• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

virus

Results 276 - 300 of 303Sort Results By: Published Date | Title | Company Name
By: Managed Systems, Inc.     Published Date: Aug 14, 2008
No matter the size of the business, technology plays a critical role in its financial success. At the most basic level, companies have to deal with desktop and laptop computers for all their employees, e-mail, access to the Internet, Blackberries, and other kinds of on-site and remote devices. Add networking issues like viruses, spam and bandwidth utilization, and suddenly, this effort becomes a major challenge to anyone operating a small or mid-sized business (SMBs) with limited resources and a limited budget.
Tags : 
network management, smb, small business, medium business, mid-sized business, smb networks, managed systems, it services, outsourcing, outsourced it, managed services, managed systems, tech support, it solutions, security, compliance, disaster recovery, it management, infrastructure, small business networks
    
Managed Systems, Inc.
By: VMware     Published Date: Feb 20, 2009
Hopefully your business will never have to experience a major disaster. But having an effective disaster recovery plan with sufficient documentation, adequate testing, and well trained staff will increase your chances of survival when faced with a minor or major catastrophe.
Tags : 
vmware, disaster recovery plan, threats, viruses, worms, trojans, smb, security, anti spam, anti spyware, anti virus, disaster recovery, security management
    
VMware
By: MessageLabs     Published Date: Jul 02, 2009
This whitepaper looks at the value of email and outlines the issues and concerns of IT Managers involved in managing and maintaining business critical emails systems. Learn more today!
Tags : 
messagelabs, email manager, email, it management, microsoft exchange server, viruses, spyware, spam, disaster recovery, compliance, international computing
    
MessageLabs
By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
By: Data Guard Systems, Inc     Published Date: May 06, 2009
Whether and organization or an individual, identity theft spells a long, expensive, and complex recovery process. However, online identity theft can be prevented with encryption software and advanced password protection.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, data security, security
    
Data Guard Systems, Inc
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial services providers—from the solo accounting professional to the midsize accounting firm to world’s largest corporation, from CPAs to CFPs to credit counselors—have never been as challenging as they are in today’s turbulent times. And although the large data breaches at the most recognizable companies receive the most publicity, small companies and solo offices can also be victims, according to the Better Business Bureau.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
By: 4Retail     Published Date: Nov 19, 2009
If you find yourself under the burden of mass emails and wasting valuable time sifting through volumes of unnecessary information, read on to find out why you are not alone and how you can change your working practices by looking to alternative ways of communicating.
Tags : 
email overload, communication, document management, problem of spam, project management, global sourcing, global sourcing management, on demand collaboration solution, email viruses, communication tool, growing inboxes, document upload, email security, content management system, email archiving
    
4Retail
By: Symantec.cloud     Published Date: Sep 01, 2010
This is the second part of a three-part white paper series. Part 2 describes how organizations can develop a security profile for themselves that will show them which of the Stage 1 controls they most need to build up and strengthen.
Tags : 
messagelabs us, it security, smb, security profile, anti virus, anti spam, firewalls, vulnerability, encryption, identity management, vulnerability management
    
Symantec.cloud
By: Symantec.cloud     Published Date: Nov 29, 2010
This paper will look at aligning security processes, the human element of security, with the latest security technologies - creating a secure barrier against today's most insidious threats.
Tags : 
messagelabs symantec hosted services, best practices, security process, security technology, threats, anti-virus, anti spam, anti spyware, anti virus, application security, business continuity, internet security, security management
    
Symantec.cloud
By: Symantec.cloud     Published Date: Jan 28, 2011
In this new MessageLabs whitepaper, learn about the latest spammer ploy to get dangerous links past traditional defenses, and how MessageLabs delivers a proven, cost-effective solution.
Tags : 
symantec cloud, search engine link spam, messagelabs, viruses, trojans, spyware, phishing, url, universal resource locator, anti spam, anti spyware, anti virus, cloud computing
    
Symantec.cloud
By: Software Security Solutions     Published Date: Jun 28, 2010
Legacy Antivirus Software slowing you down? If you are ready to change, this white paper shows how to choose what's best!
Tags : 
software security, antivirus software, malware, anti spam, anti spyware, anti virus, internet security, security management
    
