Anti Virus White Papers

Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). In the virus dictionary approach, when the antivirus software examines a file, it refers to a dictionary of known viruses that the authors of the antivirus software have identified.
Results 26 - 50 of 501Sort Results By: Published Date | Title | Company Name
By: Arbor Networks     Published Date: Mar 13, 2015

As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network. Instead, with continuous packet capture and threat feeds followed by analysis, it is now possible to hunt the attackers and locate them versus waiting for an alert.

Tags : arbor, arbor networks, hackers, cyberattacks, internet security, intrusion prevention, network security, anti virus
    
By: McAfee     Published Date: Feb 25, 2015

This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.

Tags : network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
By: McAfee     Published Date: Feb 25, 2015

This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.

Tags : network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
By: McAfee     Published Date: Feb 25, 2015

This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.

Tags : network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
By: McAfee     Published Date: Feb 25, 2015

This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.

Tags : network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
By: McAfee     Published Date: Feb 25, 2015

This report aggregates front-line experience to present the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.

Tags : siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution
    
By: McAfee     Published Date: Feb 25, 2015

This paper reveals how McAfee Threat Intelligence Exchange delivers this innovative endpoint protection with a system that adapts and learns from encounters and immediately neutralizes emerging threats.

Tags : mcafee threat intelligence exchange, mcafee, endpoint, attacks, protection, security, internet security, endpoint protection
    
By: McAfee     Published Date: Feb 25, 2015

This paper reveals how McAfee Threat Intelligence Exchange delivers this innovative endpoint protection with a system that adapts and learns from encounters and immediately neutralizes emerging threats.

Tags : mcafee threat intelligence exchange, mcafee, endpoint, attacks, protection, security, internet security, endpoint protection
    
By: McAfee     Published Date: Feb 25, 2015

This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.

Tags : siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution
    
By: McAfee     Published Date: Feb 25, 2015

This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs

Tags : siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution
    
By: McAfee     Published Date: Feb 25, 2015

This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs

Tags : siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution
    
By: McAfee     Published Date: Feb 25, 2015

This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.

Tags : siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution
    
By: McAfee     Published Date: Feb 25, 2015

This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs

Tags : siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution
    
By: Intel Security     Published Date: Feb 23, 2015

This report reveals the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.

Tags : security information, security connected framework, big security data, big data, log management, cyber-attacks, hackers, reference archecture
    
By: McAfee     Published Date: Jan 20, 2015

Industry experts discuss the common and risky tradeoff many organizations are forced to make between network performance and security.

Tags : next generation firewall, network performance, mcafee next generation firewall, ngfw, anti spyware, anti virus, firewalls, internet security
    
By: Firehost     Published Date: Jan 07, 2015

This Webinar covers all of the details you will need to know about PCI DSS 3.0.

Tags : pci dss 3.0, data security program, risk management practices, pci, backup and recovery, access control, anti virus, application security
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, hacker detection
    
By: Symantec     Published Date: Nov 24, 2014

This solution brief is aimed at helping you to implement the right security strategy now.

Tags : implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, firewalls, hacker detection
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, email security, encryption
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, firewalls
    
By: Symantec     Published Date: Nov 24, 2014

This solution brief is aimed at helping you to implement the right security strategy now.

Tags : implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, email security, firewalls
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, email security
    
By: Symantec     Published Date: Nov 24, 2014

This solution brief is aimed at helping you to implement the right security strategy now.

Tags : implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, encryption, firewalls
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.