Anti Virus White Papers

Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). In the virus dictionary approach, when the antivirus software examines a file, it refers to a dictionary of known viruses that the authors of the antivirus software have identified.
Results 26 - 50 of 403Sort Results By: Published Date | Title | Company Name
By: CDW     Published Date: Jun 10, 2013

CDW Malware Video

Tags : cdw, security, malware, channel specific protection., anti spam, anti spyware, anti virus
    
By: Dell Software     Published Date: May 28, 2013

Tools and techniques used to protect physical data are no longer sufficient for virtual data assets. How do you know which technology is right for your organization? Let an expert do the work for you: The Buyers’ Guide to Virtual + Physical Data Protection.

Tags : dell quest, appassure, data protection, virtual data, physical data protection, anti virus, application security, software compliance
    
By: Sophos     Published Date: May 09, 2013

This buyers guide is designed to help you choose the right solution for your organization. It looks at the factors you should consider when evaluating solutions to ensure you have the protection and functionality you need, both now and as your business evolves.

Tags : network protection, sophos, buyers guide, security, application security, security software, firewall, vpn
    
By: EMC     Published Date: Apr 18, 2013

The RSA business continuity white paper, BCM Regulatory Soup, will help you address: Which sources to comply with and why, how to handle conflicts between the sources, how to prioritize your efforts.

Tags : rsa, business continuity, disaster recovery, bcm, regulatory, compliance, anti spam, anti spyware
    
By: EMC     Published Date: Apr 18, 2013

Read the Forrester Report: The Total Economic Impact of RSA Archer IT GRC and you'll be eligible to receive a free consultation from an RSA GRC expert who will calculate the projected ROI for your organization.

Tags : grc, rsa, archer, roi, compliance, risk, risk management, anti spam
    
By: SilverSky     Published Date: Apr 16, 2013

In Forrester's 15-criteria evaluation of the emerging managed security services provider (MSSP) market, SilverSky was identified as a leader. Forrester identified the 10 most significant providers in this category and researched, analyzed, and scored them. SilverSky was given high ranks for business and technical value, SLA adherence, security services, and threat intelligence and analytics. Download this industry research paper now to learn why SilverSky is the MSSP you should be working with today.

Tags : managed security, msp, managed service provider, sla adherance, threat intelligence, analytics, mssp, forrester
    
By: SilverSky     Published Date: Apr 16, 2013

Threats to the security of your network will never completely go away, but the ability to prepare for, recognize and quickly remediate these threats should be a part of day-to-day company operations. This white paper gives you eight essentials for managing vulnerabilities in a network including internal and external assessments, how frequently you should run scans for threats and the importance of broadening testing beyond basic network services and operating systems.

Tags : vulnerability management, security, threat management, security, assessment, anti spam, anti spyware, anti virus
    
By: Kaseya     Published Date: Apr 04, 2013

A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.

Tags : it security, anti-virus, vulnerability management, intrusion prevention, access control, anti spam, anti spyware, anti virus
    
By: Symantec     Published Date: Apr 04, 2013

This white paper discusses the malware threat, the potential impact on your business, and how to protect your company and your customers by using code signing.

Tags : malware, anti-virus, spyware, scareware, anti-malware, cyber criminals, code signing, security
    
By: Symantec     Published Date: Apr 04, 2013

How Code Signing Can Bolster Security for Mobile Applications

Tags : code signing, mobile, apps, applications, mobile applications, hacking, cyber criminals, mobile security
    
By: Symantec     Published Date: Apr 04, 2013

Stuxnet, a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?

Tags : code signing, cyber attack, anti-virus, intrusion prevention, private keys, asset protection, security, access control
    
By: Symantec     Published Date: Apr 04, 2013

In this business guide, we discuss how the latest code signing technology works to secure software code and content for applications that are directly downloaded to mobile devices from the Internet.

Tags : code signing, mobile, apps, applications, mobile applications, hacking, cyber criminals, mobile security
    
By: FireEye     Published Date: Mar 20, 2013

Winning the War Against the New Breed of Cyber Attack.

Tags : fireeye, threat protection, cyber attacks, cybercrime, anti spam, anti spyware, anti virus
    
By: FireEye     Published Date: Mar 20, 2013

In the last few years, the scale and sophistication of IT security threats have grown at an explosive rate.

Tags : fireeye, security gaps, threats, complex threats, fireeye technology, anti spam, anti spyware, anti virus
    
By: FireEye     Published Date: Mar 19, 2013

You have to do FISMA. You must defend against Cyber Threats.

Tags : fireeye, ciso, cyber security, fisma, cyber attacks, cyber exploits, anti spam, anti spyware
    
By: McAfee     Published Date: Mar 11, 2013

McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.

Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
By: McAfee     Published Date: Mar 08, 2013

McAfee Virtual Patching for Databases makes perfect sense for closing the window of risk, while saving dollars and minimizing business disruption.

Tags : database security, database patching, database compliance, database security patches, virtual patching, hipaa, pci dss, anti spyware
    
By: McAfee     Published Date: Mar 08, 2013

Protect sensitive information in emerging computing models such as virtualized environments. Learn how to leverage the same security architecture to provide more effective and more efficient data security across dedicated database servers as well.

Tags : database security, virtual database environments, database virtualization, database activity monitoring, vm to vm transactions, virtual machines, virtual appliance, distributed database monitoring
    
By: McAfee     Published Date: Mar 08, 2013

Databases don’t take the day off. Neither do we. McAfee security experts remain focused on keeping your sensitive information safe and available while helping your company ensure compliance with internal policies and industry regulations.

Tags : database security, database compliance, database virtual patching, database breach, application control, legacy databases, anti spyware, anti virus
    
By: McAfee     Published Date: Mar 08, 2013

McAfee Data Center Security Suite for Database delivers all the capabilities needed to secure your databases for reliable SOX compliance, with minimal impact on system performance or the productivity of your IT organization.

Tags : database security, database compliance, sox compliance, sox audit, database activity monitoring, database vulnerability management, database compliance reporting, anti spyware
    
By: McAfee     Published Date: Mar 08, 2013

Compliance does not automatically equate to security. A company may be compliant with a host of regulatory requirements, while its databases remain exposed and vulnerable. Learn how McAfee Database Security can help prevent such vulnerabilities.

Tags : database security, database compliance, native dbms auditing, database protection, database password audit, database activity monitoring, pci dss, sarbanes-oxley
    
By: McAfee     Published Date: Mar 08, 2013

McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.

Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
By: McAfee     Published Date: Mar 08, 2013

McAfee® Virtual Patching for Databases shields databases from the risk presented by unpatched vulnerabilities by detecting and preventing attempted attacks and intrusions in real time without requiring database downtime or application testing.

Tags : database security, database virtual patching, database vulnerability management, pci dss, hipaa, critical patch updates, database vulnerability detection, access control
    
By: McAfee     Published Date: Mar 08, 2013

McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.

Tags : database security, database vulnerability manager, database compliance, mysql security, database password security, sql injection, buffer overflow, insecure sql code
    
By: McAfee     Published Date: Mar 08, 2013

McAfee® Database Activity Monitoring automatically finds databases on your network, protects them with preconfigured defenses, and helps you build a custom security policy for your environment making it easier to demonstrate compliance to auditors.

Tags : database security, database activity monitoring, database compliance, database audit, database virtual patching, database virtualization, anti spam, anti spyware
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.