• RSS
  • Twitter
  • FaceBook
Home > White Papers > Technology > Security > Anti Spyware

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

Anti Spyware

Anti-Spyware programs can combat spyware in two ways:1. Real-time protection, which prevents the installation of spyware2. Detection and removal of spyware.Many anti-spyware/adware tools require a frequently-updated database of threats.
Results 301 - 325 of 479Sort Results By: Published Date | Title | Company Name
By: Symantec.cloud     Published Date: Mar 02, 2011
Most companies already have an endpoint security solution in place. But a single security product is not sufficient to address the challenges of securing and managing the endpoint. This paper explains how a hosted endpoint solution can help.
Tags : 
symantec.cloud, messagelabs, endpoint security, security threats, anti spam
    
Symantec.cloud
By: VeriSign     Published Date: Feb 10, 2011
This white paper will help you understand the threat from malware and how it can impact your online business.
Tags : 
verisign, malware security, data protection, anti spam, anti spyware
    
VeriSign
By: VeriSign     Published Date: Feb 10, 2011
This paper will show how code signing works, how attacks can be mounted against unsigned software, (including autoupdate software), and how real-world signing systems protect software vendors, enterprises and end users.
Tags : 
verisign, ssl spoofing attack, code protection, security, code signing certificates
    
VeriSign
By: CREDANT Technologies     Published Date: Feb 10, 2011
This short white paper will examine some of the important aspects of insider threat and will offer some guidance on how to reduce the risk.
Tags : 
credant technologies, insider threat, risk management, security, encryption
    
CREDANT Technologies
By: CREDANT Technologies     Published Date: Feb 10, 2011
This two-part whitepaper will address some of the best practice approaches that you may wish to evaluate and potentially adopt in order to reduce the risk of USB devices becoming the source of a significant leak or virus infection.
Tags : 
credant technologies, removable media, best practices, security, usb device
    
CREDANT Technologies
By: M86 Security     Published Date: Feb 08, 2011
This white paper discusses a technology that proactively takes security a step further by enabling the safe use of Web 2.0, and therefore, maintaining productivity while mitigating the malware threat altogether.
Tags : 
m86 security, productivity, web repair, malware protection, social networking
    
M86 Security
By: ESET, LLC.     Published Date: Jan 18, 2011
Download this Tech Brief to learn the five common complaints IT professionals have with antivirus software and how you can find software that does the job right.
Tags : 
eset, antivirus software, malware, it professional, security
    
ESET, LLC.
By: NetIQ     Published Date: Jan 12, 2011
Addressing the potential for insider threats is an often overlooked security imperative for virtually all organizations worldwide.
Tags : 
netiq, insider threat, security, audits, access control
    
NetIQ
By: Shavlik Technologies     Published Date: Dec 15, 2010
Critical IT operations require solutions that are architected for today. Solutions that take a new look at modern technology, modern threats, and modern business reality. Read this white paper for more information.
Tags : 
shavlik, endpoint management, security strategy, it operation, threats
    
Shavlik Technologies
By: M86 Security     Published Date: Dec 01, 2010
This white paper addresses the risks that concern IT security professionals, many of which they feel powerless to control.
Tags : 
m86 security, web security, malware protection, web 2.0 application, information exchange
    
M86 Security
By: Lumension     Published Date: Nov 19, 2010
Learn how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
Tags : 
lumension security, usb insecurity, universal serial bus, enterprise, policy
    
Lumension
By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : 
lumension, endpoint, risk management, server operating system, third-party application
    
Lumension
By: M86 Security     Published Date: Nov 02, 2010
This white paper examines the Crimeware industry and the Web-based methods currently used to sustain cybercrime.
Tags : 
m86 security, real-time code analysis, malware threats, cybercrime, anti-virus
    
M86 Security
By: M86 Security     Published Date: Nov 01, 2010
This paper will outline the evolution of APTs, explain the motivation behind them, and determine best practices for defending against these threats.
Tags : 
m86 security, threats, best practices, phishing, vulnerability
    
M86 Security
By: Symantec.cloud     Published Date: Sep 28, 2010
Recently, a new worm, commonly known as "here you have" used old mass-mailer techniques to spread rapidly across the Internet, effectively shutting down the email servers of many large companies.
Tags : 
messagelabs, symantec hosted services, embedded links, worm, security
    
Symantec.cloud
By: Symantec.cloud     Published Date: Sep 14, 2010
Understand the extent of the costs you risk incurring if you have either no or inadequate protection in place.
Tags : 
symantec.cloud, messagelabs symantec hosted services, email threat, email security, hacking
    
Symantec.cloud
By: IBM     Published Date: Aug 30, 2010
All enterprises dealing with private data in test environments should mask or generate test data to comply with regulations such as Payment Card Industry (PCI), the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley (SOX), and European Union (EU) as well as to protect against internal and external attacks.
Tags : 
ibm, test data privacy, compliance, data masking, payment card industry
    
IBM
By: Software Security Solutions     Published Date: Aug 23, 2010
ESET NOD32 Centrally Managed Business Edition. The Thinking Person's Solution.
Tags : 
software security, eset business edition, free trial, anti-virus software, smb
    
Software Security Solutions
By: Symantec.cloud     Published Date: Aug 10, 2010
This paper will discuss how the Internet bandwidth is a finite and expensive resource that needs protection from spammers, criminals, hackers, time-wasters and employee misuse.
Tags : 
messagelabs us, symantec hosted services, internet bandwidth, security, data protection
    
Symantec.cloud
By: Symantec.cloud     Published Date: Aug 10, 2010
This industry report covers the email gateway market. Gartner, Inc. positions Gartner in the Leaders quadrant in its 2010 Magic Quadrant for Secure Email Gateways (anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention).
Tags : 
messagelabs, hosted symantec services, gartner magic quadrant, secure email gateway, anti-spam
    
Symantec.cloud
By: Symantec.cloud     Published Date: Jul 06, 2010
Read our white paper to understand the changing web threat in 2010 & equip your business to defend against it.
Tags : 
messagelabs symantec, web threat, malware, threat detection, web security services
    
Symantec.cloud
By: MessageLabs Ltd.     Published Date: Jun 10, 2010
With huge volumes of spam circulating the internet and news spam making up a big proportion of this potentially business-compromising threat, your organisation needs to ensure it has effective protection in place.
Tags : 
messagelabs symantec, security safeguard, email spam, malware, anti spam
    
MessageLabs Ltd.
By: MessageLabs Ltd.     Published Date: Jun 10, 2010
Based on a survey of 273 IT managers, we reveal the top ten web threats to business and outline a solution that uses MessageLabs Security Safeguard, why they matter and how to protect your business from each of them.
Tags : 
messagelabs symantec, web threat, security safeguard, malware, web security services
    
MessageLabs Ltd.
By: MessageLabs Ltd.     Published Date: Jun 10, 2010
Read our latest whitepaper & create a step-by-step approach to IT security that will work for your business.
Tags : 
messagelabs symantec, it security, malware, security management, anti spam
    
MessageLabs Ltd.
By: Symantec.cloud     Published Date: Apr 27, 2010
We surveyed 273 managers in IT & our research reveals the Top 10 Web Security Threats; And How to Solve Them.
Tags : 
messagelabs symantec, web security threat, malware, bandwidth, bandwidth management
    
Symantec.cloud
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter