Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Virus Detection Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Virus Detection, Anti-Virus Software, Antivirus Software, Computer Virus Detection Software, Virus Protection Software, Antivirus, Virus Scanning Software, Worm Detection Software
DEFINITION: Antivirus (or "anti-virus") software is a class of program that searches your hard drive and floppy disks for any known or potential viruses. The market for this kind of program has expanded because of Internet growth and the increasing use of the Internet by businesses concerned about protecting their computer assets.
Virus Detection SoftwareWhite Papers (View All Report Types)
1 - 25 of 73 Matches Previous Page  | Next Page
Imperva Security Solutions
sponsored by Imperva
WHITE PAPER: This whitepaper describes a comprehensive security suite that protects digital assets in their repositories and detects abnormal behaviors from compromised users to protect sensitive company data from intruders.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Imperva

Improving Windows Client Performance and Security: An Impact Comparison of AC and Traditional AV
sponsored by Lumension
WHITE PAPER: This Tolly Test report compares the effectiveness of both anti-virus and application control solutions to help you decide which would work best for your enterprise. View now to uncover which approach provides greater performance across diverse workloads and protects against more threats to keep your endpoints safe and secure.
Posted: 24 Jul 2013 | Published: 03 May 2013

Lumension

CW Special report on Symantec
sponsored by ComputerWeekly.com
WHITE PAPER: This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.
Posted: 14 May 2013 | Published: 14 May 2013

ComputerWeekly.com

Antivirus Evaluation Guide
sponsored by Threat Track Security
WHITE PAPER: In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.
Posted: 13 Sep 2013 | Published: 31 Dec 2012

Threat Track Security

A Buyer's Guide to Endpoint Protection Platforms
sponsored by McAfee, Inc.
WHITE PAPER: This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012

McAfee, Inc.

Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER: Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013

Symantec Corporation

McAfee Tackles the Complexities of Endpoint Security
sponsored by McAfee, Inc.
WHITE PAPER: This white paper presents the myriad of enterprise endpoint threats today, and how you can conquer these difficult complexities.
Posted: 04 Jun 2013 | Published: 29 Mar 2013

McAfee, Inc.

The New Reality of Stealth Crimeware
sponsored by McAfee, Inc.
WHITE PAPER: This whitepaper will help you learn what you need to know about "stealthology" and how you can protect yourself against sneaky criminals. Read on and discover more about stealthy malware like Stuxnet and Zeus, developing rootkit defenses, and more.
Posted: 31 May 2013 | Published: 31 May 2013

McAfee, Inc.

The Evolving Landscape of Desktop Security
sponsored by McAfee, Inc.
WHITE PAPER: This resource will help you learn about an application control solution coupled with traditional anti-virus technology can help you address threats quickly and effectively while also keeping close track of unauthorized applications. Read on to learn more.
Posted: 30 May 2013 | Published: 30 May 2013

McAfee, Inc.

Responding to—and recovering from—sophisticated security attacks
sponsored by IBM
WHITE PAPER: In this resource, find four things you can do now to keep your organization safe. Learn what you need to know to effectively respond to and recover from sophisticated security attacks by reading on now.
Posted: 14 May 2013 | Published: 28 Feb 2013

IBM

Online Enemy #1: Blackhole Exploit Kit
sponsored by Threat Track Security
WHITE PAPER: This short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

Threat Track Security

Antivirus: The Hippest New Apple Accessory
sponsored by Threat Track Security
WHITE PAPER: For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Threat Track Security

Strategies for boosting your practice’s information immunity
sponsored by GFI LanGuard
WHITE PAPER: According to a 2011 patient privacy and data security study, 96 percent of health-care providers had at least one data breach during the previous two years. Consult this informative white paper to learn more about external threats and internal challenges of the evolving enterprise.
Posted: 31 Aug 2012 | Published: 31 Aug 2012

GFI LanGuard

Think Your Anti-Virus Software Is Working? Think Again
sponsored by Lumension
WHITE PAPER: Many people who subscribe to anti-virus offers think that's enough, however, studies show that more and more organizations are suffering from attacks because the software is inefficient. In order to prevent attacks, businesses need to take other steps for further protection.
Posted: 13 Jul 2012 | Published: 31 Mar 2011

Lumension

WP #103: How Monitoring Systems Reduce Human Error in Distributed Server Rooms and Remote Wiring Closets
sponsored by APC by Schneider Electric
WHITE PAPER: Access this white paper to learn how a basic monitoring and automation system can help reduce downtime incidents in your server room and remote wiring closet. Also inside, real-life horror stories from your peers and how they could have been prevented.
Posted: 02 May 2012 | Published: 02 May 2012

APC by Schneider Electric

Eight threats your antivirus won't stop
sponsored by Sophos, Inc.
WHITE PAPER: News headlines are a constant reminder that malware attacks and data leakage are on the rise. High-profile incidents that make big news might seem out of the ordinary. Yet businesses of every size face similar risks in the everyday acts of using digital technology and the internet for legitimate purposes.
Posted: 23 Dec 2011 | Published: 23 Dec 2011

Sophos, Inc.

The New Reality of Stealth Crimeware
sponsored by McAfee.
WHITE PAPER: The new reality of crimeware consists of the stealth, creativity and patience of stuxnet, and the commercialism, wide distribution and easy-to-use toolkits of Zeus, making it even more challenging to detect and protect against. Organisations must go beyond the traditional security to ensure their intellectual property is safe.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

McAfee.

Endpoint Protection Solutions: Why the Traditional Model is Broken
sponsored by Webroot
WHITE PAPER: Securing the enterprise may never have been a simple task, but now it is far more complex as hackers have become more creative and as the enterprise itself has extended into remote locations and as far as “the cloud.”
Posted: 10 Nov 2011 | Published: 10 Nov 2011

Webroot

Fast and Effective Endpoint Security for Business
sponsored by ESET
WHITE PAPER: This white paper demonstrates how, by combining powerful management tools, ease of use for end users, impressive performance and state-of-the-art proactive threat detection, ESET NOD32 Antivirus is the most effective way to protect your business’ valuable data assets while ensuring regulatory compliance.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

ESET

Androids in the Enterprise
sponsored by McAfee, Inc.
WHITE PAPER: McAfee is expanding its support for Android use, and keeping pace with the maturation of enterprise features in the underlying platform, such as remote management, encryption, and other crucial minimum requirements.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

McAfee, Inc.

The True Cost of Protection: Five Ways Your Anti-Malware Solution is Draining your Budget
sponsored by Kaspersky Lab
WHITE PAPER: This paper uncovers five ways your current anti-malware is draining your budget and offers a new approach to take when evaluating new anti-malware solutions.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

Kaspersky Lab

Problematic - Unloved - Argumentative (PUA): What is a potentially unwanted app
sponsored by ESET
WHITE PAPER: In this paper, discover what is a Potentially Unwanted Application (PUA) and explore the differences between threats posed by malicious types of software such as computer viruses and worms, and those which are classified as being potentially unwanted.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

ESET

GlobalSign Malware Monitoring: Protecting your website from distributing hidden malware
sponsored by GlobalSign
WHITE PAPER: This paper gives you a solution to keeping your websites safe, protecting your customers and securing the reputation of your company.
Posted: 17 May 2011 | Published: 17 May 2011

GlobalSign

Excerpts from Virus Bulletin Comparative Reviews August-December 2010
sponsored by ESET
WHITE PAPER: The basic requirements for a product to achieve VB100 certification status are that a product detects, both on demand and on access, in its default settings, all malware known to be ‘In the Wild’ at the time of the review, and generates no false positives when scanning a set of clean files.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

ESET

Virus Bulletin: Comparative Reviews August-December 2010
sponsored by ESET
WHITE PAPER: Read this paper to view the latest news and information about VB100 testing,  Windows Vista,  Windows 7, Windows Server 2003, Windows 7 Professional, and  so much more.
Posted: 14 Dec 2010 | Published: 14 Dec 2010

ESET
1 - 25 of 73 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement