Anti Virus White Papers

Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). In the virus dictionary approach, when the antivirus software examines a file, it refers to a dictionary of known viruses that the authors of the antivirus software have identified.
Results 276 - 300 of 403Sort Results By: Published Date | Title | Company Name
By: Trend Micro SPN     Published Date: Sep 23, 2009

To keep ahead of the threats, you need to rethink your security and ask whether traditional security technologies are up to today's challenges. This eBook explains how correlating web, email and file reputations within a smart protection network is core to Outthinking the cyber criminals.

Tags : trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
    
By: Trend Micro SaaS     Published Date: Sep 22, 2009

Alfred Ashley Group helps small businesses overcome the daunting prospect of buying, installing, and managing computer and telephone system solutions. Building in best-in-class and cost-effective security is vital for meeting customer expectations and achieving the company's revenue and profit goals.

Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
    
By: Trend Micro SaaS     Published Date: Sep 22, 2009

Just about anybody with an email address knows about spam and spam filters-or at least they think they do. However, it is a complex subject, with far more to it than meets the eye. This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam.

Tags : saas, trend, trend micro, phishing, spam filters, software as a service, trendlabs, email security
    
By: Trend Micro SaaS     Published Date: Sep 01, 2009

This comprehensive hosted service blocks email threats before they can touch the network, integrating powerful anti-spam and anti-phishing with award-winning antivirus and anti-spyware. Security leader Trend Micro updates and tunes the solution to keep the customer's network secure while saving valuable IT resources.

Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
    
By: McAfee Inc     Published Date: Aug 19, 2009

Anti-virus by itself is no longer enough to protect endpoints, especially in this age of mobile devices and business users on the go. This brief explains the key benefits of implementing an endpoint security solution with McAfee. Read more.

Tags : mcafee, security, malware, compliance, cyber criminals, midmarket, encryption, security tools
    
By: Astaro     Published Date: Aug 10, 2009

Frontier Nursing Services (FNS, Inc.) of Hyden, Kentucky provides health care to the underserved population in rural areas of southeast Kentucky and is committed to advancing nursing through education.

Tags : frontier nursing, astaro, cisco, barracuda, pix, fns, network, it department
    
By: IBM     Published Date: Jun 16, 2009

As products go to market quicker, employees, customers, and business partners need the ability to collaborate and access business data—when, where, and how ever they choose. Watch this illustrated demo to see how IBM offers a smarter, business-driven approach to Identity and Access Management. And how IBM’s extensive integration capabilities can enhance productivity without compromising security.

Tags : identity, access management, secure, ibm, mmdg, enterprise single sign on, user data, security
    
By: SmoothWall     Published Date: Jun 03, 2009

Proxy abuse is an increasingly pervasive problem in schools. It only takes one anonymous proxy to put a gaping hole in your network security. Using a web filtering solution that doesn't block proxies is the equivalent of putting a big bolt on your front door but leaving the back door wide open.

Tags : smoothwall, web filtering, anonymous proxies, anonymizers, proxy abuse, ssl proxies, web content filtering, school web filtering
    
By: Trend Micro SPN     Published Date: May 15, 2009

Measuring the effectiveness of your security infrastructure is key to any enterprise as threats change on a minute by minute basis. See an example of the report you would receive following a Trend Micro Threat Discovery Assessment.

Tags : trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
    
By: Mimecast     Published Date: May 11, 2009

Securing your email is a complex process that takes time and uses resources that can be better deployed elsewhere in your business. Moving on-premise email security into the cloud not only saves time and money, but also reduces risk and takes advantages of economies of scale to deliver an effective, dedicated security platform that unshackles users and releases the potential of your mail.

Tags : mimecast, saas, software as a service, software as a service, malware, antispam, policy enforcement, email archive
    
By: Ping Identity     Published Date: May 05, 2009

This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!

Tags : pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing
    
By: Ping Identity     Published Date: May 05, 2009

With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!

Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
By: Tripwire     Published Date: Mar 31, 2009

How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.

Tags : tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance
    
By: Trend Micro SaaS     Published Date: Mar 17, 2009

West Coast Labs performed an anti-spam comparative test on various email solutions related to spam detection rate over a series of at least 100,000 emails per solution.

Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
    
By: VMware     Published Date: Feb 26, 2009

In this brief, you'll learn how CA Recovery Management Products, like CA ARCserve Backup and CA XOsoft solutions, can be applied with VMware Infrastructure to help you effectively respond to the challenges and opportunities of business-critical computing.

Tags : vmware, business continuity, ca recovery management, ca arcserve, ca xosoft solutions, vmware infrastructure, business-critical computing, virtualization
    
By: VMware     Published Date: Feb 26, 2009

CA ARCserve® Backup, CA XOsoft™ Replication, and CA XOsoft™ High Availability provide several key features that enable you to both protect virtualized servers and benefit from server virtualization in your overall recovery management strategy

Tags : ca arcserve backup, ca xosoft replication, ca xosoft high availability, virtualization support, recovery management strategy, virtual machines, vms, vmware consolidated backup (vcb)
    
By: Trend Micro SaaS     Published Date: Feb 20, 2009

Hosted, or "in-the-cloud", messaging security capabilities are becoming increasingly popular with organizations of all sizes. Some have already adopted hosted services, while others are becoming more receptive to the notion of using third party services to manage their security infrastructure than they were just a year ago. Particularly driven by the current economic recession, decision makers are realizing that hosted email security can provide a cost-effective solution while actually improving security.

Tags : saas, trend, trend micro, software as a service, on-premise, cloud, trendlabs, email security
    
By: Cisco     Published Date: Feb 12, 2009

Spam email continues to be a big problem, especially for small businesses. Small companies rely on email just as much as large enterprises, and their mail servers get clogged with unsolicited mail just as often. But, with fewer resources to spare to address the spam problem, small businesses need smarter solutions. To find out how you can use the Cisco Spam & Virus Blocker to eliminate spam, improve productivity, and boost security and network performance in your business download today!

Tags : cisco, spam, anti-virus, servers, firewall, security, anti spam, anti spyware
    
By: Trend Micro SaaS     Published Date: Feb 09, 2009

Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.

Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
    
By: Trend Micro SaaS     Published Date: Feb 09, 2009

West Coast Labs performed a comparison test on a range of email solutions (appliances, software, and hosted service solutions) to measure their relative spam detection rates over a series of at least 100,000 genuine spam emails using West Coast Labs real-time spam feed.

Tags : saas, trend, trend micro, websense, barracuda, anti-spam, antispam, spam filter service
    
By: ThreatMetrix.     Published Date: Jan 30, 2009

This white paper highlights a surprising new approach to fraud prevention: remotely recognizing a fraudster’s PC (or other device). Even with identity (password/credit card) theft, the device stays the same!

Tags : threatmetrix, online fraudsters, identity thieves, fraud prevention, device intelligence, security, anti spam, anti spyware
    
By: ThreatMetrix.     Published Date: Jan 30, 2009

In 2007 alone, $3.6 billion was lost to online fraud. This white paper shows how to block scam artists, reliably and affordably-while ensuring that real customers always have access.

Tags : threatmetrix, e-commerce fraud, revenue loss, scam artists, internet security, malwae, botnets, fraudulent proxy servers
    
By: Cisco     Published Date: Jan 28, 2009

A wireless network can help your employees stay productive as they move around your company. But to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users. Every device in a wireless network is important to security. Because a wireless LAN (WLAN) is a mobile network, you need a thorough, multilayered approach to safeguard traffic.

Tags : cisco, wireless lan, wlan, mobile network, wireless network, antivirus policy, identity policy, remote access policy
    
By: Cisco     Published Date: Jan 28, 2009

Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.

Tags : cisco, network security, business continuity issues, acceptable use policy, e-mail and communications technology, antivirus policy, password policy, identity policy
    
By: Cisco     Published Date: Jan 28, 2009

Achieving effective network security for small business requires a solution that's designed to fit your needs today and can adapt to tomorrow's security threats. Aside from protecting you against such threats, the best network security for small business gives you many business benefits.

Tags : cisco, small business networks, threats, spyware, virus, e-business foundation, internet threats, security
    
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.