Back to Results
First PageMeta Content
Computer security / Malware / Computer network security / Rootkit / Intrusion prevention system / Computer virus / Microsoft Security Essentials / Targeted threat / Crimeware / System software / Antivirus software / Software


F-Secure DeepGuard Proactive on-host protection against new and emerging threats 1. The case for proactive behavioral analysis One of the most demanding challenges security programs have had to address in the last few ye
Add to Reading List

Document Date: 2014-08-28 23:24:01


Open Document

File Size: 1,41 MB

Share Result on Facebook

City

Protection Signature / /

Company

F-Secure / Adobe / AV-Comparative / Google / F-Secure Response Labs / Microsoft / Conclusion F-Secure / /

Currency

USD / /

IndustryTerm

Internet access / automated analysis systems / attack site / analysis technology / file-sharing services / compromised legitimate site / exploited software / non-malicious software / cloud infrastructure / online-based attacks / dynamic proactive behavioral analysis technology / protected systems / web reputation checking / signature-based detection technology / web browsers / search engines / online activities / Internet Security / internal monitoring systems / internal systems / engine technology / security products / non-malicious applications / cybercrime tool / malicious site / mining / removable media / cloud network / Online Signature DETECTION HITS If / computing / Internet connection / nebulous online world / security product / security solutions / /

OperatingSystem

Microsoft Windows / /

Organization

Protection Service for Business / AV-Test / United States Federal Bureau of Investigation / Senate Committee on Homeland Security and Governmental Affairs / Anti-Virus / Client Security / Internet Security and Protection Service for Business / Senate / /

Person

Mika Stahlberg / Robert S. Mueller / III / /

Position

Chief Technology Officer / analyst / /

Product

Security 2013 / /

ProgrammingLanguage

Java / /

Technology

encryption / on-host scanning technology / scanning engine technology / AV / 2006 Heuristic analysis technology / Java / peer-to-peer / dynamic proactive behavioral analysis technology / P2P / signature-based detection technology / operating system / /

URL

http /

SocialTag