Anti Virus White Papers

Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). In the virus dictionary approach, when the antivirus software examines a file, it refers to a dictionary of known viruses that the authors of the antivirus software have identified.
Results 276 - 300 of 444Sort Results By: Published Date | Title | Company Name
By: Symantec.cloud     Published Date: Sep 14, 2010

Understand the extent of the costs you risk incurring if you have either no or inadequate protection in place.

Tags : symantec.cloud, messagelabs symantec hosted services, email threat, email security, hacking, anti spam, anti spyware, anti virus
    
By: IBM     Published Date: Aug 30, 2010

All enterprises dealing with private data in test environments should mask or generate test data to comply with regulations such as Payment Card Industry (PCI), the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley (SOX), and European Union (EU) as well as to protect against internal and external attacks.

Tags : ibm, test data privacy, compliance, data masking, payment card industry, pci, security, database
    
By: Software Security Solutions     Published Date: Aug 23, 2010

ESET NOD32 Centrally Managed Business Edition. The Thinking Person's Solution.

Tags : software security, eset business edition, free trial, anti-virus software, smb, nod32, anti virus protection system, anti spam
    
By: Lumension     Published Date: Aug 15, 2010

Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment.

Tags : cyber security, application security, risk management, third party applications, endpoint security, cyber crime, anti virus, hacker detection
    
By: Symantec.cloud     Published Date: Aug 10, 2010

This paper will discuss how the Internet bandwidth is a finite and expensive resource that needs protection from spammers, criminals, hackers, time-wasters and employee misuse.

Tags : messagelabs us, symantec hosted services, internet bandwidth, security, data protection, employee misuse, security safeguard, employee monitoring
    
By: Symantec.cloud     Published Date: Jul 06, 2010

Read our white paper to understand the changing web threat in 2010 & equip your business to defend against it.

Tags : messagelabs symantec, web threat, malware, threat detection, web security services, anti spam, anti spyware, anti virus
    
By: MessageLabs Ltd.     Published Date: Jun 10, 2010

With huge volumes of spam circulating the internet and news spam making up a big proportion of this potentially business-compromising threat, your organisation needs to ensure it has effective protection in place.

Tags : messagelabs symantec, security safeguard, email spam, malware, anti spam, anti spyware, anti virus, email security
    
By: MessageLabs Ltd.     Published Date: Jun 10, 2010

Based on a survey of 273 IT managers, we reveal the top ten web threats to business and outline a solution that uses MessageLabs Security Safeguard, why they matter and how to protect your business from each of them.

Tags : messagelabs symantec, web threat, security safeguard, malware, web security services, anti spam, anti spyware, anti virus
    
By: MessageLabs Ltd.     Published Date: Jun 10, 2010

Read our latest whitepaper & create a step-by-step approach to IT security that will work for your business.

Tags : messagelabs symantec, it security, malware, security management, anti spam, anti spyware, anti virus, internet security
    
By: Symantec.cloud     Published Date: Apr 27, 2010

We surveyed 273 managers in IT & our research reveals the Top 10 Web Security Threats; And How to Solve Them.

Tags : messagelabs symantec, web security threat, malware, bandwidth, bandwidth management, anti spam, anti spyware, anti virus
    
By: Symantec.cloud     Published Date: Apr 27, 2010

Create a step-by-step approach to IT security that will work for your business.

Tags : messagelabs hosted symantec, it security, smb, malware, small business networks, anti spam, anti spyware, anti virus
    
By: Symantec.cloud     Published Date: Apr 27, 2010

Spammers reach new heights of inventiveness and professionalism. Understand the latest spam threat.

Tags : messagelabs intelligence, symantec hosted services, spam threat, web security services, security safeguard, anti spam, anti spyware, anti virus
    
By: Proofpoint     Published Date: Apr 22, 2010

This whitepaper explains how Proofpoint MLX technology provides unrivalled defense against spam.

Tags : proofpoint mlx, spam detection, email security, phishing attack, saas, messaging security, anti spam, anti spyware
    
By: WatchGuard Technologies     Published Date: Apr 21, 2010

Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming.

Tags : watchguard technologies, unified threat management, utm, network humming, security, firewall, vpn, tco
    
By: WatchGuard Technologies     Published Date: Apr 21, 2010

With these ten critical questions as your guide, you can cut through the marketing hype and zero in on the key features and benefits that should guide your decision.

Tags : watchguard technologies, anti spam, security, tco, xcs, anti-phishing, data loss prevention, encryption
    
By: WatchGuard Technologies     Published Date: Apr 21, 2010

Read this white paper for a look at how and why the latest generation of in-the-cloud security really does deliver big dividends for your organization's network security posture.

Tags : watchguard technologies, cloud-based security, protection, network security, malware threats, cybercriminal, anti spam, anti spyware
    
By: Symantec.cloud     Published Date: Apr 15, 2010

Keeping email secure and available is a complex and daunting task. Learn how a hosted solution can provide secure and available email

Tags : messagelabs symantec hosted services, email, security, botnets, anti virus, email security, web service security
    
By: Webroot UK     Published Date: Mar 22, 2010

This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.

Tags : webroot, web security threat, remote access, malware, viruses, spyware, phishing, threat protection
    
By: Webroot UK     Published Date: Mar 22, 2010

The components required of an effective web security solution are many and varied, including a range of tools that guard against specific types of threats

Tags : webroot, web security service, cloud computing, web threats, business process automation, anti spam, anti spyware, anti virus
    
By: Google Postini     Published Date: Mar 09, 2010

Based on detailed feedback from actual end users, the Nemertes PilotHouse Awards give insight into the quality, effectiveness, customer service, and overall satisfaction of "Security-as-a-Service" vendors.

Tags : google message security, secure messaging, saas, security as a service, anti spam, anti spyware, anti virus, email security
    
By: ESET     Published Date: Feb 17, 2010

Analysis of ESET's ThreatSense.Net®, a sophisticated malware reporting and tracking system, shows that the highest number of detections this month, with almost 9.90%, was the Win32/Conficker class of threat.

Tags : eset, threats, malware reporting, tracking system, win32/conficker, threatsense.net, security, anti spam
    
By: ESET     Published Date: Feb 17, 2010

View this ESET Monthly UK threat report to find out the top computer threats in the UK.

Tags : eset, computer threats, threatsense.net, virus lab, malware, antivirus, trojan, security protection
    
By: ESET     Published Date: Feb 17, 2010

This paper is designed to provide a basic understanding of what heuristics are and how they are used in the anti-malware industry.

Tags : eset, teaching heuristics, anti-malware, encryption, polymorphism, signature detection, intrusion, threats
    
By: ESET     Published Date: Feb 11, 2010

This document combines the thoughts of both Research teams in ESET Latin America and ESET, LLC into a single paper, proposing a comprehensive vision of how the threatscape is likely to evolve in 2010.

Tags : eset, cybercrime, security, threat, crimeware, botnets, malware, social engineering
    
By: ESET     Published Date: Feb 11, 2010

Why all the hype? Is cyberwarfare really something enterprise information security professionals should be concerned about? It's hard to know what the next cyber crisis will be, but here are a few best practices that enterprise security teams should consider to avoid becoming victims.

Tags : eset, cyberwarfare, threat, enterprise information security, botnet, cyberattack, malware, anti spyware
    
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.