> Technology > Security > Anti Virus
 

Anti Virus

Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). In the virus dictionary approach, when the antivirus software examines a file, it refers to a dictionary of known viruses that the authors of the antivirus software have identified.
Results 201 - 225 of 518Sort Results By: Published Date | Title | Company Name

How Extended Validation SSL Brings Confidence to Online Sales and Transactions

White Paper Published By: Symantec     Published Date: Apr 09, 2012
Symantec Extended Validation (EV) SSL Certificates can be a key factor in helping increase customer confidence during online business transactions. More confidence can mean more conversions for customers with EV SSL certificates.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec

How IT Can Enhance User Productivity with Dynamic Web Repair

White Paper Published By: M86 Security     Published Date: Feb 08, 2011
This white paper discusses a technology that proactively takes security a step further by enabling the safe use of Web 2.0, and therefore, maintaining productivity while mitigating the malware threat altogether.
Tags : 
m86 security, productivity, web repair, malware protection, social networking
    
M86 Security

How It Works: InterScan Messaging Hosted Security Advanced

White Paper Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
According to experts at TrendLabs, spam now makes up close to 95% of all email and continues to grow. In the first three months of 2008 spam rates almost doubled over rates observed at the end of 2007 and TrendLabs predicts that average daily spam volumes will increase by 30 to 50 billion messages per day within the year.1 As spam continues to grow at dramatic rates, traditional on-premise email security products are failing to keep up. This limitation is one of the primary reasons that IDC predicts demand for hosted security solutions -also known as SaaS (Software as a Service) solutions-will grow by more than 30% annually through 2012.2 For context, the growth rate for hosted email security is projected to be more than eight times that of the traditional software email security market, and more than 60% faster than appliance-based email security solutions.
Tags : 
saas, trend, trend micro, software as a service, trendlabs
    
Trend Micro SaaS

How MWL Fights eThreats

White Paper Published By: Microworld     Published Date: Dec 12, 2007
MicroWorld Winsock Layer (MWL) is a radical technology that fights viruses and other threats from a new perspective. Developed by MicroWorld Technologies Inc., MWL blocks threats at the Internet gateway itself and does not allow them to enter your system. This article discusses features of MWL and explains how it does its anti virus and content security tasks, efficiently and quietly.
Tags : 
winsock, ethreats, e-threats, malware, email security
    
Microworld

How Obrela Keeps Your Business in Business

Case Study Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how Obrela, an Enterprise information security service provider, leveraged HP ArcSight to improve and protect their complex work environment
Tags : 
obrela, hp arcsight, siem, security information, event management solution
    
HP - Enterprise

How to Defend Your Perimeter from Today's Outsized Threats

White Paper Published By: Akamai     Published Date: Mar 10, 2012
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Tags : 
security, internet security, website security, online security, cloud based security
    
Akamai

HOW TO MANAGE SOCIAL MEDIA RISKS IN 2011 AND BEYOND - sponsored by McAfee and CommVault

Webinar Published By: Osterman Research, Inc.     Published Date: Aug 01, 2011
A recent survey by Osterman Research has confirmed that social media usage by employees has dramatically increased over the past few years. In short, you will leave this Webinar with a better understanding of the usage, trends, and diverse risks posed by social media.
Tags : 
osterman research, social media, commvault, mcafee, live event
    
Osterman Research, Inc.

How to Protect Your Business from the Coming Malware Storm

White Paper Published By: Webroot     Published Date: Jul 08, 2011
This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service.
Tags : 
webroot, saas, security as a service, computer security software, antispyware software
    
Webroot

How to Protect Your Organization Against Advanced Persistent Threats

White Paper Published By: M86 Security     Published Date: Nov 01, 2010
This paper will outline the evolution of APTs, explain the motivation behind them, and determine best practices for defending against these threats.
Tags : 
m86 security, threats, best practices, phishing, vulnerability
    
M86 Security

How to Secure a Moving Target with Limited Resources

White Paper Published By: Secunia     Published Date: Oct 12, 2011
Measurements within this white paper demonstrate that an intelligent patching strategy is an effective approach for reducing vulnerability risks.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security
    
Secunia

How to Simplify PCI DSS Compliance with AlienVault USM

Webinar Published By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common PCI DSS compliance challenges, questions to ask as you plan and prepare, core capabilities needed to demonstrate compliance, and how to simplify compliance with a unified approach to security
Tags : 
pci, dss, compliance, alienvault, security management
    
AlienVault

How to spot rogue anti-malware products: What you need to know before you click

White Paper Published By: GFI Software     Published Date: Feb 24, 2012
There are hundreds of rogue anti-malware products on the Internet that infect PCs rather than detect malware. Learn how these scams look and work and how to prevent your computer from becoming infected.
Tags : 
gfi software, technology, security, malware, internet security
    
GFI Software

How to Survive When Information Security Fails

White Paper Published By: Forrester Research     Published Date: Apr 27, 2015
Download the report to learn how to prepare an Incident Response Plan that ensures your business recovers quickly and effectively.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks
    
Forrester Research

How to Win the Battle Against Spyware with Next Generation Technology

White Paper Published By: Process Software     Published Date: May 14, 2008
Spyware is on the rise and has been the cause of many data breaches. Stopping it needs to be a strategic part of an organization's overall security plan. Reactive signature-based anti-virus and firewall technology is not a complete solution to prevention. Read this white paper to learn the top five behaviors associated with data theft and how advanced behavioral detection solutions is an effective technology for stopping spyware and can identify and prevent legitimate applications from being misused.
Tags : 
spyware, trojan, virus, malware, web security
    
Process Software

How Traditional Firewalls Fail Today's Network

White Paper Published By: Dell SonicWALL     Published Date: Nov 28, 2012
Why your current firewall may be jeopardizing your security
Tags : 
firewall security, dell, dell sonicwall, sonicwall, security intelligence
    
Dell SonicWALL

IBM Identity and Access Management—the key to secure access of your assets.

White Paper Published By: IBM     Published Date: Jun 16, 2009
As products go to market quicker, employees, customers, and business partners need the ability to collaborate and access business data—when, where, and how ever they choose. Watch this illustrated demo to see how IBM offers a smarter, business-driven approach to Identity and Access Management. And how IBM’s extensive integration capabilities can enhance productivity without compromising security.
Tags : 
identity, access management, secure, ibm, mmdg
    
IBM

Identity Enabled Web Services: Standards-based identity for Web 2.0

White Paper Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled
    
Ping Identity

Increased Network Complexity Leads to Increased Network Vulnerability

White Paper Published By: AT&T     Published Date: Nov 07, 2011
The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.
Tags : 
network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att
    
AT&T

Increased Network Complexity Leads to Increased Network Vulnerability

White Paper Published By: AT&T     Published Date: Nov 07, 2011
The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.
Tags : 
network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att
    
AT&T

Increasing Performance in Enterprise Antimalware Software

White Paper Published By: GFI Software     Published Date: Feb 24, 2011
This white paper discusses the risks to business operations that are created as a result of this performance degradation.
Tags : 
gfi software, sunbelt, performance degradation, enterprise antimalware software, anti spam
    
GFI Software

Industry Experts Speak Out: The Network Performance and Security Trade-Off

White Paper Published By: McAfee     Published Date: Jan 20, 2015
Industry experts discuss the common and risky tradeoff many organizations are forced to make between network performance and security.
Tags : 
next generation firewall, network performance, mcafee next generation firewall, ngfw, anti spyware
    
McAfee

Industry Experts Speak Out: The Network Performance and Security Trade-Off

White Paper Published By: McAfee     Published Date: Feb 25, 2015
This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.
Tags : 
network performance, security trade-off, security, firewalls, mcafee
    
McAfee

Infographic: Insights from the 2012 Global Reputational Risk and IT Study

White Paper Published By: IBM     Published Date: Jan 23, 2013
How security, business continuity, and technical support can shape the reputation and value of your company
Tags : 
reputational risk, business continuity, risk management, cloud, social media
    
IBM

Infonetics Research 2012 DDoS Prevention Appliance Report

White Paper Published By: Arbor Networks     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : 
ddos, cyber attacks, research, enterprise, mobile
    
Arbor Networks

Information Security is Becoming a Big Data Analytics Problem

Free Offer Published By: McAfee     Published Date: Feb 06, 2013
Gartner defines "big data analytics" as the practices and technology used to pursue emerging and divergent pattern detection as well as enhance the use of previously disconnected information assets.
Tags : 
big data analytics, gartner, big data, big security data, advanced targeted attacks
    
McAfee
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.