Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > Anti Spam

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Anti Spam

Anti spam solutions generally fall under two categories, client-based and server-based. Client-based tools allow each user to configure the software so that it can perform according to individual needs with it’s decentralized approach. Server-based solutions perform spam identification and filtering before legitimate emails are distributed to the intended recipients throughout the network thus reducing the impact that spam has on end-user productivity and on network resources.
Results 301 - 325 of 451Sort Results By: Published Date | Title | Company Name
White Paper Published By: ESET     Published Date: Feb 17, 2010
Analysis of ESET's ThreatSense.Net®, a sophisticated malware reporting and tracking system, shows that the highest number of detections this month, with almost 9.90%, was the Win32/Conficker class of threat.
Tags : 
eset, threats, malware reporting, tracking system, win32/conficker
    
ESET
White Paper Published By: ESET     Published Date: Feb 17, 2010
View this ESET Monthly UK threat report to find out the top computer threats in the UK.
Tags : 
eset, computer threats, threatsense.net, virus lab, malware
    
ESET
White Paper Published By: ESET     Published Date: Feb 17, 2010
This paper is designed to provide a basic understanding of what heuristics are and how they are used in the anti-malware industry.
Tags : 
eset, teaching heuristics, anti-malware, encryption, polymorphism
    
ESET
White Paper Published By: Symantec.cloud     Published Date: Feb 03, 2010
The emergence of covert information theft as a key tactic of malware propagators. Most importantly, the paper highlights the crucial danger points for any business that doesn't defend itself against viruses which operate in the background.
Tags : 
messagelabs intelligence, symantec hosted services, security threat, spyware, botnets
    
Symantec.cloud
White Paper Published By: ESET     Published Date: Jan 21, 2010
Unfortunately, people are frequently seduced by the word "free" and overestimate the supposed benefits such products offer. In order to illustrate this type of malicious methodology, the case of a rogue product is analyzed here.
Tags : 
eset, rogue anti-malware, security, antivirus, spyware
    
ESET
White Paper Published By: ESET     Published Date: Jan 21, 2010
3rd International Conference on Cybercrime Forensics Education & Training. What is the information that the end-user or end-site really needs to know about an incoming threat?
Tags : 
eset, internet security, cybercrime, threat, malware
    
ESET
White Paper Published By: ESET     Published Date: Jan 08, 2010
This report provides a report of the Top Computer Threats in the United Kingdom.
Tags : 
eset, monthly threat report, top computer threat, security, anti spam
    
ESET
White Paper Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats
    
McAfee
White Paper Published By: McAfee     Published Date: Dec 09, 2009
Despite the six-year-old CAN-SPAM Act, spammers routinely abuse the law and continue to deliver their obnoxious email. One year ago, a major spam-hosting ISP was shut down, causing an impressive drop in botnet activity. Today, however, spam authors are more active and smarter than ever. Spammers love to tailor their messages to the news and the season. Read this report to gain a greater understanding of current spam threats.
Tags : 
mcafee, spam, risk management, vulnerability, can-spam
    
McAfee
White Paper Published By: Trend Micro SPN     Published Date: Nov 24, 2009
A report sampling over 100 large enterprises that explores the types of cost savings that can be gained by employing a comprehensive content security solution with a cloud client architecture. The report concludes total savings of up to 40% can be achieved.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus
    
Trend Micro SPN
White Paper Published By: Trend Micro SPN     Published Date: Nov 24, 2009
How do you measure security effectiveness? Conventional security solutions may appear to be holding back targeted malware attacks but this eBook shows you how to check the performance of your current infrastructure. Whether you are 'secure', 'infected' or 'recovering', you can benefit from a Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus
    
Trend Micro SPN
Webinar Published By: McAfee Inc     Published Date: Nov 16, 2009
With all the benefits and opportunities the Internet provides, it can also be a very inhospitable place, requiring organizations' constant vigilance to protect themselves from attack. To better understand important security issues affecting organizations today, IDC recently completed a survey of more than 260 IT and Firewall managers and executives in the US and Europe that aimed to profile their organization's firewall deployments.
Tags : 
mcafee, email protection, firewall, it security, midsize
    
