> Technology > Security > Anti Virus
 

Anti Virus

Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). In the virus dictionary approach, when the antivirus software examines a file, it refers to a dictionary of known viruses that the authors of the antivirus software have identified.
Results 126 - 150 of 518Sort Results By:Published Date | Title | Company Name

Advanced Evasion Techniques for Dummies

White Paper Published By: McAfee     Published Date: Feb 17, 2014
Discover how Advanced Evasions will break the security protection model being used by most organisations and learn how to better protect your business against these attacks.
Tags : 
cyber security, advanced evasion, aets, security, network security
    
McAfee

The Importance of a Next Generation Firewall

White Paper Published By: McAfee     Published Date: Feb 17, 2014
Discover the requirements of a Next Generation Firewall (NGFW) and what capabilities are required in order to protect against the ever evolving threat.
Tags : 
cyber security, advanced evasion, aets, security, network security
    
McAfee

Learn how to Protect Against Advanced Evasion Techniques

White Paper Published By: McAfee     Published Date: Feb 17, 2014
Learn about the weak points in current network security devices and disover the solution in protecting against against advanced hacking methods
Tags : 
cyber security, advanced evasion, aets, security, network security
    
McAfee

A SANS White Paper: SIEM Integration with Endpoint Data for Accuracy and Speed

White Paper Published By: McAfee     Published Date: Jan 28, 2014
SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.
Tags : 
siem, sans, endpoint, network, correlation
    
McAfee

NSS Labs Corporate AV/EPP Comparative Analysis: McAfee Achieves Highest Score in Exploit Protection

White Paper Published By: McAfee     Published Date: Jan 28, 2014
NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.
Tags : 
epp, endpoint, protection, threats, malware
    
McAfee

AV-TEST Proactive Rootkit Protection Comparison: McAfee Achieves Highest Score in Evasion Protection

White Paper Published By: McAfee     Published Date: Jan 28, 2014
AV-TEST preforms a comparative review of McAfee, Microsoft, and Symantec endpoint protection to pro-actively protect against zero-day attacks.
Tags : 
av-test, deep defender, rootkits, detection, anti spam
    
McAfee

BizTech Review: McAfee Endpoint Encryption Locks Down Endpoints

White Paper Published By: McAfee     Published Date: Jan 28, 2014
BizTech reviews McAfee's easy-to-manage endpoint encryption solutions for securing end-user and company data.
Tags : 
endpoint encryption, epolicy orchestrator, drive encryption, anti spam, anti spyware
    
McAfee

Trust the Good, Block the Bad: Optimized Endpoint Security Whitepaper

White Paper Published By: McAfee     Published Date: Jan 28, 2014
Modern malware defenses use layers of blacklisting and whitelisting, enhanced with real-time analysis and reputation data, to protect the endpoint computing stack.
Tags : 
blacklisting, whitelisting, malware, endpoint, mcafee global threat intelligence
    
McAfee

McAfee a Leader in the 2014 Gartner Magic Quadrant for Endpoint Protection Platforms

White Paper Published By: McAfee     Published Date: Jan 28, 2014
Leading analyst firm Gartner has positioned McAfee as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms for six consecutive years.
Tags : 
gartner, endpoint protection, anti spam, anti spyware, anti virus
    
McAfee

Introduction to Web Analytics for E-Commerce: How to Track Activity to Optimize Your Web Site

White Paper Published By: GeoTrust     Published Date: Jan 17, 2014
Analytics can be a powerful tool, so now is a great time to learn more about web metrics. Use this guide to understand the basics of what web analytics are and why they’re important, what metrics you should track, and how you can use this information to optimize your site and encourage customers to visit often and buy more
Tags : 
web analytics, tracking, e-commerce, optimization, web site
    
GeoTrust

Creating an E-commerce Web Site: A Do-It-Yourself Guide

White Paper Published By: GeoTrust     Published Date: Jan 17, 2014
In this guide, you'll learn about what goes into creating your own do-it-yourself (DIY) e-commerce web site, from picking the right tools and services you’ll need to create your web pages, to selecting the best hosting provider and payment solution to fit your business, to figuring out the best security for your site.
Tags : 
e-commerce, shopping cart, hosting provider, payment processor, geotrust true
    
GeoTrust

Internet Security THREAT REPORT 2014

White Paper Published By: Symantec     Published Date: Jan 15, 2014
This year’s ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantec’s security experts. In this summary, we call out seven areas that deserve special attention.
Tags : 
symantec, cyberespionage, mobile security, mobile device security, threat report
    
