Anti Virus White Papers

Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). In the virus dictionary approach, when the antivirus software examines a file, it refers to a dictionary of known viruses that the authors of the antivirus software have identified.
Results 276 - 300 of 418Sort Results By: Published Date | Title | Company Name
By: Symantec.cloud     Published Date: Feb 03, 2010

The emergence of covert information theft as a key tactic of malware propagators. Most importantly, the paper highlights the crucial danger points for any business that doesn't defend itself against viruses which operate in the background.

Tags : messagelabs intelligence, symantec hosted services, security threat, spyware, botnets, phising, email security, social networking
    
By: ESET     Published Date: Jan 21, 2010

Unfortunately, people are frequently seduced by the word "free" and overestimate the supposed benefits such products offer. In order to illustrate this type of malicious methodology, the case of a rogue product is analyzed here.

Tags : eset, rogue anti-malware, security, antivirus, spyware, anti spam, anti spyware, anti virus
    
By: ESET     Published Date: Jan 21, 2010

3rd International Conference on Cybercrime Forensics Education & Training. What is the information that the end-user or end-site really needs to know about an incoming threat?

Tags : eset, internet security, cybercrime, threat, malware, antivirus, trojan, vgrep
    
By: ESET     Published Date: Jan 08, 2010

This report provides a report of the Top Computer Threats in the United Kingdom.

Tags : eset, monthly threat report, top computer threat, security, anti spam, anti spyware, anti virus, internet security
    
By: McAfee     Published Date: Dec 28, 2009

McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.

Tags : mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments
    
By: McAfee     Published Date: Dec 09, 2009

Despite the six-year-old CAN-SPAM Act, spammers routinely abuse the law and continue to deliver their obnoxious email. One year ago, a major spam-hosting ISP was shut down, causing an impressive drop in botnet activity. Today, however, spam authors are more active and smarter than ever. Spammers love to tailor their messages to the news and the season. Read this report to gain a greater understanding of current spam threats.

Tags : mcafee, spam, risk management, vulnerability, can-spam, anti-spam, virus, botnet
    
By: Trend Micro SPN     Published Date: Nov 24, 2009

A report sampling over 100 large enterprises that explores the types of cost savings that can be gained by employing a comprehensive content security solution with a cloud client architecture. The report concludes total savings of up to 40% can be achieved.

Tags : trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
    
By: Trend Micro SPN     Published Date: Nov 24, 2009

How do you measure security effectiveness? Conventional security solutions may appear to be holding back targeted malware attacks but this eBook shows you how to check the performance of your current infrastructure. Whether you are 'secure', 'infected' or 'recovering', you can benefit from a Threat Discovery Assessment.

Tags : trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
    
By: McAfee Inc     Published Date: Nov 16, 2009

With all the benefits and opportunities the Internet provides, it can also be a very inhospitable place, requiring organizations' constant vigilance to protect themselves from attack. To better understand important security issues affecting organizations today, IDC recently completed a survey of more than 260 IT and Firewall managers and executives in the US and Europe that aimed to profile their organization's firewall deployments.

Tags : mcafee, email protection, firewall, it security, midsize, global threat intelligence, security, data protection
    
By: Google Postini     Published Date: Nov 14, 2009

Learn how Google Message Discovery offers significant advantages over onsite server or media-based email archiving services.

Tags : email protection, email archiving, google, anti-virus, messaging, secure employee communications, backup and recovery, anti spam
    
By: Webroot UK     Published Date: Nov 11, 2009

This report highlights ways Best-in-Class organizations harden themselves against threats from email.

Tags : webroot, email security, threats, spam, data security policy, knowledge management, performance management, encrytion
    
By: Webroot UK     Published Date: Nov 11, 2009

This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.

Tags : webroot, web security threat, phishing, antivirus, ddos, data leak, threat protection, configuration
    
By: McAfee     Published Date: Nov 09, 2009

Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."

Tags : mcafee, risk management, security, security management, security threats, vulnerability assessments, vulnerability management, anti spam
    
By: McAfee Inc     Published Date: Oct 30, 2009

Browsers are the least-protected and therefore easiest medium for transferring malware, which is why protecting your company against web-borne threats should be part of a total security solution. This brief explains the key benefits of implementing a web security solution with McAfee. Read more.

