IT Management  >   Systems Operations  >   Security  >  

Virus Protection

RSS Feed    Add to Google    Add to My Yahoo!
Virus ProtectionWhite Papers (View All Report Types)
76 - 100 of 147 Matches Previous Page  | Next Page
Not all Malware Detection is Created Equal
sponsored by Sophos, Inc.
WHITE PAPER: The internet is now the number-one conduit for infecting users with malware. Sophos detects a new infected web page every few seconds. This white paper outlines the terms you need to know and the steps you should take to stay safe.
Posted: 01 Apr 2010 | Published: 05 Nov 2009

Sophos, Inc.

How Malware Can Sneak Into Your Company Networks and How to Deal With It
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: Taking your network offline might sound like the only effective way to keep viruses and other so-called malware out of your business. But even without the internet, there are still plenty of ways for malicious code to worm its way onto your network. Read this quick white paper for an overview of the main threats and how to protect against them.
Posted: 31 Mar 2010 | Published: 31 Mar 2010

AVG Technologies USA, Inc.

Global Threat Trends- February 2010
sponsored by ESET
WHITE PAPER: Review this report to see what threats had the highest number of detections in the past month according to the results of a sophisticated analysis provided by ESET's ThreatSense.Net®.
Posted: 25 Feb 2010 | Published: 25 Jan 2010

ESET

Heuristic Analysis- Detecting Unknown Viruses
sponsored by ESET
WHITE PAPER: The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

ESET

Global Threat Trends- Year-End Report 2009
sponsored by ESET
WHITE PAPER: In this paper you'll learn the most prevalent threats, including their percentage values relative to all the threats detected by ThreatSense.Net®.
Posted: 21 Jan 2010 | Published: 21 Jan 2010

ESET

Securing the Foundation of Information Technology (IT) Systems
sponsored by Trusted Computer Solutions
WHITE PAPER: This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.
Posted: 12 Jan 2010 | Published: 12 Jan 2010

Trusted Computer Solutions

Maintaining Trust: Protecting Your Web Site Users from Malware
sponsored by IBM
WHITE PAPER: This paper explores the problem of malware and how it is increasingly being delivered through legitimate Web sites. It also introduces new techniques from IBM that are designed to go beyond standard security measures to help organizations proactively defend against threats.
Posted: 31 Dec 2009 | Published: 02 Nov 2009

IBM

Symantec Report on Rogue Security Software
sponsored by Symantec Corporation
WHITE PAPER: The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. Read this report to learn the specifics about security software scams.
Posted: 10 Dec 2009 | Published: 01 Oct 2009

Symantec Corporation

A Guide to Cyber Crime Security in 2010
sponsored by eEye Digital Security
WHITE PAPER: Internet crime is easy to commit, highly lucrative, and largely under-policed. The cyber crime economy is a vibrant, worldwide market that is spreading at an alarmingly dangerous rate. This whitepaper will cover trends behind internet vulnerabilities as well as the methods and solutions available today to help combat this pandemic.
Posted: 25 Nov 2009 | Published: 25 Nov 2009

eEye Digital Security

How Bad Are the Bad Guys? - The Changing Nature of Web Security Threats
sponsored by Webroot
WHITE PAPER: This whitepaper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing, and other forms of remote access that could all potentially increase the attack surface of the organization. Read on to learn more about protecting your organization from emerging Web-based security threats.
Posted: 24 Nov 2009 | Published: 23 Sep 2009

Webroot

Why Traditional Anti-Malware Solutions Are No Longer Enough
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: Security used to be a straightforward matter. Email was the primary attack vector. Simply installing an anti-virus product and using caution with attachments was enough. Today's threats are rapidly evolving, stealthy, and targeted. Read this paper to find out where your current security solutions may be lacking and how to close that gap.
Posted: 17 Nov 2009 | Published: 17 Nov 2009

AVG Technologies USA, Inc.

