> Technology > Security > Anti Virus
 

Anti Virus

Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). In the virus dictionary approach, when the antivirus software examines a file, it refers to a dictionary of known viruses that the authors of the antivirus software have identified.
Results 326 - 350 of 518Sort Results By: Published Date | Title | Company Name

Protecting Against the New Wave of Malware

White Paper Published By: GFI Software     Published Date: Feb 24, 2011
This white paper, sponsored by GFI Software, addresses the variety of issues facing organizations today in the context of their system management challenges, and discusses the capabilities of VIPRE Antivirus Business, an integrated platform that provides high performance, integrated endpoint protection capabilities.
Tags : 
gfi software, sunbelt, malware protection, system management, threats
    
GFI Software

Increasing Performance in Enterprise Antimalware Software

White Paper Published By: GFI Software     Published Date: Feb 24, 2011
This white paper discusses the risks to business operations that are created as a result of this performance degradation.
Tags : 
gfi software, sunbelt, performance degradation, enterprise antimalware software, anti spam
    
GFI Software

Security Considerations for SMBs

White Paper Published By: GFI Software     Published Date: Feb 24, 2011
The goal of this guide is to raise awareness in organizations of the importance of security and how they can deal with the threats.
Tags : 
gfi software, sunbelt, security consideration, small and medium-sized enterprises, threats
    
GFI Software

Malware Security Report: Protecting Your Business, Customers and the Bottom Line

White Paper Published By: VeriSign     Published Date: Feb 10, 2011
This white paper will help you understand the threat from malware and how it can impact your online business.
Tags : 
verisign, malware security, data protection, anti spam, anti spyware
    
VeriSign

Protecting Your Code Updates: How to Defend Against SSL Spoofing Attacks

White Paper Published By: VeriSign     Published Date: Feb 10, 2011
This paper will show how code signing works, how attacks can be mounted against unsigned software, (including autoupdate software), and how real-world signing systems protect software vendors, enterprises and end users.
Tags : 
verisign, ssl spoofing attack, code protection, security, code signing certificates
    
VeriSign

The Insider Threat

White Paper Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This short white paper will examine some of the important aspects of insider threat and will offer some guidance on how to reduce the risk.
Tags : 
credant technologies, insider threat, risk management, security, encryption
    
CREDANT Technologies

Removable Media Best Practices: Business-aligned Security Strategies and Advice

White Paper Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This two-part whitepaper will address some of the best practice approaches that you may wish to evaluate and potentially adopt in order to reduce the risk of USB devices becoming the source of a significant leak or virus infection.
Tags : 
credant technologies, removable media, best practices, security, usb device
    
CREDANT Technologies

How IT Can Enhance User Productivity with Dynamic Web Repair

White Paper Published By: M86 Security     Published Date: Feb 08, 2011
This white paper discusses a technology that proactively takes security a step further by enabling the safe use of Web 2.0, and therefore, maintaining productivity while mitigating the malware threat altogether.
Tags : 
m86 security, productivity, web repair, malware protection, social networking
    
M86 Security

The Business Value of DDoS Protection

White Paper Published By: Arbor Networks     Published Date: Feb 04, 2011
Download this paper to learn how to evaluate your risk vs. the expected returns from investing in a DDoS defense solution.
Tags : 
ddos protection, arbor networks, dns, domain name system, distributed denial of service
    
Arbor Networks

Finding an Effective Antivirus Solution to Please Users and Administrators

White Paper Published By: ESET, LLC.     Published Date: Jan 18, 2011
Download this Tech Brief to learn the five common complaints IT professionals have with antivirus software and how you can find software that does the job right.
Tags : 
eset, antivirus software, malware, it professional, security
    
ESET, LLC.