Tags : mcafee, email protection, midsize, global threat intelligence, security, data protection, spam, anti spam
    
By: ESET     Published Date: Oct 07, 2009

This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology. The threat landscape facing businesses has evolved significantly, and corporations are looking for security products that can protect against known threats and prepare for future attackers in a simple-to-use architecture.

Tags : eset, security, threatsense, malware, threat trends, conficker, virus, agent
    
By: Trend Micro SPN     Published Date: Sep 23, 2009

To keep ahead of the threats, you need to rethink your security and ask whether traditional security technologies are up to today's challenges. This eBook explains how correlating web, email and file reputations within a smart protection network is core to Outthinking the cyber criminals.

Tags : trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
    
By: Trend Micro SaaS     Published Date: Sep 22, 2009

Alfred Ashley Group helps small businesses overcome the daunting prospect of buying, installing, and managing computer and telephone system solutions. Building in best-in-class and cost-effective security is vital for meeting customer expectations and achieving the company's revenue and profit goals.

Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
    
By: Trend Micro SaaS     Published Date: Sep 22, 2009

Just about anybody with an email address knows about spam and spam filters-or at least they think they do. However, it is a complex subject, with far more to it than meets the eye. This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam.

Tags : saas, trend, trend micro, phishing, spam filters, software as a service, trendlabs, email security
    
By: Trend Micro SaaS     Published Date: Sep 01, 2009

This comprehensive hosted service blocks email threats before they can touch the network, integrating powerful anti-spam and anti-phishing with award-winning antivirus and anti-spyware. Security leader Trend Micro updates and tunes the solution to keep the customer's network secure while saving valuable IT resources.

Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
    
By: McAfee Inc     Published Date: Aug 19, 2009

Anti-virus by itself is no longer enough to protect endpoints, especially in this age of mobile devices and business users on the go. This brief explains the key benefits of implementing an endpoint security solution with McAfee. Read more.

Tags : mcafee, security, malware, compliance, cyber criminals, midmarket, encryption, security tools
    
By: Astaro     Published Date: Aug 10, 2009

Frontier Nursing Services (FNS, Inc.) of Hyden, Kentucky provides health care to the underserved population in rural areas of southeast Kentucky and is committed to advancing nursing through education.

Tags : frontier nursing, astaro, cisco, barracuda, pix, fns, network, it department
    
By: IBM     Published Date: Jun 16, 2009

As products go to market quicker, employees, customers, and business partners need the ability to collaborate and access business data—when, where, and how ever they choose. Watch this illustrated demo to see how IBM offers a smarter, business-driven approach to Identity and Access Management. And how IBM’s extensive integration capabilities can enhance productivity without compromising security.

Tags : identity, access management, secure, ibm, mmdg, enterprise single sign on, user data, security
    
By: SmoothWall     Published Date: Jun 03, 2009

Proxy abuse is an increasingly pervasive problem in schools. It only takes one anonymous proxy to put a gaping hole in your network security. Using a web filtering solution that doesn't block proxies is the equivalent of putting a big bolt on your front door but leaving the back door wide open.

Tags : smoothwall, web filtering, anonymous proxies, anonymizers, proxy abuse, ssl proxies, web content filtering, school web filtering
    
By: Trend Micro SPN     Published Date: May 15, 2009

Measuring the effectiveness of your security infrastructure is key to any enterprise as threats change on a minute by minute basis. See an example of the report you would receive following a Trend Micro Threat Discovery Assessment.

Tags : trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus
    
By: Mimecast     Published Date: May 11, 2009

Securing your email is a complex process that takes time and uses resources that can be better deployed elsewhere in your business. Moving on-premise email security into the cloud not only saves time and money, but also reduces risk and takes advantages of economies of scale to deliver an effective, dedicated security platform that unshackles users and releases the potential of your mail.

Tags : mimecast, saas, software as a service, software as a service, malware, antispam, policy enforcement, email archive
    
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.