Anti Virus White Papers

Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). In the virus dictionary approach, when the antivirus software examines a file, it refers to a dictionary of known viruses that the authors of the antivirus software have identified.
Results 26 - 50 of 418Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Jan 28, 2014

Modern malware defenses use layers of blacklisting and whitelisting, enhanced with real-time analysis and reputation data, to protect the endpoint computing stack.

Tags : blacklisting, whitelisting, malware, endpoint, mcafee global threat intelligence, epolicy orchestrator, byod, anti spam
    
By: McAfee     Published Date: Jan 28, 2014

Leading analyst firm Gartner has positioned McAfee as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms for six consecutive years.

Tags : gartner, endpoint protection, anti spam, anti spyware, anti virus, encryption, firewalls, security management
    
By: GeoTrust     Published Date: Jan 17, 2014

Analytics can be a powerful tool, so now is a great time to learn more about web metrics. Use this guide to understand the basics of what web analytics are and why they’re important, what metrics you should track, and how you can use this information to optimize your site and encourage customers to visit often and buy more

Tags : web analytics, tracking, e-commerce, optimization, web site, geotrust true, geotrust, ssl certificates
    
By: GeoTrust     Published Date: Jan 17, 2014

In this guide, you'll learn about what goes into creating your own do-it-yourself (DIY) e-commerce web site, from picking the right tools and services you’ll need to create your web pages, to selecting the best hosting provider and payment solution to fit your business, to figuring out the best security for your site.

Tags : e-commerce, shopping cart, hosting provider, payment processor, geotrust true, geotrust, ssl certificates, bit encryption
    
By: Symantec     Published Date: Jan 15, 2014

This year’s ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantec’s security experts. In this summary, we call out seven areas that deserve special attention.

Tags : symantec, cyberespionage, mobile security, mobile device security, threat report, cyberattacks, cyber attacks, data protection
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: Savvis     Published Date: Dec 04, 2013

The data security and IT integrity of enterprises just like yours is under unprecedented attack. A startling increase in the sophistication and number of cyber attacks is forcing virtually every company to raise their level of security consciousness. Buying IT security as a managed service can provide your organization the hardware, software, infrastructure, and the expertise that you need to protect your business in today’s complex and evolving threat environment. Read this whitepaper to learn how to maintain and grow your business in today’s ever-changing threat environment and at a commodity price. Help protect your organization and customers with a dynamic and proactive defense plan.

Tags : anti spam, anti virus, application security, firewalls, hacker detection, internet security, data loss prevention
    
By: Norse     Published Date: Nov 19, 2013

Learn how your current defenses against cyber-attacks are outdated and how intelligence-based strategies will protect your organization from advanced attacks.

Tags : cyber criminal, cyber-attacks, advanced attacks, hackers, network, infrastructure, anti spam, anti spyware
    
By: HP - Enterprise     Published Date: Sep 27, 2013

Learn about the three biggest threats to mobile applications and the recommendations on how to mitigate the risk from mobile computing security vulnerabilities

Tags : mobile application threats, mobile application, mobile, risk, api, anti virus, application security, encryption
    
By: HP - Enterprise     Published Date: Sep 27, 2013

Learn how Obrela, an Enterprise information security service provider, leveraged HP ArcSight to improve and protect their complex work environment

Tags : obrela, hp arcsight, siem, security information, event management solution, security industries, anti virus, application security
    
By: IBM     Published Date: Sep 09, 2013

Read this free whitepaper from Forrester Consulting's recent assessment of the current security skills landscape and what they think is the best way to overcome it

Tags : technical security skills, security skills, crisis, forrester consulting, security skills landscape, ciso, anti virus, application security
    
By: Rapid7     Published Date: Jul 24, 2013

As mobile devices become more common, cybercriminals see them as having huge profit potential, and aim to gain access to the user's confidential personal and financial information. In this Mobile Security Guide, we'll walk you through the mobile malware landscape and what you need to know to keep your organization's data safe.

