Anti Virus White Papers

Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). In the virus dictionary approach, when the antivirus software examines a file, it refers to a dictionary of known viruses that the authors of the antivirus software have identified.
Results 1 - 25 of 418Sort Results By: Published Date | Title | Company Name
By: Websense     Published Date: Jul 08, 2014

A white paper by Websense examining how anomalies in crash reports can be used to detect unknown threats.

Tags : detecting unknown threats, websense, next-generation firewall, anti spam, anti spyware, anti virus, application security, encryption
    
By: Websense     Published Date: Jul 08, 2014

This paper provides 5 essentials for protecting against advanced persistent threats (APTS)

Tags : apts, understanding apts, apt security strategy, anti spam, anti spyware, anti virus, hacker detection, internet security
    
By: Websense     Published Date: Jul 08, 2014

A white paper on the shortest path to prevention and risk production.

Tags : protecting ip data, dlp implementation, websense data security suite, anti spam, anti spyware, anti virus, internet security, intrusion detection
    
By: Websense     Published Date: Jul 08, 2014

This paper reports on a independent third party test of Websense Triton Web Security Gateway Anywhere against four competing products.

Tags : websense, wsga, web security, testing of web security, web security products compared, phising, malicious redirects, access control
    
By: Kaspersky     Published Date: May 20, 2014

Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.

Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
    
By: General Dynamics Fidelis Cybersecurity     Published Date: May 20, 2014

Join Gigaom Research and our sponsor General Dynamics Fidelis Cybersecurity Solutions for “The Modern Perimeter and More: Countering Advanced Security Threats,” a free analyst on-demand webinar.

Tags : fidelis, internet security, web security, cyber attacks, security threats, hackers, modern security threats, cyber criminals
    
By: Kaspersky     Published Date: Feb 14, 2014

Even if you have adequate antivirus protection, are there still holes in your IT security armor? Is lack of bandwidth to manage the growing list of threats, endpoints, and security systems making your organization vulnerable?

Tags : cybersecurity, hackers, data protection, secure networks, antivirus, virus, firewall, anti spam
    
By: Kaspersky     Published Date: Feb 14, 2014

Download our Guide to the Threat Landscape to have access to a wealth of IT security intelligence.

Tags : security intelligence, malware, spam, spyware, firewall, internet security, anti spam, anti spyware
    
By: Norse     Published Date: Oct 22, 2013

As cyberattacks and fraud continue to increase in frequency and sophistication, organizations are placing a greater emphasis on cyberthreat intelligence as a way to protect against compromise, data breach, and losses from online fraud. Measuring the true value of threat intelligence has been difficult however. For the first time the Ponemon Institute has conducted a study that reveals the facts behind the impact that weak threat intelligence is having on organizations.

Tags : threat, cyber security, impact report, threat intelligence, it security, cyber threat, data breach, security attacks
    
By: Palo Alto Networks     Published Date: Jun 19, 2014

APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.

Tags : palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers
    
By: Cisco     Published Date: Jun 16, 2014

A Cisco white paper on mitigating email virus attacks

Tags : email security, cisco, email virus, security, inbound and outbound risks, mitigating attacks, anti spam, anti spyware
    
By: Cisco     Published Date: Jun 16, 2014

A Cisco white paper on mitigating email virus attacks

Tags : email security, cisco, email virus, security, inbound and outbound risks, anti spyware, anti virus, internet security
    
By: Cisco     Published Date: Jun 16, 2014

Solution At-A-Glance eBook on Cisco Web Security

Tags : access control, anti spam, anti spyware, anti virus, email security, internet security, web service security
    
By: Cisco     Published Date: Jun 12, 2014

U.K. energy contractor reduces total cost of ownership while improving customer service and adopting new ways of working.

Tags : cisco, unified communications solutions, borderless network infrastructure, cisco ironport security, case study, access control, anti spam, anti spyware
    
By: Cisco     Published Date: Jun 12, 2014

A Cisco white paper on mitigating email virus attacks

Tags : email security, cisco, email virus, security, inbound and outbound risks, anti spam, anti spyware, anti virus
    
By: Cisco     Published Date: Jun 12, 2014

Solution At-A-Glance eBook on Cisco Web Security

Tags : cisco web security, malware, high risk sites, anti spam, anti spyware, anti virus, email security, internet security
    
By: Kaspersky     Published Date: Apr 24, 2014

This paper aims to provide guidance on identifying the right security approach for your virtual environment, achieved through the correct balance between security and performance.

Tags : security, virtualization, security approaches, kaspersky, anti spam, anti spyware, anti virus, application security
    
By: Kaspersky     Published Date: Apr 24, 2014

This paper aims to provide advice on the new security issues that mobile brings, providing an evaluation of the available mobile technologies and the options to best secure your company.

Tags : mobile security, byod, mobile threat, malware, spyware, protection, anytime anywhere, cybercrime
    
By: Rapid7     Published Date: Mar 19, 2014

In this guide, penetration testers will learn how to evade anti-virus detection on target machines for your Metasploit pen tests. This guide will be most useful to readers who already have some penetration testing experience and are familiar with Metasploit Pro.

Tags : rapid7, security, anti virus, virus protection, antivirus, spam, hackers, internet security
    
By: Symantec     Published Date: Mar 14, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : symantec, security intelligence, attacks, cyber attacks, hackers, web security, data protection, targeted attacks
    
By: Lumension     Published Date: Feb 07, 2014

Sit in on an expert panel discussion about the concerns of cyber security for businesses.

Tags : lumension, securing configurations, apt attacker, persistent threats, memory-based attacks, information security, it regimes, threat solution
    
By: McAfee     Published Date: Jan 28, 2014

SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.

Tags : siem, sans, endpoint, network, correlation, integration, anti spyware, anti virus
    
By: McAfee     Published Date: Jan 28, 2014

NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.

Tags : epp, endpoint, protection, threats, malware, nss, anti spam, anti spyware
    
By: McAfee     Published Date: Jan 28, 2014

AV-TEST preforms a comparative review of McAfee, Microsoft, and Symantec endpoint protection to pro-actively protect against zero-day attacks.

Tags : av-test, deep defender, rootkits, detection, anti spam, anti spyware, anti virus, application security
    
By: McAfee     Published Date: Jan 28, 2014

BizTech reviews McAfee's easy-to-manage endpoint encryption solutions for securing end-user and company data.

Tags : endpoint encryption, epolicy orchestrator, drive encryption, anti spam, anti spyware, anti virus, encryption, internet security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.