Anti Virus White Papers

Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). In the virus dictionary approach, when the antivirus software examines a file, it refers to a dictionary of known viruses that the authors of the antivirus software have identified.
Results 226 - 250 of 457Sort Results By: Published Date | Title | Company Name
By: Osterman Research, Inc.     Published Date: Aug 01, 2011

A recent survey by Osterman Research has confirmed that social media usage by employees has dramatically increased over the past few years. In short, you will leave this Webinar with a better understanding of the usage, trends, and diverse risks posed by social media.

Tags : osterman research, social media, commvault, mcafee, live event, web 2.0 security, policies, archiving
    
By: Fortinet, Inc.     Published Date: Jul 27, 2011

In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter.

Tags : fortinet, content filtering, application filtering, web security, malware, web access control, web filtering solution, anti spam
    
By: DigitalPersona UK     Published Date: Jul 21, 2011

This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.

Tags : fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication
    
By: DigitalPersona UK     Published Date: Jul 21, 2011

This whitepaper examines the common misconceptions about full disk encryption.

Tags : digital persona, encryption, myths, fingerprint authentication, identity management, identity protection, data security, identity theft
    
By: DigitalPersona UK     Published Date: Jul 21, 2011

This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.

Tags : end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security
    
By: Trend Micro, Inc.     Published Date: Jul 19, 2011

In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.

Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
By: Trend Micro, Inc.     Published Date: Jul 19, 2011

Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.

Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
By: Trend Micro, Inc.     Published Date: Jul 19, 2011

Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.

Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
By: Trend Micro, Inc.     Published Date: Jul 19, 2011

The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.

Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia
    
By: Webroot     Published Date: Jul 08, 2011

This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service.

Tags : webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center
    
By: Blue Coat Systems     Published Date: Jul 07, 2011

This report examines the interactions of malware ecosystems, including user behavior, malware hosting sites and delivery networks and offers effective strategies to build better defenses.

Tags : blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
By: Blue Coat Systems     Published Date: Jul 07, 2011

View this paper now to explore the top four security risks businesses face when using social networks. In addition, discover various ways to protect against and mitigate these risks.

Tags : blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
By: Blue Coat Systems     Published Date: Jun 30, 2011

This security report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.

Tags : blue coat, wan optimization, secure web gateway, application performance monitoring, anti virus, application security, email security, hacker detection
    
By: IBM Corporation     Published Date: Jun 09, 2011

Learn the 10 critical database activities & behaviors enterprises should audit now.

Tags : ibm, guardium, database, audit, security, risk, monitoring, anti spam
    
By: ESET     Published Date: Jun 08, 2011

ESET NOD32 Antivirus 4, ESET's Business Solution offers complete server-to-endpoint protection. Request a free trial today.

Tags : eset, free trial, nod32 antivirus 4, antivirus, malware, threats, productivity, endpoint protection
    
By: Symantec     Published Date: Jun 02, 2011

Learn how Symantecs SBE Solutions faired when benchmarked by PassMark Software.

Tags : symantec sbe solutions, passmark software, performance testing, small business, endpoint protection security software, windows 7 ultimate edirion, performance metrics, anti virus
    
By: Google Apps     Published Date: May 18, 2011

On demand version of this webinar. Konica Minolta Business Solutions U.S.A. (Konica Minolta) needed to easily integrate multiple corporate acquisitions, move from an old-style on-premise email system, and transform IT's role from tactical to strategic - so the company chose Google Apps. Today, Google Apps not only provides email, but also integrates collaboration, security, and spam blocking - all while freeing Konica Minolta's IT Department to spend more time on forward-looking enterprise initiatives. The IT Department is now a strategic asset to the business, one that is aligned more closely to user needs.

Tags : google apps, webinar, konica minolta, integration, collaboration, security, spam blocking, cloud computing
    
By: ESET, LLC.     Published Date: May 16, 2011

Trends such as mobility, Web 2.0, and consumerization are shattering traditional notions of IT control. As a result, IT security organizations are struggling to defend against a more formidable hacker adversary at a time when they have less visibility and control over their IT environment. As part of our Cybersecurity Masters webinar series, ESET would like to invite you to attend these expert presentations by Forrester and ESET.

Tags : eset, cybersecurity webinar, security manager, it security, anti spam, anti spyware, anti virus, internet security
    
By: TrendMicro     Published Date: May 09, 2011

This paper details the results of a benchmark test conducted between Trend Micro Deep Security, McAfee Total Protection for Endpoint and Symantec Endpoint Protection 11.0 in virtual environments.

Tags : trendmicro, anti-virus performance, vmware esx, virtual environments, mcafee total protection, symantec endpoint protection, anti spam, anti spyware
    
By: Google     Published Date: May 05, 2011

This data sheet will provide the information you need to know on Surround existing email servers with cloud computing solutions to help increase security and reliability.

Tags : google postini services, message security, discovery, continuity, anti-spam, anti-virus, email content filtering, reliability
    
By: Google     Published Date: May 05, 2011

In this case study, you'll learn how they used Google Apps Education Edition to help them dramatically reduce time searching for email records from weeks to minutes, and how it also helped reduce costs in their messaging and collection system.

Tags : google message discovery, postini, pgcps, google apps education edition, cloud computing solution, compliance, sharon thompson, tco
    
By: Google     Published Date: May 05, 2011

Read this case study to learn all the benefits that Standard Chartered Bank experienced by switching to Google Message Security and learn how you can experience the same benefits and results today.

Tags : postini, google message security, employee productivity, standard chartered bank, anti-spam, anti-virus, content filtering, bandwidth management
    
By: Google     Published Date: May 05, 2011

This report measures the Total Economic Impact of moving your messaging and collaboration application from traditional, on-premise products to Google Apps.

Tags : google apps, collaboration, roi, forrester, cloud-based messaging, total economic impact, on-premise products, npv
    
By: WatchGuard Technologies     Published Date: Apr 20, 2011

Find out how it works and why it's actually possible now to move the battle for web security off your web servers.

Tags : cloud-based web security, cybercriminals, watchguard reputation enabled defense, web-based attacks, threat management, malware, url filtering, access control
    
By: Shavlik Technologies     Published Date: Apr 19, 2011

This paper will look at ways federal government agencies can maintain a strong and effective patch management program by seamlessly integrating third party patch management solutions into existing SCCM infrastructure.

Tags : shavlik, patch management, sccm, vulnerability management, security, patch detection, compliance, network security
    
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.