McAfee Inc
White Paper Published By: McAfee     Published Date: Nov 09, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, risk management, security, security management, security threats
    
McAfee
White Paper Published By: McAfee Inc     Published Date: Oct 30, 2009
Browsers are the least-protected and therefore easiest medium for transferring malware, which is why protecting your company against web-borne threats should be part of a total security solution. This brief explains the key benefits of implementing a web security solution with McAfee. Read more.
Tags : 
mcafee, email protection, midsize, global threat intelligence, security
    
McAfee Inc
White Paper Published By: McAfee Inc     Published Date: Oct 26, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, security, cyberattacks, midsize, cyberthreats
    
McAfee Inc
White Paper Published By: ESET     Published Date: Oct 07, 2009
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology. The threat landscape facing businesses has evolved significantly, and corporations are looking for security products that can protect against known threats and prepare for future attackers in a simple-to-use architecture.
Tags : 
eset, security, threatsense, malware, threat trends
    
ESET
White Paper Published By: Trend Micro SPN     Published Date: Sep 23, 2009
To keep ahead of the threats, you need to rethink your security and ask whether traditional security technologies are up to today's challenges. This eBook explains how correlating web, email and file reputations within a smart protection network is core to Outthinking the cyber criminals.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus
    
Trend Micro SPN
Case Study Published By: Trend Micro SaaS     Published Date: Sep 22, 2009
Alfred Ashley Group helps small businesses overcome the daunting prospect of buying, installing, and managing computer and telephone system solutions. Building in best-in-class and cost-effective security is vital for meeting customer expectations and achieving the company's revenue and profit goals.
Tags : 
saas, trend, trend micro, software as a service, trendlabs
    
Trend Micro SaaS
White Paper Published By: Trend Micro SaaS     Published Date: Sep 22, 2009
Just about anybody with an email address knows about spam and spam filters-or at least they think they do. However, it is a complex subject, with far more to it than meets the eye. This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam.
Tags : 
saas, trend, trend micro, phishing, spam filters
    
Trend Micro SaaS
White Paper Published By: IBM     Published Date: Sep 10, 2009
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and more!
Tags : 
ibm iss x-force threat and risk report, ibm, web-related security threats, spam and phishing, malware
    
IBM
White Paper Published By: Trend Micro SaaS     Published Date: Sep 01, 2009
This comprehensive hosted service blocks email threats before they can touch the network, integrating powerful anti-spam and anti-phishing with award-winning antivirus and anti-spyware. Security leader Trend Micro updates and tunes the solution to keep the customer's network secure while saving valuable IT resources.
Tags : 
saas, trend, trend micro, software as a service, trendlabs
    
Trend Micro SaaS
White Paper Published By: McAfee Inc     Published Date: Aug 19, 2009
Data is a company's most precious asset-and maintaining secure access for a mobile workforce is vital for midsize organizations. This brief explains the key benefits of implementing a data security solution with McAfee. Read more.
Tags : 
mcafee, security, data protection, compliance, cyber criminals
    
McAfee Inc
White Paper Published By: McAfee Inc     Published Date: Aug 19, 2009
Anti-virus by itself is no longer enough to protect endpoints, especially in this age of mobile devices and business users on the go. This brief explains the key benefits of implementing an endpoint security solution with McAfee. Read more.
Tags : 
mcafee, security, malware, compliance, cyber criminals
    
McAfee Inc
Case Study Published By: Astaro     Published Date: Aug 10, 2009
The complete absence of a spam filter at Kauffman Tire, a wholesale and retail distributer of tires, was inhibiting employee productivity.
Tags : 
astaro, spam, spam filters, security gateways, vpm
    
Astaro
Case Study Published By: Astaro     Published Date: Aug 10, 2009
Hannoush Jewelers Inc., a jewelry manufacturer and retailer, was using frame relay, a private network, but decided to cut costs by moving to VPN tunnels to connect their many stores and offices.
Tags : 
hannoush, jewelery, private network, frame relay, vpn
    
Astaro
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search