Anti Spyware White Papers

Anti-Spyware programs can combat spyware in two ways:1. Real-time protection, which prevents the installation of spyware2. Detection and removal of spyware.Many anti-spyware/adware tools require a frequently-updated database of threats.
Results 1 - 25 of 485Sort Results By: Published Date | Title | Company Name
By: Astaro     Published Date: Jan 19, 2011

Botnets are based on similar principles as legitimate clouds, but serve malicious business interests. Find out more about how botnets work and the right steps after having detected infected machines within your own network.

Tags : astaro, cloud computing, botnets, network, security, network management, anti spam, anti spyware
    
By: Mimecast     Published Date: May 11, 2009

Securing your email is a complex process that takes time and uses resources that can be better deployed elsewhere in your business. Moving on-premise email security into the cloud not only saves time and money, but also reduces risk and takes advantages of economies of scale to deliver an effective, dedicated security platform that unshackles users and releases the potential of your mail.

Tags : mimecast, saas, software as a service, software as a service, malware, antispam, policy enforcement, email archive
    
By: Lenovo     Published Date: Oct 14, 2016

Get the details on the top threats to IT Security. This detailed (and entertaining) eBook provides you with the key stats you need to identify and stay ahead of the top six threats to IT security today—from ransomware to phishing and spyware to DDoS attacks. Download the eBook to get all the details!

Tags : security, ransomware, spyware, malware, theft, it threat, anti spyware, ddos
    
By: NAVEX Global     Published Date: Aug 18, 2016

This Cyber Security Awareness Kit illustrates how to make your organisation more secure by neutralizing the leading cause of cyber security risk: your employees.

Tags : cyber attack, risk, cyber security, cyber criminals, cyber risks, security, security application, cyber security awareness kit
    
By: Cisco     Published Date: Jun 16, 2016

Attackers are commandeering legitimate infrastructure and reaping millions in profit. Defenders are struggling to detect and combat threats, and confidence is falling.

Tags : security, application security, access control, security policies, anti spyware, email security, internet security
    
By: Cisco     Published Date: Jun 16, 2016

As much as the Digital Economy and the Internet of Everything (IoE) create opportunities for companies and consumers - over $19 trillion in value to organizations over the next decade - they also create opportunities for hackers and cybercriminals. With an expanded attack surface represented by the IoE, cybercriminals look to cash in on the estimated value of $450 billion to over $1 trillion of the Hacker Economy.

Tags : security, technology, digital, cyber attack, data, access control, anti spyware, application security
    
By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016

Download this paper now to learn how you can prevent such an attack and protect your business

Tags : prevent cyber-attacks, cyber-attacks, security application, security, anti spam, anti spyware, anti virus, application security
    
By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016

The volume and complexity of cyber-attacks targeting large enterprises and infrastructure service providers is escalating.

Tags : security application, data centers, data, cyber-attacks, security, prevent cyber-attacks, anti spam, anti spyware
    
By: Absolute Software     Published Date: May 31, 2016

The US healthcare industry has historically lagged behind others in the maturity of security capabilities, only recently catching up on data security and privacy in response to HIPAA. But there is a wide range of other mounting risks unique to healthcare that S&R pros in healthcare can’t ignore — greater regulatory pressure, increasing targeted attacks, the frightening uncertainty of IoT security, and global economic pressures. This report outlines the most important security capabilities for security leaders in this sector to implement in the face of these challenges.

Tags : healthcare, security capabilities, data security, best practices, security, access control, anti spyware, application security
    
By: Forcepoint     Published Date: May 16, 2016

2014 wurden mehr als 700 Millionen Datensätze durch Verletzungen der Datenintegrität kompromittiert. Die finanziellen Verluste werden auf mindestens 400 Mio. USD geschätzt. Gleichzeitig stieg die Anzahl der Sicherheitsvorfälle um 66 Prozent. Lassen Sie nicht zu, dass Ihr Wachstum durch Angst gebremst wird. Der Bericht "Verhinderung von Datendiebstahl" konzentriert sich darauf, wie Sie aus breiterer, intelligenterer Anwendungssicht sicher bleiben, während Sie Innovationen vorantreiben.

Tags : security, data theft prevention, data security, security application, anti spam, anti spyware, anti virus, application security
    
By: Forcepoint     Published Date: May 16, 2016

Die finanziellen und rechtlichen Konsequenzen der während des vergangenen Jahres verzeichneten öffentlichkeitswirksamen Cyber-Angriffe enthalten eine unmissverständliche Botschaft: Datenraub kann so gravierend sein, dass die Unternehmensleitung es sich nicht leisten kann, das Thema zu ignorieren. Der Bericht "Cybersicherheit und Schutz vor Datendiebstahl" bietet einen Überblick über das Thema, der ohne technisches Fachjargon auskommt. Er liefert Anhaltspunkte die jedes Mitglied eines Vorstands, Aufsichtsrats oder Direktoriums nutzen kann, um die Sicherheitsposition der eigenen Organisation auf den Prüfstand zu stellen.

Tags : cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks, access control
    
By: Forcepoint     Published Date: May 16, 2016

Les ramifications financières et juridiques des cyber-incidents hautement médiatisés de l’année dernière ont envoyé un message clair : le vol de données est trop important pour que le Conseil d’administration ne soit pas impliqué. Le rapport « Cybersécurité et prévention du vol de données » fournit une vue d'ensemble non technique que chaque Conseil d'administration peut utiliser pour évaluer les mesures de sécurité actuelles de sa société.

Tags : cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks, anti spam
    
By: Forcepoint     Published Date: May 16, 2016

The financial and legal ramifications of the high-profile cyber-incidents that happened in the past year send an unmistakable message: data theft is too important for a board of directors not to be involved. The “Cybersecurity and Data Theft Prevention” report provides a non-technical overview every board of directors can use to assess their organization’s security posture.

Tags : cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks, access control
    
By: Code42     Published Date: Apr 22, 2016

The study’s findings highlight discrepancies—between IT departments and end users—in the approach and attitudes toward data protection. The results provide compelling evidence that there is vast room for improvement in securing critical data flowing between the corporate enterprise and endpoint devices. Read this paper to find how to protect your data today.

Tags : datastrophe study, code 42, data protection, data backups, anti spyware, anti virus, application security, authentication
    
By: Forcepoint     Published Date: Apr 20, 2016

Je länger sich Angreifer in Ihren Netzwerk aufhalten, desto mehr laterale Bewegung ist möglich - und desto größer ist auch das Risiko eines Datendiebstahls. Ein realistischer Ansatz für Datensicherheit und eine Reduzierung der Verweildauer in Ihrem Netzwerk konzentriert sich weniger darauf, eine mögliche Datenkompromittierung zu vermeiden, sondern sorgt vielmehr dafür, dass Daten niemals aus Ihrem Netzwerk herausgeschleust werden können.

Tags : cyber security, security application, security, cybersecurity, data prevention, anti spam, anti spyware, anti virus
    
By: Forcepoint     Published Date: Apr 20, 2016

Nel 2014, le violazioni dei dati hanno compromesso più di 700 milioni di informazioni, con perdite finanziarie stimate di almeno 400 milioni di dollari e gli incidenti di sicurezza sono aumentati fino al 66%. Ma non lasciare che la paura soffochi la crescita. Il report “Data Theft Prevention” si concentra su come innovare in completa sicurezza da una prospettiva più ampia, più mirata e più intelligente nell'applicazione.

Tags : security, data theft prevention, data security, security application, anti spam, anti spyware, anti virus, application security
    
By: Forcepoint     Published Date: Apr 20, 2016

En 2014, les fuites de données ont compromis plus de 700 millions de dossiers, engendrant des pertes financières estimées à au moins 400 millions $, et la fréquence des incidents liés à la sécurité est passée à 66 pour cent. Mais ne laissez pas la crainte étouffer votre croissance. Le rapport sur la prévention contre le vol de données se penche principalement sur la manière de vous protéger lorsque vous innovez, mais selon une perspective plus large en termes de portée et plus intelligente dans l’application.

Tags : security, data theft prevention, data security, security application, anti spam, anti spyware, anti virus, application security
    
By: Forcepoint     Published Date: Apr 20, 2016

The longer attackers remain in your network, the more lateral movement is possible and the greater the risk for data theft. Stopping the exfiltration of data, rather than focusing on stopping data breaches, is the most realistic approach to data security and reducing cyber dwell time.

Tags : cyber attack, security, security application, cybersecurity, cybersecurity, attack preventing, data security, access control
    
By: Forcepoint     Published Date: Apr 20, 2016

This will appear under the headline in some cases; in other cases, just the long description will appear. Both descriptions should work independently of each other and not be super redundant if possible: Relying on point products to protect your network is a losing strategy. Having tools than your IT team can handle raises costs, complexity and risk. Deploying enterprise security architecture with control over enforcement, coordination, end-to-end visibility and process automation from a single pane of glass, is the winning approach.

Tags : security, security protection, security architecture, security, protection, access control, anti spam, anti spyware
    
By: Forcepoint     Published Date: Apr 20, 2016

Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.

Tags : risk, security, security programme, security, security application, anti spam, anti spyware, anti virus
    
By: Cisco     Published Date: Mar 16, 2016

This white paper published by Frost & Sullivan and Cisco examines the role, capabilities, and advantages of service providers in the DDoS mitigation process, as well as how this role might develop in the future.

Tags : service providers, ddos, security, cyber security, cyber threats, cyber attack, ddos attacks, access control
    
By: Logrhythm     Published Date: Feb 24, 2016

The time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly. This whitepaper focuses on the LogRhythm Security Intelligence Maturity Model, and how it is a valuable guide for building the necessary successive layers of threat detection and response capabilities. Download this paper now to find out more.

Tags : cyber attack, risk, cyber security, cyber criminals, cyber risks, security intelligence, threat detection, access control
    
By: Logrhythm     Published Date: Feb 24, 2016

This eBook looks at different threat sharing initiatives and alliances as well as explores how automating intelligence sharing will significantly accelerate detection and response times.

Tags : cyberthreat, cyberthreat intelligence, security, it solutions, cti companies, cti intelligence, anti spam, anti spyware
    
By: Centrify     Published Date: Sep 08, 2015

Download this white paper to learn about managing and securing Macs and other mobile devices.

Tags : device management, security management, mobility, application security, management solutions, anti spyware, firewalls, password management
    
By: Centrify     Published Date: Sep 08, 2015

Adding Macs to a Microsoft-based corporate network can be a challenge. This paper will explore how Centrify can quickly and easily provide the necessary tools to allow Macs to be managed in the same way PCs are managed today.

Tags : device management, security management, mobility, application security, management solutions, anti spyware, identity management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.