anti virus

Results 151 - 175 of 227Sort Results By: Published Date | Title | Company Name
By: BlackBerry Cylance     Published Date: Jul 02, 2018
VolitionRx Limited is a multi-national company which develops new ways to detect cancer. Their ideal product needed to be reliable, efficient, and easily manageable for their modestly-sized IT department. Additionally, the solution had to be readily deployable to their operations in four separate countries. According to Daniel Halter, Group IT Manager at Volition, traditional antivirus vendors were “offering the same old solution only slightly jazzier. The model they were offering, although new, was and is the same thing that has been around for a while.” Daniel also stated that Volition had little time to determine which vendors are “selling the truth and which ones are selling the dreams.” Seeking an ideal match, Daniel reached out to Khipu Networks for their security recommendation. Khipu Networks suggested CylancePROTECT®, Cylance’s artificial intelligence endpoint security product. Read the full case study to learn about the results Cylance was able to deliver.
Tags : volitionrx, cyber, security, data
     BlackBerry Cylance
By: BlackBerry Cylance     Published Date: Jul 02, 2018
The 21st century marks the rise of artificial intelligence (AI) and machine learning capabilities for mass consumption. A staggering surge of machine learning has been applied for myriad of uses — from self-driving cars to curing cancer. AI and machine learning have only recently entered the world of cybersecurity, but it’s occurring just in time. According to Gartner Research, the total market for all security will surpass $100B in 2019. Companies are looking to spend on innovation to secure against cyberthreats. As a result, more tech startups today tout AI to secure funding; and more established vendors now claim to embed machine learning in their products. Yet, the hype around AI and machine learning — what they are and how they work — has created confusion in the marketplace. How do you make sense of the claims? Can you test for yourself to know the truth? Cylance leads the cybersecurity world of AI. The company spearheaded an innovation revolution by replacing legacy antivirus software with predictive, preventative solutions and services that protect the endpoint — and the organization. Cylance stops zero-day threats and the most sophisticated known and unknown attacks. Read more in this analytical white paper.
Tags : cylance, endpoint, protection, cyber, security
     BlackBerry Cylance
By: BlackBerry Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : malware, predictive, test, response
     BlackBerry Cylance
By: TrendMicro     Published Date: May 09, 2011
This paper details the results of a benchmark test conducted between Trend Micro Deep Security, McAfee Total Protection for Endpoint and Symantec Endpoint Protection 11.0 in virtual environments.
Tags : trendmicro, anti-virus performance, vmware esx, virtual environments, mcafee total protection, symantec endpoint protection
     TrendMicro
By: Lumension     Published Date: Apr 15, 2011
Learn how to effectively secure endpoints with a defense-in-depth approach that includes patch management, anti-virus, application whitelisting and device control.
Tags : malware, endpoint security, anti-virus, data protection, cyberthreat
     Lumension
By: Lumension     Published Date: Mar 12, 2011
Studies show that even though most organizations use AV, more and more are succumbing to attacks.
Tags : virus, antivirus, whitelisting, endpoint security
     Lumension
By: GFI Software     Published Date: Feb 24, 2012
There are hundreds of rogue anti-malware products on the Internet that infect PCs rather than detect malware. Learn how these scams look and work and how to prevent your computer from becoming infected.
Tags : gfi software, technology, security, malware, internet security, intrustion detection, anti-virus
     GFI Software
By: GFI Software     Published Date: Feb 24, 2012
During this webcast, GFI Senior Threat Researcher Chris Boyd discussed:How to identify botnets in your systems, how to remediate botnet malware, how to maximize protection against botnets and how to educate users to prevent infections.
Tags : gfi software, technology, security, application security, anti virus, intrusion detection
     GFI Software
By: Diskeeper Corporation     Published Date: Jun 07, 2007
This paper presents the results of a Diskeeper Corporation study that examines the effects of disk fragmentation on virus scan time to verify and measure the magnitude of virus scanning speed improvement.
Tags : diskeeper, defrag, defragmentation, cleanup, disk clean, disk sweeper, maintenance, diskkeeper, disk keeper
     Diskeeper Corporation
By: Sunbelt Software     Published Date: Aug 10, 2007
Sunbelt Software engaged Osterman Research to survey organizations that are using five different email management systems including Barracuda Spam Firewall, GFI MailEssentials, McAfee GroupShield for Microsoft Exchange, and Symantec Brightmail and Sunbelt Ninja Email Security.
Tags : email management, email, email security, messaging, spam, anti spam, spyware, anti spyware, virus, anti virus, sunbelt, sunbelt software, architecture, phishing, policy based, policy-based, malware, trojan, trojans, mail server
     Sunbelt Software
By: Sunbelt Software     Published Date: Aug 04, 2008
Security is the most single critical task for any email administrator. Starting with a foundation of anti-spam and anti-virus capabilities, organizations should focus on other capabilities, as well, including policy management and a variety of other tasks designed to protect the network and the company from external and internal threats.
