malware protection

Results 126 - 150 of 163Sort Results By: Published Date | Title | Company Name

CDW Malware Video

Published By: CDW     Published Date: Jun 10, 2013
CDW Malware Video
Tags : 
cdw, security, malware, channel specific protection., anti spam, anti spyware, anti virus
    
CDW

Strong Security with Lower Operational Costs and Simplified Compliance

Published By: McAfee     Published Date: Feb 06, 2013
Today’s threats to endpoints and data are more complex, more numerous, more varied —and changing every second. McAfee understands next-generation security in the context of your devices, additional protection technologies, and central management.
Tags : 
endpoint security, mac security, linux security, real time security, anti malware protection, hips, desktop firewall, endpoint encryption
    
McAfee

100% Protection - Read the Report

Published By: McAfee     Published Date: Feb 06, 2013
The move towards multi-faceted protection has been gathering pace, with more technologies coming into play to protect users from the vast and increasing number of threats.
Tags : 
anti malware performance test, security performance test, application control benchmark, anti virus benchmark, hips benchmark, windows 7 anti malware benchmark, anti malware protection comparison, west coast labs
    
McAfee

Engineering Firm Saves More than 200 Hours A Week With Webroot SecureAnywhere Business

Published By: Webroot     Published Date: Nov 02, 2012
When IT administrator, Ty Smith deployed SecureAnywhere Business - Endpoint Protection, system wide, it quickly became clear that he had made the right choice, both from a security standpoint and a financial one.
Tags : 
endpoint security, endpoint protection, malware protection, antivirus software, case study, security, business technology
    
Webroot

A Technical Overview: Endpoint Protection - The Magic Behind the Scenes

Published By: Webroot     Published Date: Nov 02, 2012
Download this information to familiarize yourself technically with the components and capabilities of Webroot® SecureAnywhereTM Business - Endpoint Protection.
Tags : 
endpoint security, endpoint protection, it security, malware solutions, malware, malware protection, security, business technology
    
Webroot

SecureAnywhere Business - A Product Overview

Published By: Webroot     Published Date: Nov 02, 2012
This paper looks at this problem and how Webroot, by going back to the drawing board on counering malware threats, is revolutionizing endpoint protection and solving the issues that hinder existing endpoint security solutions.
Tags : 
antivirus protection, endpoint protection, endpoint security, malware, security, business technology
    
Webroot

Webroot: Secure Anywhere Business- Endpoint Protection

Published By: Webroot     Published Date: Oct 27, 2012
An Overview by George Anderson- Product Marketing Manager May 2012
Tags : 
it security, endpoint security, anti-virus protection, malware protection, malware detection, anti virus
    
Webroot

Adaptive Behavior-Based Malware Protection

Published By: Symantec     Published Date: Oct 25, 2012
Enterprise Information Security executives and teams can use this document to understand a new behavior-based security technology that automatically identifies and blocks even highly obfuscated malicious code with no user intervention and more.
Tags : 
symantec, security, threat detection, fud, malware, business technology
    
Symantec

A New Approach to Security Intelligence

Published By: Splunk     Published Date: Oct 15, 2012
Supporting a Big-data Approach for Security Intelligence
Tags : 
splunk, security, malware protection, security, it infrastructure, security intelligence, business technology, data center
    
Splunk

Crimeware Protection: Security Beyond and Below the OS

Published By: HP & Intel     Published Date: Sep 18, 2012
3rd generation Intel Core vPro processors' built-in security technologies deliver and protect business clients where current technologies cannot reach.
Tags : 
intel, security, it threats, threat management, malware, data loss prevention, identity protection, business intelligence
    
HP & Intel

Protecting Your Online Channels and Web Applications

Published By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos
    
Akamai

How to Defend Your Perimeter from Today's Outsized Threats

Published By: Akamai     Published Date: Mar 10, 2012
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos
    
Akamai

VIPREcast - Cleaning Up After Botnets

Published By: GFI Software     Published Date: Feb 24, 2012
During this webcast, GFI Senior Threat Researcher Chris Boyd discussed:How to identify botnets in your systems, how to remediate botnet malware, how to maximize protection against botnets and how to educate users to prevent infections.
Tags : 
gfi software, technology, security, application security, anti virus, intrusion detection, access control, identity management
    
GFI Software

WebPulse Collaborative Defense: Proactively Defending Your Network Against Malware

