Anti Virus White Papers

Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). In the virus dictionary approach, when the antivirus software examines a file, it refers to a dictionary of known viruses that the authors of the antivirus software have identified.
Results 276 - 300 of 486Sort Results By: Published Date | Title | Company Name
By: Google     Published Date: May 05, 2011

This report measures the Total Economic Impact of moving your messaging and collaboration application from traditional, on-premise products to Google Apps.

Tags : google apps, collaboration, roi, forrester, cloud-based messaging, total economic impact, on-premise products, npv
    
By: WatchGuard Technologies     Published Date: Apr 20, 2011

Find out how it works and why it's actually possible now to move the battle for web security off your web servers.

Tags : cloud-based web security, cybercriminals, watchguard reputation enabled defense, web-based attacks, threat management, malware, url filtering, access control
    
By: Shavlik Technologies     Published Date: Apr 19, 2011

This paper will look at ways federal government agencies can maintain a strong and effective patch management program by seamlessly integrating third party patch management solutions into existing SCCM infrastructure.

Tags : shavlik, patch management, sccm, vulnerability management, security, patch detection, compliance, network security
    
By: ESET, LLC.     Published Date: Apr 19, 2011

ESET NOD32 Antivirus 4 protects your business without creating system slowdowns that negatively impact productivity. It is effective against emerging malware and Internet threats as they are released, not hours or days later. Request your free trial today.

Tags : eset, nod32 antivirus 4, free trial, malware, productivity, anti spam, anti spyware, anti virus
    
By: Dell SecureWorks     Published Date: Apr 17, 2011

Read this whitepaper to understand how combining the iSensor Intrusion Prevention appliance with 24x7 monitoring and administration by Dell SecureWorks' certified security experts to deliver exceptional cyber threat protection for your midsize organization.

Tags : isensor, secureworks, safeguard, firewalls, cyberthreats, threat protection, network security, midsize security
    
By: Lumension     Published Date: Apr 15, 2011

Learn how to effectively secure endpoints with a defense-in-depth approach that includes patch management, anti-virus, application whitelisting and device control.

Tags : malware, endpoint security, anti-virus, data protection, cyberthreat, anti spam, anti virus, application security
    
By: Shavlik Technologies     Published Date: Apr 14, 2011

This whitepaper will cover the challenges of relying exclusively on either AV or patch and configuration management for threat resistance and why a combined approach is the best option.

Tags : shavlik, anti-malware, patch management, configuration management, virtualization, malware, anti-virus, protection
    
By: Shavlik Technologies     Published Date: Apr 14, 2011

This white paper will illustrate how implementing an effective power management strategy, complete with easy-to-deploy technology, will enable an organization to reduce costs, improve security and become a greater steward of the environment.

Tags : shavlik, power management, security, cyberattacks, internet attacks, lan, wake-on-lan, csci
    
By: Shavlik Technologies     Published Date: Apr 14, 2011

This paper will look at ways federal government agencies can maintain a strong and effective patch management program by seamlessly integrating third party patch management solutions into existing SCCM infrastructure.

Tags : shavlik, patch management, sccm, vulnerability management, security, patch detection, compliance, network security
    
By: Shavlik Technologies     Published Date: Apr 14, 2011

This webinar will cover the challenges of relying exclusively on either AV or patch and configuration management for threat resistance and why a combined approach is the best option.

Tags : shavlik, anti-malware, patch management, configuration management, virtualization, malware, anti-virus, protection
    
By: Google     Published Date: Apr 04, 2011

On demand version of this webinar. Today' s computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents

Tags : google, spam, malware, security, webinar, identity management, anti spam, anti virus
    
By: Globalsign Inc.     Published Date: Apr 01, 2011

This white paper explains the epidemic threat of hackers injecting hidden malware into websites and the negative effect on the brand and traffic to the victim website when blacklisted by Google as a "harmful" website.

