Software  >   Systems Software  >   Security Software  >   Internet Security Software  >  

Anti-Spyware Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Antispyware, Antispyware Software, Anti-Spy Software
DEFINITION: A spam cocktail (or anti-spam cocktail) is the use of several different technologies in combination to successfully identify and minimize spam. The use of multiple mechanisms increases the accuracy of spam identification and reduces the number of false positives. A spam cocktail puts each e-mail message through a series of tests that provides a numeric score showing how likely the message is to be  … 
Definition continues below.
Anti-Spyware Software Reports
1 - 25 of 120 Matches Previous Page  |  Next Page
Analyzing Consumer IT Security Bad Habits that are Coming into the Office
sponsored by WinMagic
WHITE PAPER: This analytical white paper delves into the false sense of security employees live within as well as the facts and truths about the lack of data security measures in place to mitigate risks. View now to learn how to eliminate user bad habits.
Posted: 29 Jun 2015 | Published: 24 Feb 2014

WinMagic

Shore Up Your Office365 Attack Surface
sponsored by SearchSecurity.com
EBOOK: This exclusive e-guide reviews the Microsoft Office 365 suite including the security benefits and challenges you will encounter.
Posted: 18 Jun 2015 | Published: 15 Jun 2015

SearchSecurity.com

Ensuring Security in Virtualized Environments
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores how to reap the maximum security benefits for VMware Network Extensible (NetX)/NSX environments.
Posted: 11 Jun 2015 | Published: 03 Jun 2015

Fortinet, Inc.

Re-Assessing APT and Network Security
sponsored by Threat Track Security
WHITE PAPER: In this white paper, take an in-depth look at how advanced attack campaigns are constructed and why traditional security approaches are failing to detect and mitigate them. View now to learn how to re-assess your security strategy.
Posted: 26 May 2015 | Published: 13 May 2015

Threat Track Security

SQL Injection: How to Sidestep the Oldest Hacking Trick in the Books
sponsored by EE
WHITE PAPER: In this white paper, gain insight into the basics of SQL injection attacks and why hackers haven't retired it yet. Continue reading to learn what steps to take to close easily exploitable vulnerabilities in your security strategy.
Posted: 20 May 2015 | Published: 06 May 2015

EE

As Enterprise Mobility Usage Escalates, So Does Security Risk
sponsored by HID
WHITE PAPER: In this expert white paper, examine how to tame the mobile security beast through two-factor authentication and single-sign-on approaches. Continue reading to learn how other organizations are bringing harmony to the UX vs. IT security debate and other steps you can take to protect data and apps.
Posted: 18 May 2015 | Published: 08 May 2015

HID

Preventing Attackers from Getting What They Want
sponsored by SecureAuth
WHITE PAPER: This white paper explores the anatomy of an attack and why preventative measures inevitably fail. Read on to learn how a two-factor authentication strategy limits the usefulness of any credentials that a hacker may have acquired or created.
Posted: 11 May 2015 | Published: 25 Mar 2015

SecureAuth

Top 10 Firewall Shopping Checklist
sponsored by Juniper Networks, Inc.
RESOURCE: In this white paper, you will learn the 10 necessary functions of a next-gen firewall to mitigate evolving dynamic threats.  View this helpful buyer's guide now to learn more.
Posted: 11 May 2015 | Published: 06 May 2015

Juniper Networks, Inc.

What to Do When Anti-Virus Isn't Enough
sponsored by Malwarebytes Corporation
VIDEO: Recently, cybercriminals have learned how to get around most anti-virus software, making traditional security measures too weak to really protect you. Take a look at this brief video to learn how you can add anti-malware to the anti-virus you're already using for an added layer of protection.
Posted: 07 May 2015 | Premiered: 03 Jun 2013


Building a Layered Defense Against Data Breaches
sponsored by Absolute Software
WEBCAST: This webcast explores how a tri-layered security strategy can help protect you from a continuous barrage of malware. View now to learn why encryption is not enough to protect data and why endpoint security can pick up where traditional perimeter defenses leave off.
Posted: 05 May 2015 | Premiered: Dec 15, 2014

Absolute Software

Keeping Applications Safe with Whitelisting
sponsored by Digital Guardian
EGUIDE: This eguide outlines the basics of whitelisting filtering approaches and explores how to use them for advanced malware protection.
Posted: 27 Apr 2015 | Published: 08 Apr 2015

