Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

anti virus

Results 76 - 100 of 227Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Feb 06, 2013
How do rogue programs work - and how do you protect yourself and your business? Three best practices to keep these unwanted programs out of your networks.
Tags : 
fake alerts, fake anti-virus, rogue programs, rogue applications, scareware, endpoint url filtering, web gateway, anti virus
    
McAfee
Published By: Webroot UK     Published Date: Sep 25, 2013
Have you seen a lot of articles and blog posts with titles like “Is Antivirus Dead?” If so, there is a good reason: Traditional signature-based antivirus technology is rapidly heading toward obsolescence.
Tags : 
reinventing the virus, antivirus, webroot security, client cloud, architecture, rollback, technology, antivirus technology, networking, security, enterprise applications
    
Webroot UK
Published By: McAfee EMEA     Published Date: Mar 14, 2018
The AV-TEST Institute, a leading international and independent service provider in the fields of IT security and anti-virus research, has given McAfee Endpoint Security (ENS) a Top Product Award in their latest corporate Windows7 test. AV-Test evaluated the most recent version 10.5.3 of McAfee Endpoint Security and gave it a score of 17.5 out of a possible 18. Both Usability and Protection earned perfect scores of 6 out of 6, with Performance achieving a near-perfect score of 5.5 out of 6.
Tags : 
    
McAfee EMEA
Published By: Panda Security     Published Date: Jan 16, 2008
A new white paper from Panda Security discusses the new breed of silent online threats that can bypass traditional antivirus programs and penetrate even the most highly 'protected' networks.  Additionally, the sheer volume of malware has overwhelmed the antivirus industry as a whole. Collective Intelligence is a new global security model specifically designed to combat the next evolution of malicious code.
Tags : 
malware, virus, anti-virus, spyware, anti-spyware, anti-malware, bot, botnet, trojan, dos, denial of service, hacker, phish, phishing, panda, panda security, security
    
Panda Security
Published By: Panda Security     Published Date: Feb 06, 2008
Today’s targeted malware attacks are infecting unsuspecting businesses at astonishing rates, rendering traditional antivirus solutions ineffective. Reported and known viruses are becoming less important compared to the increase in unknown threats and attacks.
Tags : 
security, threats, ips, intrusion prevention, internet security, hackers, hacker, virus, antivirus, anti-virus, holes, vulnerability, vulnerabilities, panda, panda security, network security
    
Panda Security
Published By: DataMotion     Published Date: Oct 01, 2008
After years of transferring many business activities online to take advantage of the benefits of the Internet, companies have now spent billions of dollars on antivirus software and other security measures. High-profile outbreaks and breaches reported in the international media have helped drive them to implement security measures that protect their customers and their brands while still growing their businesses...Download this paper to read more.
Tags : 
certifiedmail technology, email security, message security, encryption, security
    
DataMotion
Published By: GFI Software     Published Date: Feb 24, 2012
This free fully-functioning 30-day trial of GFI VIPRE Business is designed to optimize overall performance by melding antivirus and antispyware together into one powerful engine. Test drive VIPRE Business today.
Tags : 
gfi, anti virus, anti spyware, technology, security, business technology
    
GFI Software
Published By: GFI Software     Published Date: Mar 06, 2012
Register to receive an in-depth look at the newest features of VIPRE Business 5.0.
Tags : 
    
GFI Software
Published By: Webroot UK     Published Date: Nov 11, 2009
This report highlights ways Best-in-Class organizations harden themselves against threats from email.
Tags : 
webroot, email security, threats, spam, data security policy, knowledge management, performance management, encrytion, anti virus, data loss prevention, integrate email, web security, pace framework, ddos
    
Webroot UK
Published By: Webroot UK     Published Date: Nov 11, 2009
This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.
Tags : 
webroot, web security threat, phishing, antivirus, ddos, data leak, threat protection, configuration, compliance, remote work, network security, remote access, remote network management
    
Webroot UK
Published By: Webroot UK     Published Date: Nov 11, 2009
Software as a Service (SaaS)-delivered e-mail and Web security suites offer a good solution that Butler Group recommends as part of a more comprehensive security architecture comprising gateway and end point-based security solutions. Find out more in this whitepaper!
Tags : 
webroot, saas, software-as-a-service, web security, email security, policy-based encryption, security management, data loss prevention, anti-virus, threat protection
    