Published By: Blue Coat Systems     Published Date: Oct 25, 2011
The WebPulse delivers fast and effective Web 2.0 threat protection for 75 million users worldwide. Find out more about how WebPulse can protect you!
Tags : 
webpulse, defense, malware, security, protection, blue coat, insider threats, security
    
Blue Coat Systems

Dare-To-Compare: 7 Endpoint Security Solutions for Business

Published By: ESET     Published Date: Sep 07, 2011
This report presents a comparative analysis on the performance, effectiveness and usability of seven security solutions from some of the world's largest security vendors.
Tags : 
eset, security solutions for business, malware, antivirus, protection, cybercrime, anti virus, authentication
    
ESET

2011 Black Hat Conference: Hacking the Car

Published By: ESET     Published Date: Sep 07, 2011
Protection for small and medium businesses against viruses and cybercrimes.
Tags : 
eset, black hat conference, hacking the car, malware, protection, security, antivirus, anti virus
    
ESET

Malware Security Report: Protecting Your Business, Customers, and the Bottom Line.

Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
This white paper will help you learn about criminals' motivations for distributing malware through the web and how they infect web servers to make distribution possible, as well as techniques administrators can use to detect when and how attackers have compromised their web server.
Tags : 
verisign, malware security report, bottom line, business protection, cybercriminals, malware attacks, online security, anti spam
    
VeriSign, Inc.

Free Trial: Protect Your Business from Slowdowns that Negatively Impact Productivity

Published By: ESET     Published Date: Jun 08, 2011
ESET NOD32 Antivirus 4, ESET's Business Solution offers complete server-to-endpoint protection. Request a free trial today.
Tags : 
eset, free trial, nod32 antivirus 4, antivirus, malware, threats, productivity, endpoint protection
    
ESET

Endpoint Security: Winning the Endgame

Published By: Lumension     Published Date: Apr 15, 2011
Learn how to effectively secure endpoints with a defense-in-depth approach that includes patch management, anti-virus, application whitelisting and device control.
Tags : 
malware, endpoint security, anti-virus, data protection, cyberthreat, anti spam, anti virus, application security
    
Lumension

Patch plus AV: Better Together

Published By: Shavlik Technologies     Published Date: Apr 14, 2011
This whitepaper will cover the challenges of relying exclusively on either AV or patch and configuration management for threat resistance and why a combined approach is the best option.
Tags : 
shavlik, anti-malware, patch management, configuration management, virtualization, malware, anti-virus, protection
    
Shavlik Technologies

Patch plus AV: Better Together (Webinar)

Published By: Shavlik Technologies     Published Date: Apr 14, 2011
This webinar will cover the challenges of relying exclusively on either AV or patch and configuration management for threat resistance and why a combined approach is the best option.
Tags : 
shavlik, anti-malware, patch management, configuration management, virtualization, malware, anti-virus, protection
    
Shavlik Technologies

Protecting Against the New Wave of Malware

Published By: GFI Software     Published Date: Feb 24, 2011
This white paper, sponsored by GFI Software, addresses the variety of issues facing organizations today in the context of their system management challenges, and discusses the capabilities of VIPRE Antivirus Business, an integrated platform that provides high performance, integrated endpoint protection capabilities.
Tags : 
gfi software, sunbelt, malware protection, system management, threats, endpoint infrastructure, viruses, worms
    
GFI Software

Malware Security Report: Protecting Your Business, Customers and the Bottom Line

Published By: VeriSign     Published Date: Feb 10, 2011
This white paper will help you understand the threat from malware and how it can impact your online business.
Tags : 
verisign, malware security, data protection, anti spam, anti spyware, anti virus, security management
    
VeriSign

How IT Can Enhance User Productivity with Dynamic Web Repair

Published By: M86 Security     Published Date: Feb 09, 2011
This white paper discusses a technology that proactively takes security a step further by enabling the safe use of Web 2.0, and therefore, maintaining productivity while mitigating the malware threat altogether.
Tags : 
m86 security, productivity, web repair, malware protection, social networking, web 2.0, erp, crm
    
M86 Security

Six Steps to Effective Web Security

Published By: M86 Security     Published Date: Feb 09, 2011
This white paper addresses the risks that concern IT security professionals, many of which they feel powerless to control.
Tags : 
m86 security, web security, malware protection, web 2.0 application, information exchange, collaboration, business enablement
    
M86 Security
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.