Anti Virus White Papers

Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). In the virus dictionary approach, when the antivirus software examines a file, it refers to a dictionary of known viruses that the authors of the antivirus software have identified.
Results 276 - 300 of 459Sort Results By: Published Date | Title | Company Name
By: M86 Security     Published Date: Feb 08, 2011

This white paper discusses a technology that proactively takes security a step further by enabling the safe use of Web 2.0, and therefore, maintaining productivity while mitigating the malware threat altogether.

Tags : m86 security, productivity, web repair, malware protection, social networking, web 2.0, erp, crm
By: Arbor Networks     Published Date: Feb 04, 2011

Download this paper to learn how to evaluate your risk vs. the expected returns from investing in a DDoS defense solution.

Tags : ddos protection, arbor networks, dns, domain name system, distributed denial of service, botnet, ddos defense solution, roi calculation
By: Astaro     Published Date: Jan 19, 2011

Botnets are based on similar principles as legitimate clouds, but serve malicious business interests. Find out more about how botnets work and the right steps after having detected infected machines within your own network.

Tags : astaro, cloud computing, botnets, network, security, network management, anti spam, anti spyware
By: ESET, LLC.     Published Date: Jan 18, 2011

Download this Tech Brief to learn the five common complaints IT professionals have with antivirus software and how you can find software that does the job right.

Tags : eset, antivirus software, malware, it professional, security, anti spam, anti spyware, anti virus
By: NetIQ     Published Date: Jan 12, 2011

Addressing the potential for insider threats is an often overlooked security imperative for virtually all organizations worldwide.

Tags : netiq, insider threat, security, audits, access control, enterprise software, anti spam, anti spyware
By: Shavlik Technologies     Published Date: Dec 15, 2010

Critical IT operations require solutions that are architected for today. Solutions that take a new look at modern technology, modern threats, and modern business reality. Read this white paper for more information.

Tags : shavlik, endpoint management, security strategy, it operation, threats, sensitive data, data center, hacker
By: Shavlik Technologies     Published Date: Dec 14, 2010

DBSi recognized a need for more robust systems management and were seeking a single vendor with broad-reaching capabilities that could be leveraged across their entire customer base.

Tags : shavlik security, dbsi, hosted service, smbs, systems management, patch deployment, antivirus, mobile workforce
By: Shavlik Technologies     Published Date: Dec 14, 2010

Whalen Furniture needed an improved patch management solution that was more efficient, less time consuming, reduced risk, and ensured uptime on a 24/7 basis to support the needs of a rapidly growing global company.

Tags : shavlik security, system protection, automated patch management, risk, antivirus, patch deployment, manufacturing, anti virus
By: M86 Security     Published Date: Dec 01, 2010

This white paper addresses the risks that concern IT security professionals, many of which they feel powerless to control.

Tags : m86 security, web security, malware protection, web 2.0 application, information exchange, collaboration, business enablement, anti spam
By: Lumension     Published Date: Nov 19, 2010

Learn how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.

Tags : lumension security, usb insecurity, universal serial bus, enterprise, policy, risk mitigation, productivity tool, data loss
By: Lumension     Published Date: Nov 18, 2010

No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.

Tags : lumension, endpoint, risk management, server operating system, third-party application, protection, anti virus, malware
By: Google Apps     Published Date: Nov 05, 2010

This paper will explain the ways Google creates a security-based platform for offering its Google Apps products, covering topics like information security, physical security and operational security.

Tags : messaging, collaborate, collaboration, security, google security, google apps, anti spam, anti spyware
By: M86 Security     Published Date: Nov 02, 2010

This white paper examines the Crimeware industry and the Web-based methods currently used to sustain cybercrime.

Tags : m86 security, real-time code analysis, malware threats, cybercrime, anti-virus, anti spam, anti spyware, anti virus
By: M86 Security     Published Date: Nov 01, 2010

This paper will outline the evolution of APTs, explain the motivation behind them, and determine best practices for defending against these threats.

Tags : m86 security, threats, best practices, phishing, vulnerability, advanced persistent threats, apts, anti spam
By:     Published Date: Sep 28, 2010

Recently, a new worm, commonly known as "here you have" used old mass-mailer techniques to spread rapidly across the Internet, effectively shutting down the email servers of many large companies.

Tags : messagelabs, symantec hosted services, embedded links, worm, security, malware, anti spam, anti spyware
By:     Published Date: Sep 14, 2010

Understand the extent of the costs you risk incurring if you have either no or inadequate protection in place.

Tags :, messagelabs symantec hosted services, email threat, email security, hacking, anti spam, anti spyware, anti virus
By: IBM     Published Date: Aug 30, 2010

All enterprises dealing with private data in test environments should mask or generate test data to comply with regulations such as Payment Card Industry (PCI), the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley (SOX), and European Union (EU) as well as to protect against internal and external attacks.

Tags : ibm, test data privacy, compliance, data masking, payment card industry, pci, security, database
By: Software Security Solutions     Published Date: Aug 23, 2010

ESET NOD32 Centrally Managed Business Edition. The Thinking Person's Solution.

Tags : software security, eset business edition, free trial, anti-virus software, smb, nod32, anti virus protection system, anti spam
By: Lumension     Published Date: Aug 15, 2010

Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment.

Tags : cyber security, application security, risk management, third party applications, endpoint security, cyber crime, anti virus, hacker detection
By:     Published Date: Aug 10, 2010

This paper will discuss how the Internet bandwidth is a finite and expensive resource that needs protection from spammers, criminals, hackers, time-wasters and employee misuse.

Tags : messagelabs us, symantec hosted services, internet bandwidth, security, data protection, employee misuse, security safeguard, employee monitoring
By:     Published Date: Jul 06, 2010

Read our white paper to understand the changing web threat in 2010 & equip your business to defend against it.

Tags : messagelabs symantec, web threat, malware, threat detection, web security services, anti spam, anti spyware, anti virus
By: MessageLabs Ltd.     Published Date: Jun 10, 2010

With huge volumes of spam circulating the internet and news spam making up a big proportion of this potentially business-compromising threat, your organisation needs to ensure it has effective protection in place.

Tags : messagelabs symantec, security safeguard, email spam, malware, anti spam, anti spyware, anti virus, email security
By: MessageLabs Ltd.     Published Date: Jun 10, 2010

Based on a survey of 273 IT managers, we reveal the top ten web threats to business and outline a solution that uses MessageLabs Security Safeguard, why they matter and how to protect your business from each of them.

Tags : messagelabs symantec, web threat, security safeguard, malware, web security services, anti spam, anti spyware, anti virus
By: MessageLabs Ltd.     Published Date: Jun 10, 2010

Read our latest whitepaper & create a step-by-step approach to IT security that will work for your business.

Tags : messagelabs symantec, it security, malware, security management, anti spam, anti spyware, anti virus, internet security
By:     Published Date: Apr 27, 2010

We surveyed 273 managers in IT & our research reveals the Top 10 Web Security Threats; And How to Solve Them.

Tags : messagelabs symantec, web security threat, malware, bandwidth, bandwidth management, anti spam, anti spyware, anti virus
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.