> Technology > Security > Anti Virus
 

Anti Virus

Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). In the virus dictionary approach, when the antivirus software examines a file, it refers to a dictionary of known viruses that the authors of the antivirus software have identified.
Results 351 - 375 of 518Sort Results By: Published Date | Title | Company Name

Web threats in 2010

White Paper Published By: Symantec.cloud     Published Date: Jul 06, 2010
Read our white paper to understand the changing web threat in 2010 & equip your business to defend against it.
Tags : 
messagelabs symantec, web threat, malware, threat detection, web security services
    
Symantec.cloud

News Spam: Behind the Headlines

White Paper Published By: MessageLabs Ltd.     Published Date: Jun 10, 2010
With huge volumes of spam circulating the internet and news spam making up a big proportion of this potentially business-compromising threat, your organisation needs to ensure it has effective protection in place.
Tags : 
messagelabs symantec, security safeguard, email spam, malware, anti spam
    
MessageLabs Ltd.

Top 10 Web Threats and How to Eliminate Them

White Paper Published By: MessageLabs Ltd.     Published Date: Jun 10, 2010
Based on a survey of 273 IT managers, we reveal the top ten web threats to business and outline a solution that uses MessageLabs Security Safeguard, why they matter and how to protect your business from each of them.
Tags : 
messagelabs symantec, web threat, security safeguard, malware, web security services
    
MessageLabs Ltd.

IT Security: A step by step guide for growing businesses

White Paper Published By: MessageLabs Ltd.     Published Date: Jun 10, 2010
Read our latest whitepaper & create a step-by-step approach to IT security that will work for your business.
Tags : 
messagelabs symantec, it security, malware, security management, anti spam
    
MessageLabs Ltd.

Top 10 Web Security Threats

White Paper Published By: Symantec.cloud     Published Date: Apr 27, 2010
We surveyed 273 managers in IT & our research reveals the Top 10 Web Security Threats; And How to Solve Them.
Tags : 
messagelabs symantec, web security threat, malware, bandwidth, bandwidth management
    
Symantec.cloud

IT Security Essentials: A Step-by-Step Guide

White Paper Published By: Symantec.cloud     Published Date: Apr 27, 2010
Create a step-by-step approach to IT security that will work for your business.
Tags : 
messagelabs hosted symantec, it security, smb, malware, small business networks
    
Symantec.cloud

Event driven spam: Are your defences ready?

White Paper Published By: Symantec.cloud     Published Date: Apr 27, 2010
Spammers reach new heights of inventiveness and professionalism. Understand the latest spam threat.
Tags : 
messagelabs intelligence, symantec hosted services, spam threat, web security services, security safeguard
    
Symantec.cloud

Proofpoint MLX: Machine Learning to Beat Spam Today and Tomorrow

White Paper Published By: Proofpoint     Published Date: Apr 22, 2010
This whitepaper explains how Proofpoint MLX technology provides unrivalled defense against spam.
Tags : 
proofpoint mlx, spam detection, email security, phishing attack, saas
    
Proofpoint

Comparing price/performance: WatchGuard vs. Juniper, Fortinet, Cisco, and SonicWall

White Paper Published By: WatchGuard Technologies     Published Date: Apr 21, 2010
Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming.
Tags : 
watchguard technologies, unified threat management, utm, network humming, security
    
WatchGuard Technologies

10 questions to ask before you buy an anti-spam solution

White Paper Published By: WatchGuard Technologies     Published Date: Apr 21, 2010
With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision.
Tags : 
watchguard technologies, anti spam, security, tco, xcs
    
WatchGuard Technologies

Security from Above - How Cloud-based Security Delivers Up-to-the-Minute Network Protection

White Paper Published By: WatchGuard Technologies     Published Date: Apr 21, 2010
Read this white paper for a look at how and why the latest generation of in-the-cloud security really does deliver big dividends for your organization's network security posture.
Tags : 
watchguard technologies, cloud-based security, protection, network security, malware threats
    
WatchGuard Technologies

Email on Cruise Control: How to Guarantee Security, Speed and Confidence in Email

White Paper Published By: Symantec.cloud     Published Date: Apr 15, 2010
Keeping email secure and available is a complex and daunting task. Learn how a hosted solution can provide secure and available email
Tags : 
messagelabs symantec hosted services, email, security, botnets, anti virus
    
Symantec.cloud

The changing nature of Web security threats

White Paper Published By: Webroot UK     Published Date: Mar 22, 2010
This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.
Tags : 
webroot, web security threat, remote access, malware, viruses
    
Webroot UK

What the ideal cloud-based web security service should provide

White Paper Published By: Webroot UK     Published Date: Mar 22, 2010
The components required of an effective web security solution are many and varied, including a range of tools that guard against specific types of threats
Tags : 
webroot, web security service, cloud computing, web threats, business process automation
    
Webroot UK

The Top Ten Threats for January 2010 at a Glance

White Paper Published By: ESET     Published Date: Feb 17, 2010
Analysis of ESET's ThreatSense.Net®, a sophisticated malware reporting and tracking system, shows that the highest number of detections this month, with almost 9.90%, was the Win32/Conficker class of threat.
Tags : 
eset, threats, malware reporting, tracking system, win32/conficker
    
ESET

Top Computer Threats in the United Kingdom - January 2010

White Paper Published By: ESET     Published Date: Feb 17, 2010
View this ESET Monthly UK threat report to find out the top computer threats in the UK.
Tags : 
eset, computer threats, threatsense.net, virus lab, malware
    
ESET

Understanding and Teaching Heuristics

White Paper Published By: ESET     Published Date: Feb 17, 2010
This paper is designed to provide a basic understanding of what heuristics are and how they are used in the anti-malware industry.
Tags : 
eset, teaching heuristics, anti-malware, encryption, polymorphism
    
ESET

2010: Cybercrime Coming of Age

White Paper Published By: ESET     Published Date: Feb 11, 2010
This document combines the thoughts of both Research teams in ESET Latin America and ESET, LLC into a single paper, proposing a comprehensive vision of how the threatscape is likely to evolve in 2010.
Tags : 
eset, cybercrime, security, threat, crimeware
    
ESET

Cyberwarfare and the enterprise: Is the threat real?

White Paper Published By: ESET     Published Date: Feb 11, 2010
Why all the hype? Is cyberwarfare really something enterprise information security professionals should be concerned about? It's hard to know what the next cyber crisis will be, but here are a few best practices that enterprise security teams should consider to avoid becoming victims.
Tags : 
eset, cyberwarfare, threat, enterprise information security, botnet
    
ESET

Windows Mobile security tips for the on-the-go pro series - Part 2 of 3

White Paper Published By: Microsoft Windows Phone     Published Date: Feb 05, 2010
Part 2 - Security tools that can boost Windows mobile security. Take a look at this list of security tools, as put together by Windows security expert Kevin Beaver.
Tags : 
microsoft, windows phone, mobile security, security tools, smartphone
    
Microsoft Windows Phone

The Tangled Web: Silent Threats and Invisible Enemies

White Paper Published By: Symantec.cloud     Published Date: Feb 03, 2010
The emergence of covert information theft as a key tactic of malware propagators. Most importantly, the paper highlights the crucial danger points for any business that doesn't defend itself against viruses which operate in the background.
Tags : 
messagelabs intelligence, symantec hosted services, security threat, spyware, botnets
    
Symantec.cloud

Free but Fake: Rogue Anti-malware

White Paper Published By: ESET     Published Date: Jan 21, 2010
Unfortunately, people are frequently seduced by the word "free" and overestimate the supposed benefits such products offer. In order to illustrate this type of malicious methodology, the case of a rogue product is analyzed here.
Tags : 
eset, rogue anti-malware, security, antivirus, spyware
    
ESET

The Game of the Name - Malware Naming, Shape Shifters and Sympathetic Magic

White Paper Published By: ESET     Published Date: Jan 21, 2010
3rd International Conference on Cybercrime Forensics Education & Training. What is the information that the end-user or end-site really needs to know about an incoming threat?
Tags : 
eset, internet security, cybercrime, threat, malware
    
ESET

ESET Monthly Threat Report for the United Kingdom: December 2009

White Paper Published By: ESET     Published Date: Jan 08, 2010
This report provides a report of the Top Computer Threats in the United Kingdom.
Tags : 
eset, monthly threat report, top computer threat, security, anti spam
    
ESET

2010 Threat Predictions

White Paper Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats
    
McAfee
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.