Tags : rapid7, malware, mobile malware, trojan, virus, app security, mobile device security, iphone security
    
By: Blue Coat Systems     Published Date: Jul 18, 2013

While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.

Tags : mobile, malware, security, scams, bluecoat, data loss, anti spam, anti virus
    
By: CDW     Published Date: Jun 10, 2013

Defense in depth isn't just a product or a process. It’s the constant practice of: protection, detection, and reaction.

Tags : cdw, defense in depth, protection, detection, reaction, anti spam, anti spyware, anti virus
    
By: CDW     Published Date: Jun 10, 2013

CDW Malware Video

Tags : cdw, security, malware, channel specific protection., anti spam, anti spyware, anti virus
    
By: Dell Software     Published Date: May 28, 2013

Tools and techniques used to protect physical data are no longer sufficient for virtual data assets. How do you know which technology is right for your organization? Let an expert do the work for you: The Buyers’ Guide to Virtual + Physical Data Protection.

Tags : dell quest, appassure, data protection, virtual data, physical data protection, anti virus, application security, software compliance
    
By: Sophos     Published Date: May 09, 2013

This buyers guide is designed to help you choose the right solution for your organization. It looks at the factors you should consider when evaluating solutions to ensure you have the protection and functionality you need, both now and as your business evolves.

Tags : network protection, sophos, buyers guide, security, application security, security software, firewall, vpn
    
By: EMC     Published Date: Apr 18, 2013

The RSA business continuity white paper, BCM Regulatory Soup, will help you address: Which sources to comply with and why, how to handle conflicts between the sources, how to prioritize your efforts.

Tags : rsa, business continuity, disaster recovery, bcm, regulatory, compliance, anti spam, anti spyware
    
By: EMC     Published Date: Apr 18, 2013

Read the Forrester Report: The Total Economic Impact of RSA Archer IT GRC and you'll be eligible to receive a free consultation from an RSA GRC expert who will calculate the projected ROI for your organization.

Tags : grc, rsa, archer, roi, compliance, risk, risk management, anti spam
    
By: SilverSky     Published Date: Apr 16, 2013

In Forrester's 15-criteria evaluation of the emerging managed security services provider (MSSP) market, SilverSky was identified as a leader. Forrester identified the 10 most significant providers in this category and researched, analyzed, and scored them. SilverSky was given high ranks for business and technical value, SLA adherence, security services, and threat intelligence and analytics. Download this industry research paper now to learn why SilverSky is the MSSP you should be working with today.

Tags : managed security, msp, managed service provider, sla adherance, threat intelligence, analytics, mssp, forrester
    
By: SilverSky     Published Date: Apr 16, 2013

Threats to the security of your network will never completely go away, but the ability to prepare for, recognize and quickly remediate these threats should be a part of day-to-day company operations. This white paper gives you eight essentials for managing vulnerabilities in a network including internal and external assessments, how frequently you should run scans for threats and the importance of broadening testing beyond basic network services and operating systems.

Tags : vulnerability management, security, threat management, security, assessment, anti spam, anti spyware, anti virus
    
By: Kaseya     Published Date: Apr 04, 2013

A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.

Tags : it security, anti-virus, vulnerability management, intrusion prevention, access control, anti spam, anti spyware, anti virus
    
By: Symantec     Published Date: Apr 04, 2013

This white paper discusses the malware threat, the potential impact on your business, and how to protect your company and your customers by using code signing.

Tags : malware, anti-virus, spyware, scareware, anti-malware, cyber criminals, code signing, security
    
By: Symantec     Published Date: Apr 04, 2013

How Code Signing Can Bolster Security for Mobile Applications

Tags : code signing, mobile, apps, applications, mobile applications, hacking, cyber criminals, mobile security
    
By: Symantec     Published Date: Apr 04, 2013

Stuxnet, a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?

Tags : code signing, cyber attack, anti-virus, intrusion prevention, private keys, asset protection, security, access control
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.