Tags : globalsign, hackalert, blacklisting, malware, drive by downloads, malware distribution, hacked websites, malware injection
    
By: GFI Software     Published Date: Mar 31, 2011

In this white paper, Osterman Research discusses how the daily occurrence of malware within organizations has become decidedly worse over the past several years.

Tags : gfi, sunbelt, messaging, web security best practices, threats, anti spam, anti spyware, anti virus
    
By: Lumension     Published Date: Mar 30, 2011

Download this Lumension white paper from Web Buyer's Guide to learn the best defense against malware is intelligent whitelisting

Tags : lumension, anti-virus software, malware, intelligent whitelisting, blacklisting, point of sale terminal, ecommerce server, atm machine
    
By: Lumension     Published Date: Mar 30, 2011

Learn how to protect against what comes in your environment via USB in this Lumension white paper from Web Buyer's Guide

Tags : lumension, usb, malware, security, data loss, threat, cybersecurity, anti spam
    
By: Lumension     Published Date: Mar 12, 2011

Studies show that even though most organizations use AV, more and more are succumbing to attacks.

Tags : virus, antivirus, whitelisting, endpoint security, anti spam, anti spyware, anti virus, application security
    
By: Arbor Networks     Published Date: Mar 07, 2011

Download this paper to learn how emerging botnet and DDoS threats are identified, analyzed and mitigated to help protect organizations like yours from their impact.

Tags : ddos attacks, arbor networks, botnet, distributed denial of services, asert, yoyoddos botnet, bot, anti virus
    
By: Symantec.cloud     Published Date: Mar 02, 2011

Most companies already have an endpoint security solution in place. But a single security product is not sufficient to address the challenges of securing and managing the endpoint. This paper explains how a hosted endpoint solution can help.

Tags : symantec.cloud, messagelabs, endpoint security, security threats, anti spam, anti spyware, anti virus, security management
    
By: GFI Software     Published Date: Feb 24, 2011

Read the results of a survey focused on enterprise antivirus users and discover why customers love VIPRE Antivirus Business.

Tags : gfi software, sunbelt, vipre business, antivirus solution, security, enterprise antivirus survey, anti spam, anti spyware
    
By: GFI Software     Published Date: Feb 24, 2011

This white paper, sponsored by GFI Software, addresses the variety of issues facing organizations today in the context of their system management challenges, and discusses the capabilities of VIPRE Antivirus Business, an integrated platform that provides high performance, integrated endpoint protection capabilities.

Tags : gfi software, sunbelt, malware protection, system management, threats, endpoint infrastructure, viruses, worms
    
By: GFI Software     Published Date: Feb 24, 2011

This white paper discusses the risks to business operations that are created as a result of this performance degradation.

Tags : gfi software, sunbelt, performance degradation, enterprise antimalware software, anti spam, anti spyware, anti virus, application performance management
    
By: GFI Software     Published Date: Feb 24, 2011

The goal of this guide is to raise awareness in organizations of the importance of security and how they can deal with the threats.

Tags : gfi software, sunbelt, security consideration, small and medium-sized enterprises, threats, security, anti spam, anti spyware
    
By: VeriSign     Published Date: Feb 10, 2011

This white paper will help you understand the threat from malware and how it can impact your online business.

Tags : verisign, malware security, data protection, anti spam, anti spyware, anti virus, security management
    
By: VeriSign     Published Date: Feb 10, 2011

This paper will show how code signing works, how attacks can be mounted against unsigned software, (including autoupdate software), and how real-world signing systems protect software vendors, enterprises and end users.

Tags : verisign, ssl spoofing attack, code protection, security, code signing certificates, malicious software, anti spam, anti spyware
    
By: CREDANT Technologies     Published Date: Feb 10, 2011

This short white paper will examine some of the important aspects of insider threat and will offer some guidance on how to reduce the risk.

Tags : credant technologies, insider threat, risk management, security, encryption, vulnerability, anti spam, anti spyware
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.