Products/Services for Network Antivirus Software Comparison

  • No Image Available
    Network Security Software - (78 companies)
    ...information technology (IT) personnel to scan, detect, assess, and correct potential security risks on computer networks. Uses. Network security software is also used for intrusion detection and intrusion prevention, network access control, software... Learn More
  • Network Security Platforms-Image
    Network Security Platforms - (153 companies)
    Engineers (IEEE) 802.1 standards for network devices such as routers, hubs, switches, and network interface cards (NIC). Antivirus software is another critical application part of network security platforms. Typically, these applications typically... Learn More
  • Network Security Services-Image
    Network Security Services - (907 companies) attack, design and manage firewalls, and install and upgrade anti-virus software. Managed services include network intrusion prevention, host intrusion prevention, email encryption, email filtering, and firewall management. To prevent network... Learn More
  • Security Software-Image
    Security Software - (478 companies)
    Antivirus software. Anti-spyware. Anti-phishing software. LAN/WAN security. Data encryption. Wireless network security. How it Works. Networks. Most network security software include packet sniffers and loggers for tracking potentially malicious traffic... Learn More
  • No Image Available
    Anti-malware Software - (38 companies)
    ...consent. How Anti-Malware Software Works. Anti-malware software scans incoming network data for malware, and blocks or quarantines threats as they are encountered. Anti-malware software also facilitates the removal of any malicious code that has been... Learn More
  • No Image Available
    Mobile and Wireless Software - (183 companies)
    Mobile and wireless software is used to program and manage mobile and wireless devices such as cell phones, personal digital assistants (PDA), and global positioning systems (GPS). System administrations and information technology (IT) personnel use... Learn More
  • No Image Available
    Network Simulation Software - (29 companies)
    Network Simulation Software Information. Network simulation software is designed to model the potential behaviors of computer networks. These applications allow network engineers and other information technology (IT) personnel to simulate scenarios... Learn More
  • No Image Available
    Network Monitoring Software - (229 companies)
    Network monitoring software is used to monitor network traffic for user-defined parameters. Network Monitoring Software Information. Network monitoring software is designed to capture statistical information about network protocols; traffic... Learn More
  • No Image Available
    Impedance Matching Networks - (21 companies)
    Impedance matching networks are electrical circuits which, when connected between two networks, match the output impedance of the source (the first network) to the input impedance of the load (the receiving or second network). The purpose... Search by Specification | Learn More
  • No Image Available
    Network Firewalls - (147 companies)
    Network firewalls protect computer networks against unauthorized use or attack. They permit or deny access to private network devices and applications, and represent an important part of an organization's overall security policy. Firewalls may... Search by Specification | Learn More
More >>

Product News

More >>

More Information

Lock Indicates content that may require registration and/or purchase. Powered by IHS Goldfire

  • An intrusion detection system based on WiMAX
    The experiments use two computers,one simulates the WiMAX network ,the other execute IDSBW,two computers have the same configuration: 2... ...speed is 7200 rls,operating system is Windows 2003,without any antivirus software ,the performance comparison is shown as Figure...
  • Computer Network Security
    Unfortunately, in comparison with traditional sig- nature based antivirus software , both approaches have a much higher rate of false alarms. To address this shortcoming the authors propose a method to search for evidence of the alarm propagation within the net- work .
  • A Multivariate Adaptive Method for Detecting ARP Anomaly in Local Area Networks
    We presumed this as a motion from abnormal network to a more normal network .(Fig. 4 ) E. Comparison Between ARP ADA And Antivirus Softwares .
  • Collaborative Financial Infrastructure Protection
    Antivirus software , using specific scanners, provides protection against viruses and malicious code, such as worms and Trojan horses, by detecting and removing the malicious code and by preventing unwanted effects and repairing damage that may have resulted. ...considered critical to either the organization or the operation of a computer, by comparing the state of... Virtual private networks (VPNs): use cryptography to establish a secure commu- nication link across unprotected networks (e...
    A minimum install of Windows XP usually boots in 30 seconds, but antivirus and network drivers delay such fast boot times. ...memory requirements are quite astounding with 150 MBytes but the real-time antivirus software needs an additional... In comparison a 3 year old production system needs 750 MByte, with additional restrictions that 32-bit...
  • Software platform virtualization in chemistry research and university teaching
    A minimum install of Windows XP usually boots in 30 seconds, but antivirus and network drivers delay such fast boot times. ...memory requirements are quite astounding with 150 MBytes but the real-time antivirus software needs an additional... In comparison a 3 year old production system needs 750 MByte, with additional restrictions that 32-bit...
  • A 21 CFR Part 11 Compliant Graphically Based Electronic System for Clinical Research Documentation
    (b) ViceVersa Pro 2 is commercial software utilized which performs scheduled file and folder synchronization, replication, backup, and comparison over our LAN network . (c) Symantec antivirus corporate edition v. 10.1.6000.6 is commercial software employed on the main...
  • Campus network security model study
    ...key points to collect information and analyze the information to see whether the network behavior and security... Their work patterns and the same antivirus software , to establish the characteristics of database intrusion, compare the current user behavior and characteristics of database intrusion to determine whether a user is the legitimate user. ...establishment of normal activities, the activities of the current situation and the main comparison in normal mode...
  • DigitalPersona Enters the Field of Notebook Data Protection and Remote Access Security with DigitalPersona Pro Enterprise
    ...thereby making it easy to operate, economical, and concurrently reinforcing green practices, in comparison with other individual... This software jells with other fortification tools such as antivirus software and desktop firewalls that are already prevalent in the business. Using DigitalPersona, companies can competently guard critical data, applications and networks used by desktops and the more...
  • Beginning SUSE Linux
    ...identifying in Konsole, 211 virtual files, identifying, 210–211 virtual PC software, features of, 29 viruses effect of, 118 protecting Linux against, 7 vulnerability of Windows to, 7 VMware virtual PC software , web address for, 29 VNC (Virtual Network Computing), relationship to YaST2... ...setting, 268 wc command in BASH shell, example of, 481 web browser programs comparison between SUSE Linux... ...word processor, 144, 309 Agfa scanners, 111 AlsaPlayer MP3 and CD player, 145 antivirus programs, 118 Audacity...