> Technology > Security > Anti Virus
 

Anti Virus

Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). In the virus dictionary approach, when the antivirus software examines a file, it refers to a dictionary of known viruses that the authors of the antivirus software have identified.
Results 251 - 275 of 518Sort Results By: Published Date | Title | Company Name

VIPREcast - Cleaning Up After Botnets

Webinar Published By: GFI Software     Published Date: Feb 24, 2012
During this webcast, GFI Senior Threat Researcher Chris Boyd discussed:How to identify botnets in your systems, how to remediate botnet malware, how to maximize protection against botnets and how to educate users to prevent infections.
Tags : 
gfi software, technology, security, application security, anti virus
    
GFI Software

How to spot rogue anti-malware products: What you need to know before you click

White Paper Published By: GFI Software     Published Date: Feb 24, 2012
There are hundreds of rogue anti-malware products on the Internet that infect PCs rather than detect malware. Learn how these scams look and work and how to prevent your computer from becoming infected.
Tags : 
gfi software, technology, security, malware, internet security
    
GFI Software

Reducing Local Admin Exposure Through Application Whitelisting

White Paper Published By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss
    
Lumension

Hosting Provider with Confidence: Symantec SSL Certificates Provide a Secure Bridge to Trusted Cloud

White Paper Published By: Symantec     Published Date: Jan 04, 2012
Symantec SSL Certificates Provide a Secure Bridge to Trusted Cloud Hosting Providers
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec

Meet Your Disaster Recovery Goals with Less Complexity and Cost

White Paper Published By: VMware Dell     Published Date: Dec 07, 2011
This white paper outlines the ways virtualization can address the challenges of traditional disaster recovery and create a viable recovery plan.
Tags : 
disaster recovery, disaster, security, risk, plan
    
VMware Dell

Turning Security Upside-down

White Paper Published By: Webroot     Published Date: Dec 06, 2011
In this paper we go back to basics. We look at the kinds of security facilities needed now and in the future, and consider how to think about security
Tags : 
security, facilities, evolve, communication, collaboration
    
Webroot

The Business Case for SaaS

White Paper Published By: Webroot     Published Date: Dec 06, 2011
Unlock the true business value of IT security, and learn why companies of all sizes are choosing SaaS over on-premise solutions.
Tags : 
saas, service management, nimsoft, cloud service, delivery
    
Webroot

Software Security Delivered in the Cloud

White Paper Published By: HP - Enterprise     Published Date: Nov 22, 2011
HP Fortify on Demand: The quickest, most affordable way to accurately test and score the security of your applications.
Tags : 
application security, cyber-attacks, software security assurance, dast, sast
    
HP - Enterprise

Seven Steps to Delivering More Secure Software

White Paper Published By: HP - Enterprise     Published Date: Nov 22, 2011
Seven Steps to Delivering More Secure Software With all the processes that go into making an application more secure. Where do you start? Learn more
Tags : 
application security, cyber-attacks, software security assurance, dast, sast
    
HP - Enterprise

Planning for Disaster and Everyday Threats

White Paper Published By: CenturyLink     Published Date: Nov 18, 2011
Find out how your organization can protect business-critical functions, minimize downtime and mitigate risk.
Tags : 
centurylink, qwest, high speed internet, phone, mobile
    
CenturyLink

Increased Network Complexity Leads to Increased Network Vulnerability

White Paper Published By: AT&T     Published Date: Nov 07, 2011
The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.
Tags : 
network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att
    
AT&T

Increased Network Complexity Leads to Increased Network Vulnerability

White Paper Published By: AT&T     Published Date: Nov 07, 2011
The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.
Tags : 
network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att
    
AT&T

Solution Brief: Top 5 Largest Malware Delivery Networks

White Paper Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.
Tags : 
malware, delivery, protect, security, security solutions
    
Blue Coat Systems UK

Blue Coat 2011 Mid-Year Security Report

White Paper Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses
    
Blue Coat Systems UK

Balancing Social Networking with Network Security Objectives

White Paper Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : 
blue coat, insider threats, security, social media risks, twitter risks
    
Blue Coat Systems UK

The Top Four Business Risks of Social Media

White Paper Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks
    
Blue Coat Systems UK

WebPulse Collaborative Defense: Proactively Defending Your Network Against Malware

White Paper Published By: Blue Coat Systems     Published Date: Oct 25, 2011
The WebPulse delivers fast and effective Web 2.0 threat protection for 75 million users worldwide. Find out more about how WebPulse can protect you!
Tags : 
webpulse, defense, malware, security, protection
    
Blue Coat Systems

Solution Brief: Top 5 Largest Malware Delivery Networks

White Paper Published By: Blue Coat Systems     Published Date: Oct 25, 2011
View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.
Tags : 
malware, delivery, protect, security, security solutions
    
Blue Coat Systems

Beyond Spam: Email Security in the Age of Blended Threats

White Paper Published By: EdgeWave     Published Date: Oct 15, 2011
In this white paper, you'll learn top email threats beyond spam in the age of blended threats and what you can do to protect your business.
Tags : 
web filter for enterprise, web security, email security, messaging security, spam
    
EdgeWave

6 Important Steps to Evaluating a Web Filtering Solution

White Paper Published By: EdgeWave     Published Date: Oct 15, 2011
Today's uncertain economic climate demands that you do a thorough assessment before you invest. Here's a concise list of steps that will help you achieve the best return on your Web filtering dollar.
Tags : 
edgewave, web filter for enterprise, web security, email security, messaging security
    
EdgeWave

E-Policy Best Practices

White Paper Published By: EdgeWave     Published Date: Oct 15, 2011
This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.
Tags : 
e-policy best practices, web filter for enterprise, web security, email security, messaging security
    
EdgeWave

Protecting Users From Firesheep and other Sidejacking Attacks with SSL

White Paper Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Download Protecting Users From Firesheep and other Sidejacking Attacks with SSL to learn how to avoid HTTP attacks.
Tags : 
verisign, firesheep, sidejacking, attacks, security
    
VeriSign Authentication Services, now a part of Symantec Corp.

How to Secure a Moving Target with Limited Resources

White Paper Published By: Secunia     Published Date: Oct 12, 2011
Measurements within this white paper demonstrate that an intelligent patching strategy is an effective approach for reducing vulnerability risks.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security
    
Secunia

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust

White Paper Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 11, 2011
Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive information.
Tags : 
verisign, verisign.com, security, extended validation ssl, authentication
    
VeriSign Authentication Services, now a part of Symantec Corp.

Defending Against Insider Threats To Reduce Your IT risk

White Paper Published By: CA Technologies     Published Date: Sep 29, 2011
Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.
Tags : 
risk, attack, security, business, access control
    
CA Technologies
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.