Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

antivirus security

Results 26 - 50 of 65Sort Results By: Published Date | Title | Company Name
Published By: ESET, LLC.     Published Date: Jan 18, 2011
Download this Tech Brief to learn the five common complaints IT professionals have with antivirus software and how you can find software that does the job right.
Tags : 
eset, antivirus software, malware, it professional, security
    
ESET, LLC.
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
Great thinkers like Aristotle, Descartes and Elon Musk have said that, in order to solve really hard problems, you have to get back to first principles. First principles in a designated problem space are so fundamental as to be self-evident; so true that no expert in the field can argue against them.
Tags : 
palo alto, antivirus, security, security value, prevention
    
Palo Alto Networks
Published By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the new LANDesk® Antivirus solution, available as an add-on to LANDesk® Management Suite and LANDesk® Security Suite, provides a competitively priced, front-line malware and malicious code defense for all network endpoints, including workstations, file servers, mail systems and Internet gateways.
Tags : 
network security, security, anti virus, virus, viruses, antivirus, anti-virus, malware, internet security, web security, endpoint security, end point security, end-point security, intrusion prevention, landesk
    
LANDesk
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Proofpoint     Published Date: Apr 06, 2012
Email Security: Gartner, Inc. positions Proofpoint in the Leaders quadrant in its 2011 Magic Quadrant for the Secure Email Gateway (email security, anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention) market.
Tags : 
secure email, email security, spam, virus, encryption, phishing, anti-spam solution, cloud intelligence, dlp, saas, virus filtering, spam filtering, archiving, antivirus, email encryption, transport layer security, tls, network intrusion prevention system, gartner email security magic quadrant, 2011
    
Proofpoint
Published By: CrowdStrike     Published Date: Mar 15, 2017
It’s time to upgrade your organization’s legacy Antivirus (AV). Here is what you need to know before replacing your AV solution. The Guide to AV Replacement provides in-depth information from leading security experts that will guide you through each phase of your decision-making process. From the critical elements you need to consider to how to evaluate and review solutions, you’ll get expert advice that can help you choose a security solution that best fits your organization’s requirements.
Tags : 
    
CrowdStrike
Published By: Webroot     Published Date: Jul 08, 2011
This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service.
Tags : 
webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center, information security
    
Webroot
Published By: Trend Micro SaaS     Published Date: Sep 01, 2009
This comprehensive hosted service blocks email threats before they can touch the network, integrating powerful anti-spam and anti-phishing with award-winning antivirus and anti-spyware. Security leader Trend Micro updates and tunes the solution to keep the customer's network secure while saving valuable IT resources.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security, remote manager
    
Trend Micro SaaS
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: GFI     Published Date: Sep 17, 2012
The IT Security Kit provides everything you need to accurately assess antivirus solutions. Included in the kit is a 30-day trial of VIPRE Antivirus Business, the antivirus software proven to meet the security needs of IT professionals everywhere.
Tags : 
    
GFI
Published By: LogicNow     Published Date: Mar 10, 2016
Layered Security in less than 10 minutes. All from a single, easy to use dashboard. Try MAX free for 30-days!
Tags : 
msp, layerd security, web protection, antivirus, patch management, software, web security, bandwidth, security, it management, enterprise applications, data center
    
LogicNow
Published By: Symantec.cloud     Published Date: May 11, 2012
Businesses need to protect users from viruses, spyware and unauthorized intrusion - most use antivirus software. But is it enough? And can it meet the evolving security risks associated with a remote workforce? Please complete the form below to download this FREE whitepaper and understand the challenges of delivering endpoint security in an increasingly mobile environment.
Tags : 
    
Symantec.cloud
Published By: Cisco     Published Date: Jan 28, 2009
Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.
Tags : 
cisco, network security, business continuity issues, acceptable use policy, e-mail and communications technology, antivirus policy, password policy, identity policy, encryption policy, remote access policy, firewall, vpn, intrusion prevention, content security, networking, security
    