Email and Web Security SaaS
sponsored by Webroot
WHITE PAPER: Read this paper to learn about the many offerings of Webroot's Software as a Service (SaaS)-delivered e-mail and Web security suites, including anti-spam, anti-spyware, anti-virus, and email archiving and encryption.
Posted: 01 Oct 2009 | Published: 14 Apr 2009

Webroot

Why You Should Consider Hosted Messaging Security
sponsored by Trend Micro GmbH
WHITE PAPER: In a major study of the hosted services market conducted by Osterman Research in 2008, antispam and virus protection were the two hosted offerings that organizations identified as services that they will likely or definitely deploy to supplement internally managed infrastructure. Read this paper to learn more.
Posted: 25 Sep 2009 | Published: 19 Feb 2009

Trend Micro GmbH

Switching from Antivirus to Software-as-a-Service (SaaS)
sponsored by Panda Security
WHITE PAPER: Security as a Service (SaaS) is the best choice for companies that wish to reduce the complexity and the infrastructure requirements of traditional antivirus solutions. The SaaS solution addresses all the security needs of today's SMBs.
Posted: 18 Sep 2009 | Published: 25 Jul 2009

Panda Security

Global Threat Trends - December 2009
sponsored by ESET
WHITE PAPER: Review this report to see what threats had the highest number of detections in the past month according to the results of a sophisticated analysis provided by ESET's ThreatSense.Net.
Posted: 16 Sep 2009 | Published: 02 Sep 2009

ESET

Guide: Patch Authority Ultimate
sponsored by ScriptLogic Corporation
WHITE PAPER: With exploits for known vulnerabilities unleashed on the Internet within as little as 5 days from the release of new patches from Microsoft, it is imperative your desktops and servers be regularly updated to keep them safe from attack.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

Drive-by Downloads--The Web Under Siege
sponsored by Kaspersky Lab
WHITE PAPER: In this white paper, we will explore what actually happens during a drive-by attack, the lures used to perpetrate attacks, the technology behind the attacks, and the use of drive-by download attacks in personal data theft and computer takeovers.
Posted: 19 Aug 2009 | Published: 19 Aug 2009

Kaspersky Lab

Lumension Endpoint Protection - Whitelisting Technology Improves Security, Reliability, and Performance via Trusted Change
sponsored by Lumension
WHITE PAPER: Learn how whitelisting guards your systems by allowing only approved processes and applications to run on the endpoint and preventing malware and viral programs. With whitelisting technology, you can improve total data security and overall system performance.
Posted: 12 Aug 2009 | Published: 01 Sep 2008

Lumension

Security Threat Report: July 2009 Update
sponsored by Sophos, Inc.
WHITE PAPER: Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
Posted: 28 Jul 2009 | Published: 01 Jul 2009

Sophos, Inc.

Managed Office Protection: Switching from AV to SaaS
sponsored by Panda Security
WHITE PAPER: Antivirus products require too much time and effort for small and mid-sized companies. Security as a Service (SaaS) means delivering traditional security applications as an Internet-based service to customers. Now you can focus on your core business, switch from Antivirus to Security as a Service and start enjoying the benefits of SaaS.
Posted: 24 Jun 2009 | Published: 01 Mar 2008

Panda Security

Running A Fully Controlled Windows Desktop Environment with Application Whitelisting
sponsored by Bit9, Inc.
WHITE PAPER: Getting control over desktop PCs is fast becoming a major strategic objective of CIOs and IT departments. This whitepaper will discuss “The Five Elements of Desktop Control” and how each are required in order to fully realize the benefits of a controlled environment.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.

Symantec Internet Security Threat Report: Trends for 2008
sponsored by Symantec Corporation
WHITE PAPER: This report provides a detailed overview of current Internet threat activity, malicious code, and known vulnerabilities. It also examines the latest trends in phishing and spam tactics and discusses how regional differences affect malicious activity globally.
Posted: 09 Jun 2009 | Published: 01 Apr 2009

Symantec Corporation

Enabling a safer internet: The positive approach to web security
sponsored by Sophos, Inc.
WHITE PAPER: This paper describes today's new web threats, highlights the need for a positive security model to replace yesterday's access-blocking approach, and describes the three pillars of protection organizations need to safeguard their systems and resources.
Posted: 09 Apr 2009 | Published: 08 Apr 2009

Sophos, Inc.

Top Five Strategies for Combating Modern Threats - Is Anti-virus Dead?
sponsored by Sophos, Inc.
WHITE PAPER: Read this whitepaper to learn about the security implications of modern threats, where emerging technologies can add real value, and five key strategies for ensuring solid malware protection.
Posted: 09 Apr 2009 | Published: 28 Oct 2008

Sophos, Inc.

Laying the IT Security Foundation
sponsored by Lumension
WHITE PAPER: Learn how in today's evolving threat landscape you need to lay the proper IT security foundation that proactively addresses the root cause of attacks such as Conficker.
Posted: 06 Apr 2009 | Published: 06 Apr 2009

Lumension
76 - 100 of 147 Matches Previous Page    2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement