• RSS
  • Twitter
  • FaceBook
Home > White Papers > Technology > Security > Anti Spyware

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

Anti Spyware

Anti-Spyware programs can combat spyware in two ways:1. Real-time protection, which prevents the installation of spyware2. Detection and removal of spyware.Many anti-spyware/adware tools require a frequently-updated database of threats.
Results 251 - 275 of 479Sort Results By: Published Date | Title | Company Name
By: Akamai     Published Date: Mar 10, 2012
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Tags : 
security, internet security, website security, online security, cloud based security
    
Akamai
By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss
    
Lumension
By: NetApp and VMware     Published Date: Jan 09, 2012
Paula Fortin of Green Mountain Power explains how their strategy for disaster recovery of their virtual infrastructure was readily possible during Hurricane Irene.
Tags : 
netapp solutions for service providers, service-oriented infrastructure (soi), secure multi-tenancy, service automation and management, data mobility
    
NetApp and VMware
By: Symantec     Published Date: Jan 04, 2012
Best Practices for Securing Your Email Server with SSL Certificates and Subject Alternative Names
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
By: Symantec     Published Date: Jan 04, 2012
Symantec SSL Certificates Provide a Secure Bridge to Trusted Cloud Hosting Providers
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
By: Symantec     Published Date: Jan 04, 2012
Download Protecting Users From Firesheep and other Sidejacking Attacks with SSL to learn how to avoid these attacks.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
By: Symantec     Published Date: Jan 04, 2012
Read this white paper and learn how to best implement a security strategy that keeps consumers' information secure.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
By: VMware Dell     Published Date: Dec 07, 2011
This white paper outlines the ways virtualization can address the challenges of traditional disaster recovery and create a viable recovery plan.
Tags : 
disaster recovery, disaster, security, risk, plan
    
VMware Dell
By: Webroot     Published Date: Dec 06, 2011
In this paper we go back to basics. We look at the kinds of security facilities needed now and in the future, and consider how to think about security
Tags : 
security, facilities, evolve, communication, collaboration
    
Webroot
By: Webroot     Published Date: Dec 06, 2011
Unlock the true business value of IT security, and learn why companies of all sizes are choosing SaaS over on-premise solutions.
Tags : 
saas, service management, nimsoft, cloud service, delivery
    
Webroot
By: HP - Enterprise     Published Date: Nov 22, 2011
HP Fortify on Demand: The quickest, most affordable way to accurately test and score the security of your applications.
Tags : 
application security, cyber-attacks, software security assurance, dast, sast
    
HP - Enterprise
By: HP - Enterprise     Published Date: Nov 22, 2011
Seven Steps to Delivering More Secure Software With all the processes that go into making an application more secure. Where do you start? Learn more
Tags : 
application security, cyber-attacks, software security assurance, dast, sast
    
HP - Enterprise
By: AT&T     Published Date: Nov 07, 2011
The sheer complexity of today's security landscape has emerged as one of the biggest risks to corporate data.
Tags : 
network vulnerability, network complexity, how to reduce network risk, vulnerability assessment, att
    
AT&T
By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.
Tags : 
malware, delivery, protect, security, security solutions
    
Blue Coat Systems UK
By: Blue Coat Systems UK     Published Date: Nov 03, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : 
blue coat, insider threats, security, social media risks, twitter risks
    
Blue Coat Systems UK
By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks
    
Blue Coat Systems UK
By: Blue Coat Systems     Published Date: Oct 25, 2011
The WebPulse delivers fast and effective Web 2.0 threat protection for 75 million users worldwide. Find out more about how WebPulse can protect you!
Tags : 
webpulse, defense, malware, security, protection
    
Blue Coat Systems
By: EdgeWave     Published Date: Oct 15, 2011
In this white paper, you'll learn top email threats beyond spam in the age of blended threats and what you can do to protect your business.
Tags : 
web filter for enterprise, web security, email security, messaging security, spam
    
EdgeWave
By: EdgeWave     Published Date: Oct 15, 2011
Today's uncertain economic climate demands that you do a thorough assessment before you invest. Here's a concise list of steps that will help you achieve the best return on your Web filtering dollar.
Tags : 
edgewave, web filter for enterprise, web security, email security, messaging security
    
EdgeWave
By: EdgeWave     Published Date: Oct 15, 2011
This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.
Tags : 
e-policy best practices, web filter for enterprise, web security, email security, messaging security
    
EdgeWave
By: ESET, LLC.     Published Date: Sep 21, 2011
This report presents a comparative analysis on the performance and usability of 7 security solutions from some of the world's largest security vendors
Tags : 
eset, smb, antivirus software, malware, it professional
    
ESET, LLC.
By: Trend Micro Inc.     Published Date: Sep 21, 2011
Fake Antivirus (AV) or rogue antivirus software has been prevalent in the market today and has affected millions of computers. This document aims to educate users on how Fake AV arrives on a computer's system and what are the available Trend Micro solutions to combat this threat.
Tags : 
tend micro, fake antivirus, technology, software, anti spyware
    
Trend Micro Inc.
By: ESET     Published Date: Sep 07, 2011
In this report, we investigate the implementation details of the malware and the ways in which it is distributed, and consider the cybercriminals' objectives.
Tags : 
eset, tdl, x64, cybercriminal, cybercrime
    
ESET
By: ESET     Published Date: Sep 07, 2011
This paper gives some examples of "potentially unwanted" and "potentially unsafe" applications, explaining how they differ from out-and-out malware.
Tags : 
eset, pua, potentially unwated application, software, unsafe
    
ESET
By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper reviews the challenges with endpoint security in virtualized environments - including the inherent risks of dynamic virtual machines and the resource impact of security software such as virus-scanners in multiple guest virtual machines, on a single physical host.
Tags : 
trend micro, antivirus, virtual datacenter, enterprise security, virtual machines
    
Trend Micro Inc.
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter