Anti Virus White Papers

Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). In the virus dictionary approach, when the antivirus software examines a file, it refers to a dictionary of known viruses that the authors of the antivirus software have identified.
Results 226 - 250 of 475Sort Results By: Published Date | Title | Company Name
By: EdgeWave     Published Date: Oct 15, 2011

This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.

Tags : e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave
    
By: Secunia     Published Date: Oct 12, 2011

Measurements within this white paper demonstrate that an intelligent patching strategy is an effective approach for reducing vulnerability risks.

Tags : vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
By: CA Technologies     Published Date: Sep 29, 2011

Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.

Tags : risk, attack, security, business, access control, anti virus, application security, identity management
    
By: ESET, LLC.     Published Date: Sep 21, 2011

This report presents a comparative analysis on the performance and usability of 7 security solutions from some of the world's largest security vendors

Tags : eset, smb, antivirus software, malware, it professional, security, small business, vendors
    
By: Trend Micro Inc.     Published Date: Sep 21, 2011

Data is the lifeblood of any business, and small businesses are certainly no exception. Critical data such as email messages, financial documents, as well as project and personnel files all make up vital company information that most businesses cannot function without.

Tags : trendlabs, trend micro, data storage, small business, technology, security solution, anti virus, security management
    
By: Trend Micro Inc.     Published Date: Sep 21, 2011

Fake Antivirus (AV) or rogue antivirus software has been prevalent in the market today and has affected millions of computers. This document aims to educate users on how Fake AV arrives on a computer's system and what are the available Trend Micro solutions to combat this threat.

Tags : tend micro, fake antivirus, technology, software, anti spyware, anti virus, application security, internet security
    
By: ESET     Published Date: Sep 07, 2011

This report presents a comparative analysis on the performance, effectiveness and usability of seven security solutions from some of the world's largest security vendors.

Tags : eset, security solutions for business, malware, antivirus, protection, cybercrime, anti virus, authentication
    
By: ESET     Published Date: Sep 07, 2011

Protection for small and medium businesses against viruses and cybercrimes.

Tags : eset, black hat conference, hacking the car, malware, protection, security, antivirus, anti virus
    
By: ESET     Published Date: Sep 07, 2011

Learn valuable tips and techniques to fully protect your smartphone against security threats.

Tags : eset, gemini trojan, android phone, apps, security, threats, smartphone, applications
    
By: ESET     Published Date: Sep 07, 2011

Selecting an antivirus for your small or medium business that won't slow you down.

Tags : eset, antivirus, security, smb, protection, cybercrime, precautions, safety
    
By: ESET     Published Date: Sep 07, 2011

In this report, we investigate the implementation details of the malware and the ways in which it is distributed, and consider the cybercriminals' objectives.

Tags : eset, tdl, x64, cybercriminal, cybercrime, malware, security, rootkit
    
By: ESET     Published Date: Sep 07, 2011

This paper gives some examples of "potentially unwanted" and "potentially unsafe" applications, explaining how they differ from out-and-out malware.

Tags : eset, pua, potentially unwated application, software, unsafe, antivirus, unwanted, malware
    
By: ESET     Published Date: Sep 07, 2011

A lengthy analysis that considers many of these questions, as well as discussing some of the characteristics of this fascinating and multi-faceted malicious code.

Tags : eset, virus, scada, plcs, stuxnet, malware, siemens, code
    
By: ESET     Published Date: Sep 07, 2011

Another look at what our Research team at ESET, LLC came up with at the end of 2008 for a "top 10 things that people can do to protect themselves against malicious activity." Updated with more recent material from other members of ESET's research teams across the globe.

Tags : eset, cyberbullets, autorun, administrative priveleges, password, social networks, backup, antivirus
    
By: Trend Micro Inc.     Published Date: Aug 25, 2011

This white paper reviews the challenges with endpoint security in virtualized environments - including the inherent risks of dynamic virtual machines and the resource impact of security software such as virus-scanners in multiple guest virtual machines, on a single physical host.

Tags : trend micro, antivirus, virtual datacenter, enterprise security, virtual machines, virtualization, internet content security, smart protection network
    
By: VeriSign, Inc.     Published Date: Aug 03, 2011

This white paper will help you learn about criminals' motivations for distributing malware through the web and how they infect web servers to make distribution possible, as well as techniques administrators can use to detect when and how attackers have compromised their web server.

Tags : verisign, malware security report, bottom line, business protection, cybercriminals, malware attacks, online security, anti spam
    
By: VeriSign, Inc.     Published Date: Aug 03, 2011

Download this white paper to learn about the importance of delivering a secure and trustworthy online experience.

Tags : verisign, security, trustworthy online experience, secure, trust, sensitive data, ssl certificate, authentication
    
By: Osterman Research, Inc.     Published Date: Aug 01, 2011

A recent survey by Osterman Research has confirmed that social media usage by employees has dramatically increased over the past few years. In short, you will leave this Webinar with a better understanding of the usage, trends, and diverse risks posed by social media.

Tags : osterman research, social media, commvault, mcafee, live event, web 2.0 security, policies, archiving
    
By: Fortinet, Inc.     Published Date: Jul 27, 2011

In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter.

Tags : fortinet, content filtering, application filtering, web security, malware, web access control, web filtering solution, anti spam
    
By: DigitalPersona UK     Published Date: Jul 21, 2011

This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.

Tags : fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication
    
By: DigitalPersona UK     Published Date: Jul 21, 2011

This whitepaper examines the common misconceptions about full disk encryption.

Tags : digital persona, encryption, myths, fingerprint authentication, identity management, identity protection, data security, identity theft
    
By: DigitalPersona UK     Published Date: Jul 21, 2011

This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.

Tags : end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security
    
By: Trend Micro, Inc.     Published Date: Jul 19, 2011

In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.

Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
By: Trend Micro, Inc.     Published Date: Jul 19, 2011

Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.

Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.