Tags : email security, secure messaging, secure im, exchange, exchange server, microsoft exchange, ms exchange, sunbelt, sunbelt software, security
     Sunbelt Software
By: Sunbelt     Published Date: Jan 15, 2009
This white paper, sponsored by Sunbelt Software, addresses the variety of issues facing organizations today in the context of their system management challenges, and discusses the capabilities of VIPRE Enterprise, an integrated platform that provides high-performance, integrated endpoint protection capabilities.
Tags : sunbelt software, system management, vipre enterprise, malware, anti-virus models, anti-spyware tools, security
     Sunbelt
By: Sunbelt     Published Date: Jan 15, 2009
Sunbelt Software’s new VIPRE Enterprise package is ideally suited to combating legacy and new blended malware threats from traditional viruses to the newest spam and Trojans. It optimizes overall system performance by incorporating antivirus and antispyware protection into a single engine that consumes minimal system resources and costs 50% to 75% less than competing products.
Tags : sunbelt software, bloatware, vipre enterprise, malware threats, traditional viruses, trojans, anti-virus, anti-spyware, security
     Sunbelt
By: McAfee Inc     Published Date: Aug 19, 2009
Anti-virus by itself is no longer enough to protect endpoints, especially in this age of mobile devices and business users on the go. This brief explains the key benefits of implementing an endpoint security solution with McAfee. Read more.
Tags : mcafee, security, malware, compliance, cyber criminals, midmarket, encryption, security tools, sans, data protection, security center, total security, dlp, midmarket, compliance, availability, email security
     McAfee Inc
By: Webroot     Published Date: Oct 27, 2012
An Overview by George Anderson- Product Marketing Manager May 2012
Tags : it security, endpoint security, anti-virus protection, malware protection, malware detection
     Webroot
By: CarbonBlack     Published Date: Mar 16, 2016
It is now widely recognized that antivirus software is insufficient to protect organizations, large or small, from advanced threats and targeted attacks. In response, organizations are increasingly looking to adopt proactive approaches to security, such as application control, to ensure the fidelity and security of intellectual property.
Tags : application control, advanced threats, security, proactivity approaches, security
     CarbonBlack
By: Webroot Inc     Published Date: Mar 05, 2014
In this paper we look at 3 new approaches that can make antivirus effective and practical again, including client/cloud architecture, behavior recognition, and journaling and rollback Together, these three approaches represent a major rethinking of antivirus technology, a major shift in antivirus that creates a new type of technology that is able to detect and counter today’s Malware.
Tags : antivirus, journaling. rollback, behavior recognition, client/cloud, client/cloud architecture, antivirus technology, malware, networking, security
     Webroot Inc
By: Webroot Inc     Published Date: Apr 29, 2015
Learn how to perfect your organization’s endpoint protection and see how to deal with a more mobile workforce and more dangerous malware.
Tags : software, workforce, webroot, it suuper, antivirus, security
     Webroot Inc
By: Symantec     Published Date: Apr 04, 2013
This white paper discusses the malware threat, the potential impact on your business, and how to protect your company and your customers by using code signing.
Tags : malware, anti-virus, spyware, scareware, anti-malware, cyber criminals, code signing, security
     Symantec
By: Symantec     Published Date: Apr 04, 2013
Stuxnet, a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?
Tags : code signing, cyber attack, anti-virus, intrusion prevention, private keys, asset protection, security
     Symantec
By: CarbonBlack     Published Date: Oct 26, 2016
Traditional antivirus (AV) just doesn’t cut it anymore. From ransomware that holds intellectual property hostage to sophisticated malware-less attacks that exploit PowerShell, scripting, and memory, endpoints are facing more security risk than ever before. As a result, companies have set their sights on the next generation of lightweight AV solutions.
Tags : security, it management
     CarbonBlack
By: CarbonBlack     Published Date: Oct 26, 2016
It’s become increasingly clear that traditional antivirus is no longer sufficient in stopping advanced threats such as ransomware. Companies need a next-generation antivirus (NGAV) solution to successfully stop modern attacks. Hear what Trevor Albrecht from DraftKings has to say about his experience replacing AV with NGAV.
Tags : security, it management, data management
     CarbonBlack
By: CarbonBlack     Published Date: Nov 01, 2016
This checklist will help you assess the capabilities of your current antivirus solution and will provide the requirements you need to meet in order to shift to a more effective approach.
Tags : carbonblack, antivirus checklist, antivirus, security, enterprise applications
     CarbonBlack
By: CarbonBlack     Published Date: Nov 01, 2016
A SANS Guide to Evaluating Next-Generation Antivirus Rather than dying, antivirus is actually growing up. Today, organizations look to spend their antivirus budget on replacing current solutions with next-generation antivirus (NGAV) platforms that can stop modern attacks, not just known malware.
Tags : carbonblack, sans, antivirus, security, enterprise applications
     CarbonBlack
By: GFI     Published Date: Sep 11, 2012
The key to choosing the antivirus solution that's right for your organization is implementing an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess each solution's capabilities.
Tags : anti-virus, security solutions, pc performance, spyware
     GFI
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com