HIT Consultant Insightful coverage of healthcare innovation
 

virus

Results 76 - 100 of 314Sort Results By: Published Date | Title | Company Name
Published By: HP Inc.     Published Date: Sep 16, 2019
Around the world, IT teams are answering calls from frantic employees, concerned about error messages, blue screens, viruses and unexpected accidents. When it comes to technology, you can’t always predict what’s going to happen. But you can be prepared for when these problems arise.
Tags : 
    
HP Inc.
Published By: Cisco     Published Date: Jun 16, 2014
A Cisco white paper on mitigating email virus attacks
Tags : 
email security, cisco, email virus, security, inbound and outbound risks, mitigating attacks
    
Cisco
Published By: Cisco     Published Date: Jun 16, 2014
A Cisco white paper on mitigating email virus attacks
Tags : 
email security, cisco, email virus, security, inbound and outbound risks
    
Cisco
Published By: Symantec     Published Date: Jan 31, 2013
Tolly evaluated the antivirus effectiveness within VMware vSphere 5 virtual environments for both agentless and agent-based solutions. Download the report to find out which systems were most protected.
Tags : 
virtualization, vmware, test, antivirus, security, protection
    
Symantec
Published By: Symantec     Published Date: Jan 31, 2013
Tolly benchmarked the performance of four top endpoint security vendors within VMware vSphere 5 virtual environments. Read the report to discover which solutions were the fastest.
Tags : 
virtualization, vmware, test, antivirus, security, protection
    
Symantec
Published By: Symantec     Published Date: Jan 31, 2013
Read this comparison test to find out which antivirus Protection product is right for you.
Tags : 
antivirus, endpoint, protection, security, test, comparison, symantec
    
Symantec
Published By: M86 Security     Published Date: Nov 02, 2010
This white paper examines the Crimeware industry and the Web-based methods currently used to sustain cybercrime.
Tags : 
m86 security, real-time code analysis, malware threats, cybercrime, anti-virus
    
M86 Security
Published By: Webroot     Published Date: Jul 08, 2011
This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service.
Tags : 
webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center, information security
    
Webroot
Published By: Webroot Inc     Published Date: Jan 15, 2015
The old canon of long-lived viruses with random targets created by hacktivists for fame or nuisance has given way to a new generation zeroday/hour threats from organized criminals, with hand-picked targets and specific, malicious intent. In mid-2014, on a daily basis, Webroot saw 25,000 new malicious URLs, 777,000 new unknown files, many of which are malicious, and 1,000 new phishing sites. In the face of such exponential growth, traditional, reactive security can’t hope to keep up. Not only is the volume of unknown threats overwhelming existing security solutions, but the unique characteristics of unknown threats are also making it difficult for traditional security to catch them.
Tags : 
threat intelligence, malicious ip activity, reactive security, security solutions
    
Webroot Inc
Published By: BlackBerry Cylance     Published Date: Oct 06, 2017
WannaCry Was Prevented 18 Months Ago - Advanced Threat Detection Antivirus
Tags : 
    
BlackBerry Cylance
Published By: Trend Micro     Published Date: May 03, 2018
The evolution of cyber threats ad the cybercriminal community has evolved from the days of pranksters launching annoying viruses and spam that would be considered primitive today. While enterprises make concentrated efforts to protect their critical data, the lack of correlated and contextual network visibility can leave IT security organizations unable to prioritze the threats that matter the most.
Tags : 
    
Trend Micro
Published By: ESET     Published Date: Oct 07, 2009
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology. The threat landscape facing businesses has evolved significantly, and corporations are looking for security products that can protect against known threats and prepare for future attackers in a simple-to-use architecture.
Tags : 
eset, security, threatsense, malware, threat trends, conficker, virus, agent, endpoint security, networkwide platforms, heuristic scanning, saas, proactive security, network architecture, security architecture
    
