Sort results by: Published date | Company name

A Guide to Email Regulatory Compliance [ Source: Perimeter ]
August 2009- Laws have been passed to more adequately secure private and sensitive information, many of them specifically requiring better email security. Secure your information exchange by acting on the essential tips provided in this whitepaper.

[WHITE PAPER]
Read Abstract | Go to White Paper

Unraveling Web Malware [ Source: FireEye ]
September 2009- There has been a rapid rise in the use of web blended threats to exploit client browsers and operating systems. These can lead to infection by bots which can be controlled remotely. Eleven percent of the world’s computers are enmeshed in at least one botnet and 72% of corporate networks with more than 100 computers have an infection.

Obfuscated code and encrypted exploits are increasing in prevalence. The point of these exploits is to ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Research Paper: VIPRE Takes a Bite Out of Bloatware [ Source: Sunbelt Software ]
January 2009- Protect your servers, workstations and networks with security software that won’t slow you down.

Preventive antivirus and antispyware packages are “must haves” in today’s networking environments. No company from the smallest business with 10 users up to the largest enterprise with 100,000+ employees is immune from the security threats posed by rogue code – which include viruses, Trojans, bots, zombies, spyware, spam and blended malware. The threats have become more sophisticated, pervasive and pernicious ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Methods for the Prevention, Detection and Removal of Software Security Vulnerabilities [ Source: Association for Computing Machinery ]
January 2008- The announcement of another computer virus threatening the business and home computers is starting to be a regularly expected occurrence. Moreover, one has come to accept the installation of a software patch as the preferred means to stopping such viruses. This research paper focuses on source code analysis. Security experts have developed several software tools that provide a security audit of C and C++ source code. These tools, in short, check for known security vulnerabilities. ...

[WHITE PAPER]
Read Abstract | Go to White Paper

White Paper on Antivirus [ Source: Bulwark Systems ]
January 2008- This paper from Bulwark Systems explains corporate protection that starts at the Internet Gateway, the main entrance for viruses, malware and digital attacks. Antivirus for Web Server protects the data traffic of company handled via HTTP, HTTP over FTP or directly via FTP. It enables risk-free surfing and downloading without loss of performance and reliably prevents infected contents from being sent and received. Antivirus for Mail Server checks the complete incoming and outgoing SMTP data ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Email Security in Small and Medium-Sized Businesses [ Source: GFI Software ]
July 2011- No organization can afford to operate without an email security strategy. The risk landscape is constantly changing with new threats surfacing every day. This white paper looks at email security in small and medium businesses, the solutions available and what features SMBs cannot do without.

[WHITE PAPER]
Read Abstract | Go to White Paper

State of Internet Security: Protecting the Perimeter [ Source: Webroot ]
October 2008- Protecting the Perimeter is quickly becoming a critical point of protection for today’s business. Many fundamental business activities - marketing, advertising, customer support, research - are Web dependent. Making the Web the number one delivery method for malware which poses a significant security challenge to businesses of all sizes.

In this State of the Internet Security Webroot delivers the results of its survey of Web security decision makers in the US, UK, ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Anonymous Proxy: A Growing Trend in Internet Abuse, and How to Defeat it [ Source: Bloxx, Inc. ]
October 2008- Anonymous proxies are an unseen threat - a student's or employee's backdoor to malicious or productivity-sapping sites on the Internet. If your URL filtering solution relies on the old-school URL database/keyword approach, your ship is leaking and you may not see the holes.

With hundreds of new proxy sites created each day, traditional URL filtering just can't keep up, even when supplemented by standard keyword analysis. What follows is a primer on ...

[WHITE PAPER]
Read Abstract | Go to White Paper

Protecting Your Network Against the Growing Danger of Web Attacks [ Source: MessageLabs, Symantec Hosted Services ]
December 2010-

Web-borne malware is now more common than malware that enters an organization through email. The number of Web sites discovered per day, that carry malware increased 400% in 2008. This drastic increase in infected sites can cause serious issues for your business. Organizations need to proactively protect their networks both by instituting acceptable usage policies for employee web usage as well as implementing a solution to combat these malware intrusions.

This report ...

[WHITE PAPER]

The 5 New Laws of Anti-Malware [ Source: Sourcefire ]
July 2012- Malware has changed considerably since the early PC viruses first introduced more than 25 years ago. Today, it evolves so quickly that many customers find it nearly impossible to stay ahead of the latest threat.

If the explosion in malware variants wasn't enough, sophisticated Client Side Attacks and Advanced Persistent Threats (APT's) target victims in ways that completely evade traditional security measures.

Current research suggests as much as 75% of new viruses are ...

[WHITE PAPER]
Read Abstract | Go to White Paper