> Technology > Security > Anti Virus
 

Anti Virus

Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). In the virus dictionary approach, when the antivirus software examines a file, it refers to a dictionary of known viruses that the authors of the antivirus software have identified.
Results 351 - 375 of 518Sort Results By: Published Date | Title | Company Name

Real Time Code Analysis: Proactive Protection Against Malware Threats

White Paper Published By: M86 Security     Published Date: Nov 02, 2010
This white paper examines the Crimeware industry and the Web-based methods currently used to sustain cybercrime.
Tags : 
m86 security, real-time code analysis, malware threats, cybercrime, anti-virus
    
M86 Security

Real-Time Protection for Business-Critical Databases, and Compliance Without Downtime

White Paper Published By: McAfee     Published Date: Mar 08, 2013
With McAfee® Database Security, achieving protection and compliance is easier than you might think.
Tags : 
database security, database audit, database compliance, cert, database security policy
    
McAfee

Real-world Attack Case Study: Misuse of Keys and Certificates Bypass Critical Security Controls

Case Study Published By: Venafi     Published Date: Aug 10, 2015
This paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches.
Tags : 
attacks, cyberattacks, protect certificates, how to remediate breaches, security
    
Venafi

Recent Advancements in SSL-based Security Solutions

White Paper Published By: VeriSign     Published Date: Feb 10, 2011
This paper reveals the latest advances in SSL technology and how these advances ensure your customers have confidence in the security of your site, as well as protecting them from threats such as phishing, data manipulation and other site scams.
Tags : 
verisign, ssl, security, phishing, data manipulation
    
VeriSign

Reducing Local Admin Exposure Through Application Whitelisting

White Paper Published By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss
    
Lumension

Reducing the Cost and Complexity of Web Vulnerability Management

White Paper Published By: Symantec     Published Date: Apr 09, 2012
Download this white paper, to learn how you can reduce the risk of hackers finding your site and attacking it by using automated vulnerability assessments to identify exploitable weaknesses and take corrective action.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec

Removable Media Best Practices: Business-aligned Security Strategies and Advice

White Paper Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This two-part whitepaper will address some of the best practice approaches that you may wish to evaluate and potentially adopt in order to reduce the risk of USB devices becoming the source of a significant leak or virus infection.
Tags : 
credant technologies, removable media, best practices, security, usb device
    
CREDANT Technologies

Removing the Complexity and Guesswork from Your PKI Refresh

White Paper Published By: Venafi     Published Date: Aug 07, 2015
Public key infrastructure (PKI) is the foundation of today’s enterprise security. But most PKI lacks central visibility, consistent processes, and refresh progress validation.
Tags : 
pki refresh, public key infrastructure, system errors, system updates, automated key securit
    
Venafi

Reshaping Your Endpoint Management and Security Strategy

White Paper Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Critical IT operations require solutions that are architected for today. Solutions that take a new look at modern technology, modern threats, and modern business reality. Read this white paper for more information.
Tags : 
shavlik, endpoint management, security strategy, it operation, threats
    
Shavlik Technologies

Rethinking Security: Fighting Known, Unknown, and Advanced Threats

White Paper Published By: Kaspersky     Published Date: Nov 12, 2014
Download Kaspersky Lab’s latest eBook, Rethinking Security: Fighting Known, Unknown, and Advanced Threats, to learn more about the evolution of cyberthreats that put your business at risk.
Tags : 
kaspersky, cybersecurity, cyberattack, hackers, it security
    
Kaspersky

SaaS with a Face

White Paper Published By: Mimecast     Published Date: Apr 04, 2013
User Satisfaction in Cloud-Based E-mail Management with Mimecast
Tags : 
saas, cloud, email, email management, email provider
    
Mimecast

Safe Email - 7 Important Tips for Better Email Security in 2009

White Paper Published By: Webroot UK     Published Date: Nov 11, 2009
This report highlights ways Best-in-Class organizations harden themselves against threats from email.
Tags : 
webroot, email security, threats, spam, data security policy
    
Webroot UK

Safer Online Payments: Small business Payment Survival Guide.