Software Security Solutions
By: Software Security Solutions     Published Date: Jun 28, 2010
Ready to change Antivirus Software? Read this comparison white paper first!
Tags : 
software security, endpoint security, antivirus software, malware, anti spam, anti spyware, anti virus, internet security, security management
    
Software Security Solutions
By: Lumension     Published Date: Mar 28, 2011
Learn three strategies to effectively take control of organizational endpoints and mitigate the rising risk from application viruses in this whitepaper.
Tags : 
lumension, organizational endpoint, risk mitigation, application virus, operating system, microsoft, anti spam, anti spyware, anti virus, risk management
    
Lumension
By: ESET, LLC.     Published Date: Jan 18, 2011
Read about how ESET NOD32 Antivirus 4.2.64.12 extends its unbroken run of VB100 success for yet another month!
Tags : 
eset, nod32 antivirus 4.2.64.12, vb100 certification, malware, rap test, detection, anti spam, anti spyware, anti virus, internet security, intrusion detection, intrusion prevention
    
ESET, LLC.
By: ESET, LLC.     Published Date: Oct 27, 2011
If you're looking to evaluate antivirus software based on its price, you're missing the larger picture. You need an antivirus solution that will work with today's complicated infrastructures that include virtualization, you need proactive protection from malware and you need an antivirus solution that won't rob your employees of productivity. Register for the "Finding the Right Antivirus Solution e-Kit" to better understand what goes into the process of evaluating antivirus software.
Tags : 
eset, technology, security, anti virus, internet security, anti spam, application security, identity management, security management, vulnerability management
    
ESET, LLC.
By: ESET, LLC.     Published Date: Oct 27, 2011
Get the information you need to make the right decision through this presentation. Register for the "Finding the Right Antivirus Solution e-Kit" to watch this webcast to get answers to your questions around effectiveness, performance, environmental fit and usage, management efficiency, and more.
Tags : 
eset, technology, security, internet security, anti virus, anti spam, application security, intrusion prevention, security management, security policies
    
ESET, LLC.
By: Webroot     Published Date: Jul 08, 2011
This paper reviews the business value of IT security, illustrates the business case for SaaS over "do it yourself" premise-based solutions, and outlines what to look for in SaaS solutions you can adopt with confidence and count on as you grow.
Tags : 
webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center, information security, anti spyware, anti virus, application security, internet security, network security appliance
    
Webroot
By: Symantec     Published Date: Oct 07, 2014
Symantec Endpoint Protection 12.1 was, once again, positioned as a Leader in Gartners Magic Quadrant and rated highest in the ability to execute. Read the report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned. * 10 reports published since 2002; previous titles include the Magic Quadrant for Enterprise Antivirus.
Tags : 
endpoint protection, growth drivers, challenges, vendor position, antivirus, magic quadrant, security
    
Symantec
By: Cisco     Published Date: Oct 07, 2014
Malware has changed considerably since the early PC viruses appeared more than 25 years ago. Today, it evolves so quickly that many customers find staying ahead of the latest threat nearly impossible. If the explosion in malware variants werent enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isnt whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.
Tags : 
email, malware, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, mitigate, cloud, hybrid, on-premises, networking, security
    
Cisco
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally. The paper explains that no manually handling of files, such as with USB drives, is unnecessary when you set up a secure network architecture using five zones of protection. You can transfer files to and from your network around the globe, and know the data and the network are secure, automatically scanning files to block dangerous data while allowing "clean" data into the network. The paper notes several reasons why it matters that data is secure while remaining accessible.
Tags : 
viruses, malware, hackers, leaks, supply chain interruptions, stuxnet, scada, usb, multi-zone architecture, dmz, security, it management, document management, information management, secure content management
    
Globalscape
By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common browser vulnerabilities used to execute attacks, what attackers do next to take control of the system, and how to catch it before the attacker moves further into your network
Tags : 
end-user protection, cyberattacks, browser vulnerabilities, security management, modern threats, threat sharing, security products, firewall, anti-virus, network intrusion detection, vulnerability management, infrastructure, anti spyware, anti virus, application security, email security, firewalls, hacker detection, internet security, intrusion detection
    
AlienVault
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter