Anti Virus White Papers

Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). In the virus dictionary approach, when the antivirus software examines a file, it refers to a dictionary of known viruses that the authors of the antivirus software have identified.
Results 226 - 250 of 501Sort Results By: Published Date | Title | Company Name
By: GFI Software     Published Date: Feb 24, 2012

There are hundreds of rogue anti-malware products on the Internet that infect PCs rather than detect malware. Learn how these scams look and work and how to prevent your computer from becoming infected.

Tags : gfi software, technology, security, malware, internet security, intrustion detection, anti-virus, access control
    
By: Lumension     Published Date: Jan 11, 2012

There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.

Tags : vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
By: VMware Dell     Published Date: Dec 07, 2011

This white paper outlines the ways virtualization can address the challenges of traditional disaster recovery and create a viable recovery plan.

Tags : disaster recovery, disaster, security, risk, plan, continuity, architecture, dell
    
By: Webroot     Published Date: Dec 06, 2011

In this paper we go back to basics. We look at the kinds of security facilities needed now and in the future, and consider how to think about security

Tags : security, facilities, evolve, communication, collaboration, access control, anti spam, anti spyware
    
By: Webroot     Published Date: Dec 06, 2011

Unlock the true business value of IT security, and learn why companies of all sizes are choosing SaaS over on-premise solutions.

Tags : saas, service management, nimsoft, cloud service, delivery, models, monitor, monitoring
    
By: HP - Enterprise     Published Date: Nov 22, 2011

HP Fortify on Demand: The quickest, most affordable way to accurately test and score the security of your applications.

Tags : application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify
    
By: HP - Enterprise     Published Date: Nov 22, 2011

Seven Steps to Delivering More Secure Software With all the processes that go into making an application more secure. Where do you start? Learn more

Tags : application security, cyber-attacks, software security assurance, dast, sast, software vulnerabilities, critical application vulnerability, hp fortify
    
By: CenturyLink     Published Date: Nov 18, 2011

Find out how your organization can protect business-critical functions, minimize downtime and mitigate risk.

Tags : centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
    
By: AT&T     Published Date: Nov 07, 2011

The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.

Tags : network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att, at&t, at+t, access control
    
By: AT&T     Published Date: Nov 07, 2011

The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.

Tags : network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att, at&t, at+t, anti spam
    
By: Blue Coat Systems UK     Published Date: Nov 03, 2011

View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.

Tags : malware, delivery, protect, security, security solutions, networks, delivery networks, firewalls
    
By: Blue Coat Systems UK     Published Date: Nov 03, 2011

This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies

Tags : blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
By: Blue Coat Systems UK     Published Date: Nov 03, 2011

IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats

Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
By: Blue Coat Systems UK     Published Date: Nov 03, 2011

View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.

Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
By: Blue Coat Systems     Published Date: Oct 25, 2011

The WebPulse delivers fast and effective Web 2.0 threat protection for 75 million users worldwide. Find out more about how WebPulse can protect you!

Tags : webpulse, defense, malware, security, protection, blue coat, insider threats, security
    
By: Blue Coat Systems     Published Date: Oct 25, 2011

View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.

Tags : malware, delivery, protect, security, security solutions, networks, delivery networks, firewalls
    
By: EdgeWave     Published Date: Oct 15, 2011

In this white paper, you'll learn top email threats beyond spam in the age of blended threats and what you can do to protect your business.

Tags : web filter for enterprise, web security, email security, messaging security, spam, security, blended threats, email
    
By: EdgeWave     Published Date: Oct 15, 2011

Today's uncertain economic climate demands that you do a thorough assessment before you invest. Here's a concise list of steps that will help you achieve the best return on your Web filtering dollar.

Tags : edgewave, web filter for enterprise, web security, email security, messaging security, web filtering, evaluating, evaluation
    
By: EdgeWave     Published Date: Oct 15, 2011

This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.

Tags : e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave
    
By: Secunia     Published Date: Oct 12, 2011

Measurements within this white paper demonstrate that an intelligent patching strategy is an effective approach for reducing vulnerability risks.

Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
By: CA Technologies     Published Date: Sep 29, 2011

Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.

Tags : risk, attack, security, business, access control, anti virus, application security, identity management
    
By: ESET, LLC.     Published Date: Sep 21, 2011

This report presents a comparative analysis on the performance and usability of 7 security solutions from some of the world's largest security vendors

Tags : eset, smb, antivirus software, malware, it professional, security, small business, vendors
    
By: Trend Micro Inc.     Published Date: Sep 21, 2011

Data is the lifeblood of any business, and small businesses are certainly no exception. Critical data such as email messages, financial documents, as well as project and personnel files all make up vital company information that most businesses cannot function without.

Tags : trendlabs, trend micro, data storage, small business, technology, security solution, anti virus, security management
    
By: Trend Micro Inc.     Published Date: Sep 21, 2011

Fake Antivirus (AV) or rogue antivirus software has been prevalent in the market today and has affected millions of computers. This document aims to educate users on how Fake AV arrives on a computer's system and what are the available Trend Micro solutions to combat this threat.

Tags : tend micro, fake antivirus, technology, software, anti spyware, anti virus, application security, internet security
    
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.