Digital Guardian

Keep Software Secure Using RASP
sponsored by Prevoty
EGUIDE: This expert e-guide explores if RASP is the savior of security officers or if it's just the new flavor of the week. View now to learn about the two approaches to RASP and the potential red flags of using this technology.
Posted: 27 Apr 2015 | Published: 01 Apr 2015

Prevoty

Advancing Cyber-security Measures from the Inside
sponsored by VMware
RESOURCE: This infographic teaches you how to secure your network and data center from the inside and add to your perimeter defenses.
Posted: 20 Apr 2015 | Published: 11 Dec 2014

VMware

Securing Apps from the First Line of Code
sponsored by White Hat Security
WHITE PAPER: This white paper teaches you how to integrate security analysis into apps from the moment the first line of code is written to reduce risks. View now to learn how to discover and remedy vulnerabilities during the development process in real-time.
Posted: 16 Apr 2015 | Published: 28 Oct 2014

White Hat Security

The Paradigm Shift in Cybersecurity
sponsored by UnitedLex
WHITE PAPER: This white paper explores why hackers have the upper hand and why organizations need to ramp up security measures regardless of their current status.
Posted: 13 Apr 2015 | Published: 08 Oct 2014

UnitedLex

5 Steps to SSL Decryption
sponsored by Gigamon
WHITE PAPER: This white paper explores an alternative, five step SSL decryption strategy.  View now to learn more
Posted: 13 Apr 2015 | Published: 15 Oct 2014

Gigamon

SSL Decryption for Visibility into Emerging Threat Sources
sponsored by Gigamon
WEBCAST: This webcast explores a new approach to SSL security and decryption.  View now to learn more and how to enhance your current security solutions.
Posted: 09 Apr 2015 | Premiered: Oct 28, 2014

Gigamon

SSL Accerleration Checklist
sponsored by Blue Coat Systems
WHITE PAPER: This white paper explores the challenges of SSL management and offers steps to remedy them. Read on to explore the critical requirements checklist for an SSL acceleration platform.
Posted: 06 Apr 2015 | Published: 09 Oct 2013

Blue Coat Systems

Next-Gen Security Analytics - 7 Necessary Functions
sponsored by Blue Coat Systems
WHITE PAPER: This white paper examines security analytics in depth and the seven functions a security analytics platform needs to have.
Posted: 03 Apr 2015 | Published: 09 Jul 2014

Blue Coat Systems

Markets and Bounties for Cybercrime Tools and Stolen Data
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper examines the fundamental characteristics of black and grey markets to offer understanding of the current and predicted security threat landscape.
Posted: 27 Mar 2015 | Published: 04 Dec 2014

Juniper Networks, Inc.

Top 3 DNS Monitoring Methods
sponsored by Cloudmark
EGUIDE: This expert e-guide walks you through the top three DNS monitoring methods. Additionally, read on to uncover how defense tactics are revealed through DNS attacks.
Posted: 26 Mar 2015 | Published: 11 Feb 2015

Cloudmark

5 Steps to Designing a Next-Gen Firewall
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper offers a five step program to designing a next-gen firewall to keep out malicious attacks.  View now to learn more.
Posted: 26 Mar 2015 | Published: 20 Oct 2014

Juniper Networks, Inc.

Insight into Hacker Economics
sponsored by Juniper Networks, Inc.
WEBCAST: This webcasts takes a closer look at the current and historical trneds in crybercrime methods and tools and how the market is maturing.
Posted: 26 Mar 2015 | Premiered: Mar 27, 2014

Juniper Networks, Inc.

Endpoint Protection Platforms for Enterprises
sponsored by Symantec Corporation
WHITE PAPER: This guide explores a unique enterprise endpoint protection platform that encompasses a multitude of security tools.
Posted: 14 Feb 2014 | Published: 08 Jan 2014

Symantec Corporation

Antivirus Evaluation Guide
sponsored by Threat Track Security
WHITE PAPER: In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.
Posted: 13 Sep 2013 | Published: 31 Dec 2012

Threat Track Security
1 - 25 of 120 Matches Previous Page    1 2 3 4    Next Page
 
ANTI-SPYWARE SOFTWARE DEFINITION (continued): …  spam. Scores are computed and the message is assigned a probability rating. For example, it may be determined that a message has 85% probability that it is spam. E-mail administrators can create rules that govern how the messages are handled based on their scores; the highest scores may be deleted, medium scores may quarantined, and lower scores may be delivered but marked with a spam warning.A spam cocktail commonly includes several of the following identification methods, which may be weighted differently for message scoring:Machine learning: Implementing sophisticated computer algorithms that … 
Anti-Spyware Software definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement