Anti Virus White Papers

Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). In the virus dictionary approach, when the antivirus software examines a file, it refers to a dictionary of known viruses that the authors of the antivirus software have identified.
Results 226 - 250 of 418Sort Results By: Published Date | Title | Company Name
By: Symantec.cloud     Published Date: Mar 02, 2011

Most companies already have an endpoint security solution in place. But a single security product is not sufficient to address the challenges of securing and managing the endpoint. This paper explains how a hosted endpoint solution can help.

Tags : symantec.cloud, messagelabs, endpoint security, security threats, anti spam, anti spyware, anti virus, security management
    
By: GFI Software     Published Date: Feb 24, 2011

Read the results of a survey focused on enterprise antivirus users and discover why customers love VIPRE Antivirus Business.

Tags : gfi software, sunbelt, vipre business, antivirus solution, security, enterprise antivirus survey, anti spam, anti spyware
    
By: GFI Software     Published Date: Feb 24, 2011

This white paper, sponsored by GFI Software, addresses the variety of issues facing organizations today in the context of their system management challenges, and discusses the capabilities of VIPRE Antivirus Business, an integrated platform that provides high performance, integrated endpoint protection capabilities.

Tags : gfi software, sunbelt, malware protection, system management, threats, endpoint infrastructure, viruses, worms
    
By: GFI Software     Published Date: Feb 24, 2011

This white paper discusses the risks to business operations that are created as a result of this performance degradation.

Tags : gfi software, sunbelt, performance degradation, enterprise antimalware software, anti spam, anti spyware, anti virus, application performance management
    
By: GFI Software     Published Date: Feb 24, 2011

The goal of this guide is to raise awareness in organizations of the importance of security and how they can deal with the threats.

Tags : gfi software, sunbelt, security consideration, small and medium-sized enterprises, threats, security, anti spam, anti spyware
    
By: VeriSign     Published Date: Feb 10, 2011

This white paper will help you understand the threat from malware and how it can impact your online business.

Tags : verisign, malware security, data protection, anti spam, anti spyware, anti virus, security management
    
By: VeriSign     Published Date: Feb 10, 2011

This paper will show how code signing works, how attacks can be mounted against unsigned software, (including autoupdate software), and how real-world signing systems protect software vendors, enterprises and end users.

Tags : verisign, ssl spoofing attack, code protection, security, code signing certificates, malicious software, anti spam, anti spyware
    
By: CREDANT Technologies     Published Date: Feb 10, 2011

This short white paper will examine some of the important aspects of insider threat and will offer some guidance on how to reduce the risk.

Tags : credant technologies, insider threat, risk management, security, encryption, vulnerability, anti spam, anti spyware
    
By: CREDANT Technologies     Published Date: Feb 10, 2011

This two-part whitepaper will address some of the best practice approaches that you may wish to evaluate and potentially adopt in order to reduce the risk of USB devices becoming the source of a significant leak or virus infection.

Tags : credant technologies, removable media, best practices, security, usb device, corporate governance, virus infection, anti spam
    
By: M86 Security     Published Date: Feb 08, 2011

This white paper discusses a technology that proactively takes security a step further by enabling the safe use of Web 2.0, and therefore, maintaining productivity while mitigating the malware threat altogether.

Tags : m86 security, productivity, web repair, malware protection, social networking, web 2.0, erp, crm
    
By: Arbor Networks     Published Date: Feb 04, 2011

Download this paper to learn how to evaluate your risk vs. the expected returns from investing in a DDoS defense solution.

Tags : ddos protection, arbor networks, dns, domain name system, distributed denial of service, botnet, ddos defense solution, roi calculation
    
By: Astaro     Published Date: Jan 19, 2011

Botnets are based on similar principles as legitimate clouds, but serve malicious business interests. Find out more about how botnets work and the right steps after having detected infected machines within your own network.

Tags : astaro, cloud computing, botnets, network, security, network management, anti spam, anti spyware
    
By: ESET, LLC.     Published Date: Jan 18, 2011

Download this Tech Brief to learn the five common complaints IT professionals have with antivirus software and how you can find software that does the job right.

Tags : eset, antivirus software, malware, it professional, security, anti spam, anti spyware, anti virus
    
By: NetIQ     Published Date: Jan 12, 2011

Addressing the potential for insider threats is an often overlooked security imperative for virtually all organizations worldwide.

Tags : netiq, insider threat, security, audits, access control, enterprise software, anti spam, anti spyware
    
By: Shavlik Technologies     Published Date: Dec 15, 2010

Critical IT operations require solutions that are architected for today. Solutions that take a new look at modern technology, modern threats, and modern business reality. Read this white paper for more information.

Tags : shavlik, endpoint management, security strategy, it operation, threats, sensitive data, data center, hacker
    
By: Shavlik Technologies     Published Date: Dec 14, 2010

DBSi recognized a need for more robust systems management and were seeking a single vendor with broad-reaching capabilities that could be leveraged across their entire customer base.

Tags : shavlik security, dbsi, hosted service, smbs, systems management, patch deployment, antivirus, mobile workforce
    
By: Shavlik Technologies     Published Date: Dec 14, 2010

Whalen Furniture needed an improved patch management solution that was more efficient, less time consuming, reduced risk, and ensured uptime on a 24/7 basis to support the needs of a rapidly growing global company.

Tags : shavlik security, system protection, automated patch management, risk, antivirus, patch deployment, manufacturing, anti virus
    
By: M86 Security     Published Date: Dec 01, 2010

This white paper addresses the risks that concern IT security professionals, many of which they feel powerless to control.

Tags : m86 security, web security, malware protection, web 2.0 application, information exchange, collaboration, business enablement, anti spam
    
By: Lumension     Published Date: Nov 19, 2010

Learn how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.

Tags : lumension security, usb insecurity, universal serial bus, enterprise, policy, risk mitigation, productivity tool, data loss
    
By: Lumension     Published Date: Nov 18, 2010

No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.

Tags : lumension, endpoint, risk management, server operating system, third-party application, protection, anti virus, malware
    
By: Google Apps     Published Date: Nov 05, 2010

This paper will explain the ways Google creates a security-based platform for offering its Google Apps products, covering topics like information security, physical security and operational security.

Tags : messaging, collaborate, collaboration, security, google security, google apps, anti spam, anti spyware
    
By: M86 Security     Published Date: Nov 02, 2010

This white paper examines the Crimeware industry and the Web-based methods currently used to sustain cybercrime.

Tags : m86 security, real-time code analysis, malware threats, cybercrime, anti-virus, anti spam, anti spyware, anti virus
    
By: M86 Security     Published Date: Nov 01, 2010

This paper will outline the evolution of APTs, explain the motivation behind them, and determine best practices for defending against these threats.

Tags : m86 security, threats, best practices, phishing, vulnerability, advanced persistent threats, apts, anti spam
    
By: Symantec.cloud     Published Date: Sep 28, 2010

Recently, a new worm, commonly known as "here you have" used old mass-mailer techniques to spread rapidly across the Internet, effectively shutting down the email servers of many large companies.

Tags : messagelabs, symantec hosted services, embedded links, worm, security, malware, anti spam, anti spyware
    
By: Symantec.cloud     Published Date: Sep 14, 2010

Understand the extent of the costs you risk incurring if you have either no or inadequate protection in place.

Tags : symantec.cloud, messagelabs symantec hosted services, email threat, email security, hacking, anti spam, anti spyware, anti virus
    
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.