Symantec

Learn 5 Intelligence-Based Strategies to Protect Your Organization

White Paper Published By: Norse     Published Date: Nov 19, 2013
Learn how your current defenses against cyber-attacks are outdated and how intelligence-based strategies will protect your organization from advanced attacks.
Tags : 
cyber criminal, cyber-attacks, advanced attacks, hackers, network
    
Norse

Ponemon Live Threat Intelligence Impact Report 2013

White Paper Published By: Norse     Published Date: Oct 22, 2013
As cyberattacks and fraud continue to increase in frequency and sophistication, organizations are placing a greater emphasis on cyberthreat intelligence as a way to protect against compromise, data breach, and losses from online fraud. Measuring the true value of threat intelligence has been difficult however. For the first time the Ponemon Institute has conducted a study that reveals the facts behind the impact that weak threat intelligence is having on organizations.
Tags : 
threat, cyber security, impact report, threat intelligence, it security
    
Norse

Learn About the Top Three Mobile Application Threats

White Paper Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn about the three biggest threats to mobile applications and the recommendations on how to mitigate the risk from mobile computing security vulnerabilities
Tags : 
mobile application threats, mobile application, mobile, risk, api
    
HP - Enterprise

How Obrela Keeps Your Business in Business

Case Study Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how Obrela, an Enterprise information security service provider, leveraged HP ArcSight to improve and protect their complex work environment
Tags : 
obrela, hp arcsight, siem, security information, event management solution
    
HP - Enterprise

Surviving the Technical Security Skills Crisis

White Paper Published By: IBM     Published Date: Sep 09, 2013
Read this free whitepaper from Forrester Consulting's recent assessment of the current security skills landscape and what they think is the best way to overcome it
Tags : 
technical security skills, security skills, crisis, forrester consulting, security skills landscape
    
IBM

Mobile Security Guide: Protect Your Organization From Mobile Malware

White Paper Published By: Rapid7     Published Date: Jul 24, 2013
As mobile devices become more common, cybercriminals see them as having huge profit potential, and aim to gain access to the user's confidential personal and financial information. In this Mobile Security Guide, we'll walk you through the mobile malware landscape and what you need to know to keep your organization's data safe.
Tags : 
rapid7, malware, mobile malware, trojan, virus
    
Rapid7

2013 Mobile Malware Report

White Paper Published By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile, malware, security, scams, bluecoat
    
Blue Coat Systems

Your Guide to Defense in Depth

White Paper Published By: CDW     Published Date: Jun 10, 2013
Defense in depth isn't just a product or a process. It’s the constant practice of: protection, detection, and reaction.
Tags : 
cdw, defense in depth, protection, detection, reaction
    
CDW

CDW Malware Video

Webinar Published By: CDW     Published Date: Jun 10, 2013
CDW Malware Video
Tags : 
cdw, security, malware, channel specific protection., anti spam
    
CDW

The Legal and Commercial Risks and Issues to Consider When Managing Emails

White Paper Published By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Director’s agenda.
Tags : 
email archiving, ediscovery, compliance, legal, intrusion prevention
    
Mimecast

Virtual Data Protection Requires New Solutions

White Paper Published By: Dell Software     Published Date: May 28, 2013
Tools and techniques used to protect physical data are no longer sufficient for virtual data assets. How do you know which technology is right for your organization? Let an expert do the work for you: The Buyers’ Guide to Virtual + Physical Data Protection.
Tags : 
dell quest, appassure, data protection, virtual data, physical data protection
    
Dell Software

Network protection and UTM Buyers Guide

Free Offer Published By: Sophos     Published Date: May 09, 2013
This buyers guide is designed to help you choose the right solution for your organization. It looks at the factors you should consider when evaluating solutions to ensure you have the protection and functionality you need, both now and as your business evolves.
Tags : 
network protection, sophos, buyers guide, security, application security
    
Sophos

Mapping Security for Your Virtual Environment

White Paper Published By: HP and Intel ®     Published Date: May 06, 2013
With the gaining popularity of virtualization in today’s enterprise data centers, you need a virtual security solution that allows you to confidently adopt virtualization throughout your data center without compromising on your existing security postures.
Tags : 
virtualization, security, enterprise, data center, virtual security
    
HP and Intel ®
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.