Cisco
Published By: Panda Security     Published Date: Feb 06, 2008
Today’s targeted malware attacks are infecting unsuspecting businesses at astonishing rates, rendering traditional antivirus solutions ineffective. Reported and known viruses are becoming less important compared to the increase in unknown threats and attacks.
Tags : 
security, threats, ips, intrusion prevention, internet security, hackers, hacker, virus, antivirus, anti-virus, holes, vulnerability, vulnerabilities, panda, panda security, network security
    
Panda Security
Published By: McAfee     Published Date: Feb 06, 2013
Traditional antivirus or intrusion prevention systems are no match for the new breed of attacks; enterprises need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.
Tags : 
security connected, stealthy attacks, rootkits, os level protection, hardware assisted security, endpoint security
    
McAfee
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Traditional antivirus (AV) is not the solution to preventing security breaches on the endpoint – it is the problem. AV is no longer effective at stopping today’s cyberthreats. Although AV satisfies many regulatory, governance and compliance requirements, it saddles organizations with hidden costs while providing little to no real security value.
Tags : 
palo alto, antivirus, security, security value, prevention
    
Palo Alto Networks
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance
Published By: Webroot UK     Published Date: Sep 25, 2013
Have you seen a lot of articles and blog posts with titles like “Is Antivirus Dead?” If so, there is a good reason: Traditional signature-based antivirus technology is rapidly heading toward obsolescence.
Tags : 
reinventing the virus, antivirus, webroot security, client cloud, architecture, rollback, technology, antivirus technology, networking, security, enterprise applications
    
Webroot UK
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
INDUSTRY Education BUSINESS CHALLENGE Protect student data from threats posed by malware on teachers’ MacBook laptops IT ENVIRONMENT Avast antivirus, enterprise network security layers SOLUTION Malwarebytes Incident Response RESULTS Removed PUPs and malware from hundreds of Mac systems in just minutes Delivered instant visibility into connected systems and quarantined malware Reduced risk with ability to proactively detect and remediate threats
Tags : 
    
MalwareBytes EMEA
Published By: DataMotion     Published Date: Oct 01, 2008
After years of transferring many business activities online to take advantage of the benefits of the Internet, companies have now spent billions of dollars on antivirus software and other security measures. High-profile outbreaks and breaches reported in the international media have helped drive them to implement security measures that protect their customers and their brands while still growing their businesses...Download this paper to read more.
Tags : 
certifiedmail technology, email security, message security, encryption, security
    
DataMotion
Published By: Webroot     Published Date: Nov 02, 2012
This paper looks at this problem and how Webroot, by going back to the drawing board on counering malware threats, is revolutionizing endpoint protection and solving the issues that hinder existing endpoint security solutions.
Tags : 
antivirus protection, endpoint protection, endpoint security, malware, security
    
Webroot
Published By: Webroot     Published Date: Jul 08, 2011
This paper reviews the business value of IT security, illustrates the business case for SaaS over "do it yourself" premise-based solutions, and outlines what to look for in SaaS solutions you can adopt with confidence and count on as you grow.
Tags : 
webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center, information security
    
Webroot
Published By: Rapid7     Published Date: Mar 19, 2014
In this guide, penetration testers will learn how to evade anti-virus detection on target machines for your Metasploit pen tests. This guide will be most useful to readers who already have some penetration testing experience and are familiar with Metasploit Pro.
Tags : 
rapid7, security, anti virus, virus protection, antivirus, spam, hackers, internet security, penetration testing, intrusion prevention, network security
    
Rapid7
Published By: ESET, LLC.     Published Date: Oct 27, 2011
Get the information you need to make the right decision through this presentation. Register for the "Finding the Right Antivirus Solution e-Kit" to watch this webcast to get answers to your questions around effectiveness, performance, environmental fit and usage, management efficiency, and more.
Tags : 
eset, technology, security, internet security, anti virus
    
ESET, LLC.
Published By: CDW-Trend Micro     Published Date: Aug 04, 2015
This is a whitepaper about how organizations are constantly under attack from increasingly advanced cyber adversaries.
Tags : 
ecosystem, cyber attack, antivirus, security, single vendor, endpoint, digital, web, holistic, email systems, hosted service
    
CDW-Trend Micro
Start   Previous    1 2 3    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.