Webroot UK
Published By: Symantec.cloud     Published Date: Aug 10, 2010
This white paper examines a Web security solution that gives companies the ability to monitor and enforce their Internet usage policies, bringing site monitoring and URL filtering together while insuring security with anti-virus and anti-spyware protection.
Tags : 
messagelabs us, messagelabs hosted web security, employee web use, web security, employee monitoring, internet misuse, url filtering
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Aug 10, 2010
This industry report covers the email gateway market. Gartner, Inc. positions Gartner in the Leaders quadrant in its 2010 Magic Quadrant for Secure Email Gateways (anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention).
Tags : 
messagelabs, hosted symantec services, gartner magic quadrant, secure email gateway, anti-spam, anti-virus, email encryption, intrusion prevention, phishing detection, security as service, secaas
    
Symantec.cloud
Published By: Shavlik Technologies     Published Date: Dec 14, 2010
DBSi recognized a need for more robust systems management and were seeking a single vendor with broad-reaching capabilities that could be leveraged across their entire customer base.
Tags : 
shavlik security, dbsi, hosted service, smbs, systems management, patch deployment, antivirus, mobile workforce
    
Shavlik Technologies
Published By: Shavlik Technologies     Published Date: Dec 14, 2010
Whalen Furniture needed an improved patch management solution that was more efficient, less time consuming, reduced risk, and ensured uptime on a 24/7 basis to support the needs of a rapidly growing global company.
Tags : 
shavlik security, system protection, automated patch management, risk, antivirus, patch deployment, manufacturing
    
Shavlik Technologies
Published By: Dell     Published Date: Mar 02, 2012
By now the fundamentals of computer and network security are familiar to almost everyone who interacts with a PC on a regular basis: install antivirus software, choose good passwords and protect them and download and install software updates. Despite these measures, businesses of all sizes continue to suffer security breaches.
Tags : 
dell, mobile data, mobile devices, smartphones, it planning, technology, it management, small business, technology trenfs
    
Dell
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
South Staffordshire College: A U.K. college with 4 campuses, 4,000 students and 500 employees became frustrated with its Kaspersky antivirus and discovered that VIPRE proves robust malware defense doesn’t have to disrupt operations, slow down machines or be difficult to manage.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, vipre, kaspersky
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
Stillwater Medical Center: Healthcare provider with 1,000 employees chooses VIPRE after its old antivirus kept crashing systems, disrupting operations and failing to protect against malware infections. Learn how this hospital cured its antivirus ills with VIPRE.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, vipre, hospital
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
AtNetPlus - As an IT services company on the front lines of network defense, AtNetPlus takes choosing antivirus software very seriously. After rigorous testing of multiple antivirus products, their IT specialist chose VIPRE for its small footprint and reliable malware detections.
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, vipre, atnet
    
ThreatTrack Security
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: • The common challenges of data security • Steps to solve these challenges • And much more
Tags : 
data security, data protection, network security, firewall security, it security, technology security, anti virus
    
Citrix ShareFile
Published By: Trend Micro SPN     Published Date: Sep 23, 2009
To keep ahead of the threats, you need to rethink your security and ask whether traditional security technologies are up to today's challenges. This eBook explains how correlating web, email and file reputations within a smart protection network is core to Outthinking the cyber criminals.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, data leakage protection, dlp, smart security, data-stealing
    
Trend Micro SPN
Published By: Trend Micro SPN     Published Date: May 15, 2009
Measuring the effectiveness of your security infrastructure is key to any enterprise as threats change on a minute by minute basis. See an example of the report you would receive following a Trend Micro Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, threat discovery, worms, trojans, infected, recovering, instant messaging
    
Trend Micro SPN
Published By: Trend Micro SPN     Published Date: Nov 24, 2009
A report sampling over 100 large enterprises that explores the types of cost savings that can be gained by employing a comprehensive content security solution with a cloud client architecture. The report concludes total savings of up to 40% can be achieved.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, cloud computing
    
Trend Micro SPN
Published By: Trend Micro SPN     Published Date: Nov 24, 2009
How do you measure security effectiveness? Conventional security solutions may appear to be holding back targeted malware attacks but this eBook shows you how to check the performance of your current infrastructure. Whether you are 'secure', 'infected' or 'recovering', you can benefit from a Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, infected, recovering, instant messaging
    
Trend Micro SPN
Published By: Kaspersky Lab     Published Date: Feb 18, 2014
Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection" to learn more.
Tags : 
kaspersky, it security, cost of production, total cost, hidden costs, cloud computing, mobile devices, web applications, virtualization, vulnerabilities, it spending, security spending, malware writers, cybercriminals, anti-malware, it environment, virus detection, software protection, security, it management
    
Kaspersky Lab
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.