization’s security strategy. However, sifting through the marketing hype and finding the product that truly delivers the best security can be challenging. This independent research report on enterprise anti-virus protection tests five of today’s best-known anti-malware products to help your organization evaluate which would work best in your enterprise. View now to uncover who came out on top when tested upon accuracy, protection, false positives, and more.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
    
Symantec

Tolly Test Report: Competitive Antivirus Performance in VMware vSphere 5 Virtual Environments

Published By: Symantec     Published Date: Aug 09, 2013
Symantec, Corp. commissioned Tolly to benchmark the performance of its new Symantec Endpoint Protection (SEP) 12.1 within VMware vSphere 5 virtual environments vs. agentless and agent-based solutions from competing vendors. Specifically, this testing focused on the system resource requirements of each solution when performing on-demand and on-access scanning functions, and during distributed virus definition updates.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
    
Symantec

Tolly Test Report: Antivirus Effectiveness VMware vSphere 5 Virtual Environments

Published By: Symantec     Published Date: Aug 09, 2013
As virtualization-aware endpoint security solutions continue to evolve, more and more functionality is offloaded from a single VM to its supporting infrastructure in the form of Virtual Appliances (VA). In addition to considering the performance impact of this re- architecting, administrators must also ensure that the protection offered remains fully-functional, even in virtual environments. Learn More.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
    
Symantec

NPMD for Network Security Forensics

Published By: Viavi Solutions     Published Date: Jan 04, 2017
The right Network Performance Monitoring and Diagnostics (NPMD) solution can help IT operations deliver superior performance for users. When incorporated into your IT security initiatives, deep packet inspection can strengthen your existing antivirus software, Intrusion Detection System (IDS), and Data Loss Prevention (DLP) defenses.
Tags : 
    
Viavi Solutions

Solution Brief: Top 5 Largest Malware Delivery Networks

Published By: Blue Coat Systems     Published Date: Oct 25, 2011
View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.
Tags : 
malware, delivery, protect, security, security solutions, networks, delivery networks, firewalls, anti-virus, threats, solutions, webpulse, defense, cloud, anti spam, anti virus, application security, authentication, disaster recovery, email security
    
Blue Coat Systems

SIEM and IAM Solutions: A10 Networks Solves Complexities

Published By: A10 Networks     Published Date: Aug 21, 2009
This white paper highlights the complex nature of traditional authentication and identity management practices and shows how A10 Networks unified identity and access management solutions simplify the convergence of network, security, and identity resources for proper deployment.
Tags : 
identity management, authentication, access control, anti spam, anti spyware, anti virus, a10, a10 networks
    
A10 Networks

Virus Prevention Without Signatures

Published By: Internet Security Systems     Published Date: Aug 21, 2009
Viruses have been on the attack for more than 20 years, and the cost of dealing with them is escalating. Too many malcode (malicious code) attacks by viruses, worms, Trojans and the like are breaking through today's most prevalent system defenses: Antivirus (AV) programs. This whitepaper will discuss the full impact of virus disasters and what historically has been done to combat the problem.
Tags : 
virus, antivirus, anti-virus, anti virus, trojan, trojans, malware, worms, malcode, internet security, email security, web security, internet security systems, security, network security, anti spyware, application security, hacker detection, security management, web service security
    
Internet Security Systems

Controlling the Use of Instant Messaging and Peer-to-Peer Applications

Published By: Internet Security Systems     Published Date: Aug 21, 2009
Use of instant messaging applications-like AOL Instant Messenger, Yahoo! Messenger, MSN Messenger and ICQ-and peer-to-peer applications has grown significantly. Although the benefits of real-time communication offer a productivity benefit to corporate environments, instant messaging and peer-to-peer applications add significant vulnerabilities and risks to an enterprise's security posture.
Tags : 
instant messaging, instant messenger, icq, internet security, web security, virus, anti virus, anti-virus, antivirus, worms, vulnerability management, internet security systems, it management, bandwidth management, anti spam, anti spyware, email security, intrusion detection, intrusion prevention, patch management
    
Internet Security Systems

Spyware: An Annoying and Dangerous Problem You CAN Eradicate

Published By: Secure Computing     Published Date: Aug 21, 2009
Spyware presents a daily threat to organizations. It can even lead to networks being exposed to malicious attacks. Find out about the specific types of spyware threats that are out there and how you can combat these threats today.
Tags : 
security, internet security, anti spyware, intrusion prevention, intrusion detection, malware, anti virus, secure computing, securecomputing, security management
    
Secure Computing

Fresh Approaches to Solving the Malware Problem

Published By: Secure Computing     Published Date: Nov 20, 2006
Organizations need to be protected from both known and unknown threats, and all the varieties and forms that sophisticated malware can take.  Learn about the changing nature of malware attacks and how the Webwasher Anti-Malware from Secure Computing can provide a highly effective defense against malicious content.
Tags : 
anti spam, anti spyware, anti virus, application security, security, network security, data protection, malware, secure computing, securecomputing
    
Secure Computing

Selecting the Right Host Intrusion Prevention System: 12 Key Questions to Ask

Published By: Third Brigade     Published Date: May 25, 2007
This white paper identifies twelve critical questions that organizations need to consider when selecting a Host Intrusion Prevention System product. These questions relate to protection, manageability, integration and speed.
Tags : 
host ips, ips, hips, intrusion prevention, vendor selection, software selection, security, hacker prevention, hackers, anti virus, anti spyware, network security, cybercrime, third brigade, access control, firewalls, internet security, intrusion detection
    
Third Brigade

Protecting Client Systems from the Crimeware Invasion

Published By: Symantec     Published Date: Nov 02, 2006
The IT threat landscape has changed from individual hackers disrupting network operations to organized crime stealing confidential information. Antivirus technology must be joined by a coordinated, multilayered defense that includes proactive vulnerability-based intrusion prevention, file-based intrusion prevention, and inbound and outbound traffic control.
Tags : 
security, hacker detection, internet security, crimeware, spyware, intrusion prevention, anti virus, hacker prevention, access control, high availability, symantec, network security, anti spyware, application security, intrusion detection, security management
    
Symantec

Neutralizing the Spyware Threat

Published By: 8e6 Technologies     Published Date: Jan 12, 2007
Add spyware to the list of urgent security concerns. With resources already stretched thin in fighting viruses and stopping spam, companies now also have to defend against a threat that strikes silently and does much of its damage before it’s even detected.
Tags : 
spyware, anti spyware, malware, vulnerability management, anti virus, virus, viruses, hipaa compliance, compliance, intrusion detection, 8e6, 8e6 technologies, security, network security, hacker detection, internet security, security management, web service security
    
8e6 Technologies

Front-Line Malicious Code Defense for the Enterprise from a Single Management Console

Published By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the new LANDesk® Antivirus solution, available as an add-on to LANDesk® Management Suite and LANDesk® Security Suite, provides a competitively priced, front-line malware and malicious code defense for all network endpoints, including workstations, file servers, mail systems and Internet gateways.
Tags : 
network security, security, anti virus, virus, viruses, antivirus, anti-virus, malware, internet security, web security, endpoint security, end point security, end-point security, intrusion prevention, landesk
    
LANDesk

Why One Virus Engine is Not Enough

Published By: GFI     Published Date: Jun 12, 2007
This white paper examines why having multiple anti-virus scanners at mail server level substantially reduces the chance of virus infection and explores ways in which this can be achieved.
Tags : 
anti virus, anti-virus, virus, norton, network security, email security, intrusion prevention, ips, gfi, virus engine, trojan, trojans, anti spyware
    
GFI

The Corporate Threat Posed by Email Trojans

Published By: GFI     Published Date: Jun 12, 2007
Describing what trojans are and why they pose a danger to corporate networks, this paper discusses the need and method to protect your network from the threat of trojans.
Tags : 
network security, trojan, trojans, anti virus, anti-virus, virus, email security, internet security, intrusion prevention, ips, security management, corporate network, email archiving
    
GFI

Why You Need an Email Exploit Detection Engine

Published By: GFI     Published Date: Jun 12, 2007
Virus-writers are using increasingly complex and sophisticated techniques in their bid to circumvent anti-virus software and disseminate their viruses. Anti-virus software, though essential, cannot combat such threats alone; an email exploit detection tool is also necessary.
Tags : 
email security, trojan, trojans, anti-virus, anti virus, virus, network security, gfi, email exploit, nimda, yaha, bugbear, exploit software, exploit engine, mailsecurity, intrusion detection, intrusion prevention, email archiving
    
GFI
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.