Address the Insider Threat of Privileged Users

White Paper Published By: NetIQ     Published Date: Jan 12, 2011
Addressing the potential for insider threats is an often overlooked security imperative for virtually all organizations worldwide.
Tags : 
netiq, insider threat, security, audits, access control
    
NetIQ

Reshaping Your Endpoint Management and Security Strategy

White Paper Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Critical IT operations require solutions that are architected for today. Solutions that take a new look at modern technology, modern threats, and modern business reality. Read this white paper for more information.
Tags : 
shavlik, endpoint management, security strategy, it operation, threats
    
Shavlik Technologies

IT.Shavlik.com Enhances Hosted Service Offerings and Empowers SMBs

White Paper Published By: Shavlik Technologies     Published Date: Dec 14, 2010
DBSi recognized a need for more robust systems management and were seeking a single vendor with broad-reaching capabilities that could be leveraged across their entire customer base.
Tags : 
shavlik security, dbsi, hosted service, smbs, systems management
    
Shavlik Technologies

Gain Visibility and Efficiency in System Protection through Automated Patch Management

White Paper Published By: Shavlik Technologies     Published Date: Dec 14, 2010
Whalen Furniture needed an improved patch management solution that was more efficient, less time consuming, reduced risk, and ensured uptime on a 24/7 basis to support the needs of a rapidly growing global company.
Tags : 
shavlik security, system protection, automated patch management, risk, antivirus
    
Shavlik Technologies

Six Steps to Effective Web Security

White Paper Published By: M86 Security     Published Date: Dec 01, 2010
This white paper addresses the risks that concern IT security professionals, many of which they feel powerless to control.
Tags : 
m86 security, web security, malware protection, web 2.0 application, information exchange
    
M86 Security

Three Ways to Prevent USB Insecurity in Your Enterprise

White Paper Published By: Lumension     Published Date: Nov 19, 2010
Learn how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
Tags : 
lumension security, usb insecurity, universal serial bus, enterprise, policy
    
Lumension

3 Ways To Reduce Third-Party Application Risk and Strategies to Protect Endpoints

White Paper Published By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : 
lumension, endpoint, risk management, server operating system, third-party application
    
Lumension

Real Time Code Analysis: Proactive Protection Against Malware Threats

White Paper Published By: M86 Security     Published Date: Nov 02, 2010
This white paper examines the Crimeware industry and the Web-based methods currently used to sustain cybercrime.
Tags : 
m86 security, real-time code analysis, malware threats, cybercrime, anti-virus
    
M86 Security

How to Protect Your Organization Against Advanced Persistent Threats

White Paper Published By: M86 Security     Published Date: Nov 01, 2010
This paper will outline the evolution of APTs, explain the motivation behind them, and determine best practices for defending against these threats.
Tags : 
m86 security, threats, best practices, phishing, vulnerability
    
M86 Security

The Hidden Menace of Embedded Links

White Paper Published By: Symantec.cloud     Published Date: Sep 28, 2010
Recently, a new worm, commonly known as "here you have" used old mass-mailer techniques to spread rapidly across the Internet, effectively shutting down the email servers of many large companies.
Tags : 
messagelabs, symantec hosted services, embedded links, worm, security
    
Symantec.cloud

Calculating the Cost: Email Threats & Financial Risks

White Paper Published By: Symantec.cloud     Published Date: Sep 14, 2010
Understand the extent of the costs you risk incurring if you have either no or inadequate protection in place.
Tags : 
symantec.cloud, messagelabs symantec hosted services, email threat, email security, hacking
    
Symantec.cloud

Test Data Privacy Is Critical To Meet Compliances - Data Masking Can Help Protect Test Data

White Paper Published By: IBM     Published Date: Aug 30, 2010
All enterprises dealing with private data in test environments should mask or generate test data to comply with regulations such as Payment Card Industry (PCI), the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley (SOX), and European Union (EU) as well as to protect against internal and external attacks.
Tags : 
ibm, test data privacy, compliance, data masking, payment card industry
    
IBM

Free Trial of NOD32 Business Edition Anti-Virus Software

Free Offer Published By: Software Security Solutions     Published Date: Aug 23, 2010
ESET NOD32 Centrally Managed Business Edition. The Thinking Person's Solution.
Tags : 
software security, eset business edition, free trial, anti-virus software, smb
    
Software Security Solutions

3 Strategies to Protect Endpoints from Risky Applications

White Paper Published By: Lumension     Published Date: Aug 15, 2010
Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment.
Tags : 
cyber security, application security, risk management, third party applications, endpoint security
    
Lumension

Bandwidth Bandits

White Paper Published By: Symantec.cloud     Published Date: Aug 10, 2010
This paper will discuss how the Internet bandwidth is a finite and expensive resource that needs protection from spammers, criminals, hackers, time-wasters and employee misuse.
Tags : 
messagelabs us, symantec hosted services, internet bandwidth, security, data protection
    
Symantec.cloud
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.