ESET
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Certain types of diseases seem to only occur within certain national boundaries. Malware is not one of them. A formidable threat to enterprise security since the 1980s, cybercrime is a truly global phenomenon, and no business is safe from its reach. A brief look at the history of malware attacks reveals a degree of variance within the virtual threat landscape that makes pinpointing and stopping such attacks extremely difficult. As the historic virus examples illustrate, the malware problem has been and will continue to be a constant threat. Since an offensive line against cybercrime is not possible, enterprises need to prepare the best defense they can.
Tags : 
entrust, malware, history, threat, concern, virus, sql, stuxnet, botnets, zeus, blackhole, fraud, credentials, digital, information
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Small- or medium-sized businesses run on hard work, dedication and loyal customers. But size shouldn’t exclude SMBs from using the proper security technology to protect online customer identities. That’s why Entrust offers nine simple tips to improve security for SMBs and end-customers alike. From basic techniques like updating software to more advanced authentication strategies, this guide ensure your business is establishing the proper security foundation in today’s hyper-connected world.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jan 16, 2015
If your company relies on passwords to prevent unauthorized computer access, or low-tech memory cards (e.g., swipe cards) for facility access, you have security on par with the average 1980s car. Smart credentials — embedded in plastic smartcards, USB tokens or mobile devices — offer companies advanced and versatile user authentication features. This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : 
entrust, security, certificate, b2b, application, browser, applications, saas, hack, web, website, migration, implementation, ssl, spam, passwords, malware, virus, systems, smb
    
Entrust Datacard
Published By: VMware     Published Date: Feb 26, 2009
In this brief, you'll learn how CA Recovery Management Products, like CA ARCserve Backup and CA XOsoft solutions, can be applied with VMware Infrastructure to help you effectively respond to the challenges and opportunities of business-critical computing.
Tags : 
vmware, business continuity, ca recovery management, ca arcserve, ca xosoft solutions, vmware infrastructure, business-critical computing, virtualization, data recovery, trojans, worms, viruses, highly available systems, disk staging, failover, replication, server architecture, mainframe technology, hardware abstraction, encapsulation
    
VMware
Published By: Symantec.cloud     Published Date: May 11, 2012
Businesses need to protect users from viruses, spyware and unauthorized intrusion - most use antivirus software. But is it enough? And can it meet the evolving security risks associated with a remote workforce? Please complete the form below to download this FREE whitepaper and understand the challenges of delivering endpoint security in an increasingly mobile environment.
Tags : 
    
Symantec.cloud
Published By: Microsoft Windows Phone     Published Date: Feb 05, 2010
Part 2 - Security tools that can boost Windows mobile security. Take a look at this list of security tools, as put together by Windows security expert Kevin Beaver.
Tags : 
microsoft, windows phone, mobile security, security tools, smartphone, network security, antivirus, backup, device encryption, mobile firewall, vpn
    
Microsoft Windows Phone
Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses how mobile devices accessing enterprise data can pose security risks.
Tags : 
mobile phone security, mobile security, mobile device security, mobile device management, malware, mobile antivirus, data encryption, ibm
    
PC Mall
Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses critical best practices including approaches for both policy and technology.
Tags : 
sonicwall, mobile security, mobile phone security, mobile device security, mobile device management, mobile antivirus, data loss prevention, malware
    
PC Mall
Published By: PC Mall     Published Date: Dec 07, 2011
This white paper discusses the impact of these security approaches as well as how mobile devices may affect network security.
Tags : 
mobile phone security, mobile security, mobile device security, mobile device management, symantec, mobile antivirus, data loss prevention
    
PC Mall
Published By: M86 Security     Published Date: Feb 09, 2011
This white paper examines the Crimeware industry and the Web-based methods currently used to sustain cybercrime.
Tags : 
m86 security, real-time code analysis, malware threats, cybercrime, anti-virus
    
M86 Security
Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This two-part whitepaper will address some of the best practice approaches that you may wish to evaluate and potentially adopt in order to reduce the risk of USB devices becoming the source of a significant leak or virus infection.
Tags : 
credant technologies, removable media, best practices, security, usb device, corporate governance, virus infection
    
CREDANT Technologies
Published By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper reviews the challenges with endpoint security in virtualized environments - including the inherent risks of dynamic virtual machines and the resource impact of security software such as virus-scanners in multiple guest virtual machines, on a single physical host.
Tags : 
trend micro, antivirus, virtual datacenter, enterprise security, virtual machines, virtualization, internet content security, smart protection network, trend micro internet security, enterprise business security, worry-free business security, web threat management, medium business, mid-sized business, mid-size, medium, anti-spam, antispam, spam filter service
    
Trend Micro Inc.
Published By: CDW     Published Date: Jun 10, 2013
Nothing puts your organization at risk like weak network security. We’ve got the people, processes and partners to deploy your first line of defense.
Tags : 
cdw, threat detected, denial of service, viruses, worns, rootkits, sensitive data, network.
    
CDW
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.