Anti Virus Protection White Papers

(View All Report Types)
Remote Vendor Access: Not All Access Should Be Treated Equally
sponsored by Dell Software
WHITE PAPER: This white paper explains why Remote Vendor Access (RVA) should not be treated the same as traditional remote access for employees. Explore how a new set of remote access requirements can ensure that your enterprise remains in step with both compliance regulations and security expectations.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

Dell Software

The CIO's Guide to Mobile Security
sponsored by BlackBerry
WHITE PAPER: Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
Posted: 03 Mar 2009 | Published: 07 Apr 2010

BlackBerry

Security For Virtualization: Finding the Right Balance
sponsored by Kaspersky
WHITE PAPER: While virtualization is becoming a standard practice, the security of those environments is lagging behind. It's clear that the options for securing VMs have created an unhappy compromise between protection, performance and management. Discover how to avoid undercutting the benefits of virtualization while maintaining a well-protected environment.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

Kaspersky

First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies
sponsored by ArcSight, an HP Company
WHITE PAPER: The purpose of this benchmark study is twofold. First, we wanted to quantify the economic impact of a cyber attack. Second, we believed a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

ArcSight, an HP Company

Online Enemy #1: Blackhole Exploit Kit
sponsored by Threat Track Security
WHITE PAPER: This short white paper offers key insight and advice for combatting Blackhole malware attacks on your organization's machines. Learn how to successfully thwart these types of threats with automated, centralized software patching.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

Threat Track Security

BDNA for Security: Strengthened Security Through Visibility
sponsored by BDNA
WHITE PAPER: Lack of visibility is the root cause for security breaches. Without the enhanced protection of the latest discovery applications, your entire network will be exposed to high risk, lower revenue and lost customers. Read now to learn how the right discovery solutions offer enhanced and automated protection for your infrastructure.
Posted: 07 Jun 2011 | Published: 07 Jun 2011

BDNA

Symantec Backup Exec™ System Recovery 8: The Gold Standard in Complete Windows System Recovery
sponsored by Symantec Corporation
WHITE PAPER: Symantec Backup Exec™ System Recovery 8 is the gold standard in complete Windows® system recovery, allowing businesses and IT to recover from system loss or disaster in minutes, not hours or days.
Posted: 20 Mar 2008 | Published: 01 Dec 2007

Symantec Corporation

Four Principles of Effective Threat Protection: Defining the right strategy and tools to defend your business against malware
sponsored by Sophos
WHITE PAPER: Threat protection requires an updated approach now that the classic model of anti-virus plus firewall is no longer enough. Best practice calls for interlocking layers of protection that support your business processes and digital assets. Read on to learn principles you can use to strike a balance between enabling business and ensuring security.
Posted: 25 Jun 2010 | Published: 24 Jun 2010

Sophos

Why Customers Love VIPRE Business
sponsored by GFI Software
WHITE PAPER: This paper examines that selecting and anti-virus solution for your organization is an important decision. VIPRE Business offers an easy-to-use management console that gets you up and running fast.
Posted: 14 Mar 2011 | Published: 11 Mar 2011

GFI Software

Drive-by Downloads--The Web Under Siege
sponsored by Kaspersky
WHITE PAPER: In this white paper, we will explore what actually happens during a drive-by attack, the lures used to perpetrate attacks, the technology behind the attacks, and the use of drive-by download attacks in personal data theft and computer takeovers.
Posted: 19 Aug 2009 | Published: 19 Aug 2009

Kaspersky