Anti Virus White Papers

Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). In the virus dictionary approach, when the antivirus software examines a file, it refers to a dictionary of known viruses that the authors of the antivirus software have identified.
Results 276 - 300 of 479Sort Results By: Published Date | Title | Company Name
By: Shavlik Technologies     Published Date: Apr 14, 2011

This whitepaper will cover the challenges of relying exclusively on either AV or patch and configuration management for threat resistance and why a combined approach is the best option.

Tags : shavlik, anti-malware, patch management, configuration management, virtualization, malware, anti-virus, protection
    
By: Shavlik Technologies     Published Date: Apr 14, 2011

This white paper will illustrate how implementing an effective power management strategy, complete with easy-to-deploy technology, will enable an organization to reduce costs, improve security and become a greater steward of the environment.

Tags : shavlik, power management, security, cyberattacks, internet attacks, lan, wake-on-lan, csci
    
By: Shavlik Technologies     Published Date: Apr 14, 2011

This paper will look at ways federal government agencies can maintain a strong and effective patch management program by seamlessly integrating third party patch management solutions into existing SCCM infrastructure.

Tags : shavlik, patch management, sccm, vulnerability management, security, patch detection, compliance, network security
    
By: Shavlik Technologies     Published Date: Apr 14, 2011

This webinar will cover the challenges of relying exclusively on either AV or patch and configuration management for threat resistance and why a combined approach is the best option.

Tags : shavlik, anti-malware, patch management, configuration management, virtualization, malware, anti-virus, protection
    
By: Google     Published Date: Apr 04, 2011

On demand version of this webinar. Today' s computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents

Tags : google, spam, malware, security, webinar, identity management, anti spam, anti virus
    
By: Globalsign Inc.     Published Date: Apr 01, 2011

This white paper explains the epidemic threat of hackers injecting hidden malware into websites and the negative effect on the brand and traffic to the victim website when blacklisted by Google as a "harmful" website.

Tags : globalsign, hackalert, blacklisting, malware, drive by downloads, malware distribution, hacked websites, malware injection
    
By: GFI Software     Published Date: Mar 31, 2011

In this white paper, Osterman Research discusses how the daily occurrence of malware within organizations has become decidedly worse over the past several years.

Tags : gfi, sunbelt, messaging, web security best practices, threats, anti spam, anti spyware, anti virus
    
By: Lumension     Published Date: Mar 30, 2011

Download this Lumension white paper from Web Buyer's Guide to learn the best defense against malware is intelligent whitelisting

Tags : lumension, anti-virus software, malware, intelligent whitelisting, blacklisting, point of sale terminal, ecommerce server, atm machine
    
By: Lumension     Published Date: Mar 30, 2011

Learn how to protect against what comes in your environment via USB in this Lumension white paper from Web Buyer's Guide

Tags : lumension, usb, malware, security, data loss, threat, cybersecurity, anti spam
    
By: Lumension     Published Date: Mar 12, 2011

Studies show that even though most organizations use AV, more and more are succumbing to attacks.

Tags : virus, antivirus, whitelisting, endpoint security, anti spam, anti spyware, anti virus, application security
    
By: Arbor Networks     Published Date: Mar 07, 2011

Download this paper to learn how emerging botnet and DDoS threats are identified, analyzed and mitigated to help protect organizations like yours from their impact.

Tags : ddos attacks, arbor networks, botnet, distributed denial of services, asert, yoyoddos botnet, bot, anti virus
    
By: Symantec.cloud     Published Date: Mar 02, 2011

Most companies already have an endpoint security solution in place. But a single security product is not sufficient to address the challenges of securing and managing the endpoint. This paper explains how a hosted endpoint solution can help.

Tags : symantec.cloud, messagelabs, endpoint security, security threats, anti spam, anti spyware, anti virus, security management
    
By: GFI Software     Published Date: Feb 24, 2011

Read the results of a survey focused on enterprise antivirus users and discover why customers love VIPRE Antivirus Business.

Tags : gfi software, sunbelt, vipre business, antivirus solution, security, enterprise antivirus survey, anti spam, anti spyware
    
By: GFI Software     Published Date: Feb 24, 2011

This white paper, sponsored by GFI Software, addresses the variety of issues facing organizations today in the context of their system management challenges, and discusses the capabilities of VIPRE Antivirus Business, an integrated platform that provides high performance, integrated endpoint protection capabilities.

Tags : gfi software, sunbelt, malware protection, system management, threats, endpoint infrastructure, viruses, worms
    
By: GFI Software     Published Date: Feb 24, 2011

This white paper discusses the risks to business operations that are created as a result of this performance degradation.

Tags : gfi software, sunbelt, performance degradation, enterprise antimalware software, anti spam, anti spyware, anti virus, application performance management
    
By: GFI Software     Published Date: Feb 24, 2011

The goal of this guide is to raise awareness in organizations of the importance of security and how they can deal with the threats.

Tags : gfi software, sunbelt, security consideration, small and medium-sized enterprises, threats, security, anti spam, anti spyware
    
By: VeriSign     Published Date: Feb 10, 2011

This white paper will help you understand the threat from malware and how it can impact your online business.

Tags : verisign, malware security, data protection, anti spam, anti spyware, anti virus, security management
    
By: VeriSign     Published Date: Feb 10, 2011

This paper will show how code signing works, how attacks can be mounted against unsigned software, (including autoupdate software), and how real-world signing systems protect software vendors, enterprises and end users.

Tags : verisign, ssl spoofing attack, code protection, security, code signing certificates, malicious software, anti spam, anti spyware
    
By: CREDANT Technologies     Published Date: Feb 10, 2011

This short white paper will examine some of the important aspects of insider threat and will offer some guidance on how to reduce the risk.

Tags : credant technologies, insider threat, risk management, security, encryption, vulnerability, anti spam, anti spyware
    
By: CREDANT Technologies     Published Date: Feb 10, 2011

This two-part whitepaper will address some of the best practice approaches that you may wish to evaluate and potentially adopt in order to reduce the risk of USB devices becoming the source of a significant leak or virus infection.

Tags : credant technologies, removable media, best practices, security, usb device, corporate governance, virus infection, anti spam
    
By: M86 Security     Published Date: Feb 08, 2011

This white paper discusses a technology that proactively takes security a step further by enabling the safe use of Web 2.0, and therefore, maintaining productivity while mitigating the malware threat altogether.

Tags : m86 security, productivity, web repair, malware protection, social networking, web 2.0, erp, crm
    
By: Arbor Networks     Published Date: Feb 04, 2011

Download this paper to learn how to evaluate your risk vs. the expected returns from investing in a DDoS defense solution.

Tags : ddos protection, arbor networks, dns, domain name system, distributed denial of service, botnet, ddos defense solution, roi calculation
    
By: Astaro     Published Date: Jan 19, 2011

Botnets are based on similar principles as legitimate clouds, but serve malicious business interests. Find out more about how botnets work and the right steps after having detected infected machines within your own network.

Tags : astaro, cloud computing, botnets, network, security, network management, anti spam, anti spyware
    
By: ESET, LLC.     Published Date: Jan 18, 2011

Download this Tech Brief to learn the five common complaints IT professionals have with antivirus software and how you can find software that does the job right.

Tags : eset, antivirus software, malware, it professional, security, anti spam, anti spyware, anti virus
    
By: NetIQ     Published Date: Jan 12, 2011

Addressing the potential for insider threats is an often overlooked security imperative for virtually all organizations worldwide.

Tags : netiq, insider threat, security, audits, access control, enterprise software, anti spam, anti spyware
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.