White Paper Published By: Worldpay     Published Date: Apr 29, 2015
In 2014, the UK saw online sales exceed £10bn per month. For small businesses, getting online is a great way to increase revenue. However, there’s no escaping the fact that small e-retailers are most at risk of suffering a data breach and that breaches are increasing. It is your responsibility to keep the card payment data of your customers safe and a failure to secure your systems could be a costly mistake which leads to penalty fines, lost custom and bad publicity. Worldpay is the leading payments provider in the UK and Europe. Whilst Worldpay has fewer businesses suffering data breaches, compared to our market size, we have a unique oversight on most UK card data breaches. We have compiled our insight and advice into this guide so all businesses, new or old, can ensure they are prepared.
Tags : 
ecommerce, payments, online payments, small business, fraud
    
Worldpay

Search Engine Link Spam: Risks,Threats,Solution

White Paper Published By: Symantec.cloud     Published Date: Jan 28, 2011
In this new MessageLabs whitepaper, learn about the latest spammer ploy to get dangerous links past traditional defenses, and how MessageLabs delivers a proven, cost-effective solution.
Tags : 
symantec cloud, search engine link spam, messagelabs, viruses, trojans
    
Symantec.cloud

Secure By Design with Citrix

White Paper Published By: Citrix Systems     Published Date: Apr 15, 2015
This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity.
Tags : 
citrix, desktop virtualization, efficiency, virtualization, mobile computing
    
Citrix Systems

Secure Email Gateways

Free Offer Published By: Mimecast     Published Date: Apr 04, 2013
The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention capability, encryption and better protection from targeted phishing attacks.
Tags : 
email, security, dlp, data loss prevention, encryption
    
Mimecast

Secure Internet Single Sign-On 101

White Paper Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled
    
Ping Identity

Secure Your Fixed Function Devices

White Paper Published By: McAfee     Published Date: Feb 06, 2013
Protect fixed-function devices from threats, including zero-day attacks and other forms of malware, and prevent system downtime, control costs, and ultimately extend the life of devices.
Tags : 
fixed function device security, fixed function devices, pos systems, pos system security, atm security
    
McAfee

Securing the cloud - the need for robust security and SLAs

White Paper Published By: The Bunker     Published Date: Nov 30, 2010
What questions should an organization ask about security and availability when contemplating a cloud computing model
Tags : 
cloud, security, data centre, sla, continuity
    
The Bunker

Securing the Mobile App Market

White Paper Published By: Symantec     Published Date: Apr 04, 2013
How Code Signing Can Bolster Security for Mobile Applications
Tags : 
code signing, mobile, apps, applications, mobile applications
    
Symantec

Securing Your Private Keys As Best Practice for Code Signing Certificates

White Paper Published By: Symantec     Published Date: Apr 04, 2013
Stuxnet, a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?
Tags : 
code signing, cyber attack, anti-virus, intrusion prevention, private keys
    
Symantec

Securing Your Software for the Mobile Application Market

Software Download Published By: Symantec     Published Date: Apr 04, 2013
In this business guide, we discuss how the latest code signing technology works to secure software code and content for applications that are directly downloaded to mobile devices from the Internet.
Tags : 
code signing, mobile, apps, applications, mobile applications
    
Symantec

Security and Trust: The Backbone of Doing Business Over the Internet

White Paper Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
Download this white paper to learn about the importance of delivering a secure and trustworthy online experience.
Tags : 
verisign, security, trustworthy online experience, secure, trust
    
VeriSign, Inc.

Security as a Service: Business Decision Factors

White Paper Published By: Webroot     Published Date: Jul 08, 2011
This paper reviews the business value of IT security, illustrates the business case for SaaS over "do it yourself" premise-based solutions, and outlines what to look for in SaaS solutions you can adopt with confidence and count on as you grow.
Tags : 
webroot, saas, security as a service, computer security software, antispyware software
    
Webroot

Security Considerations for SMBs

White Paper Published By: GFI Software     Published Date: Feb 24, 2011
The goal of this guide is to raise awareness in organizations of the importance of security and how they can deal with the threats.
Tags : 
gfi software, sunbelt, security consideration, small and medium-sized enterprises, threats
    
GFI Software
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.