Anti-Virus/Anti-Spam (AVAS)

Product Banner

Explore Qwest with our Resource Center! This center is designed to enable you to make the best decisions possible for your organization. The Qwest resource center provides case studies, customer testimonials, technical information, awards and more to assist you in your telecom knowledge and decision making.

Videos and Demos Icon

Videos and Demos

  • Layers of Security: Protecting Your Data from Computers to the Cloud
  • Even a single data breach can cause enormous harm to businesses of all sizes, but you don't have to experience a catastrophic loss to put your business at risk. Watch this video to see how a multi-layered security approach can protect data and keep your business up and running smoothly.

  • Non-intrusive Security
  • Martin Capurro, director Product Management, suggests how to strike the right balance between productivity and security in the enterprise by looking beyond the traditional model of network and perimeter security and expanding across systems, the cloud and mobility technologies.

  • Reality Check: Protecting Your Business from Everyday Security Threats
  • Think your business is too small for cybercrime? Think again. Perpetrators of viruses, malware and other threats target businesses of all sizes. Watch this video for a day-in-the-life look at how simple activities can put your business at risk-from email and network logins to Web applications and social networks.

White Papers Icon

White Papers

  • Best Practices for Better Security
  • Protecting Your Data and Eliminating Vulnerabilities
    You wouldn't leave your office door unlocked so anyone could come in and walk off with your company's equipment, read your files or wreak other havoc. That same sense of caution should apply to managing your company's Internet connection. When the Web and e-mail are integral parts of your business, you become vulnerable to viruses, worms, spyware, phishers and other security risks. Without common-sense precautions, they can cost your company through reduced network performance, diminished productivity, and even a damaged reputation.

  • Don't Let Data and Business Assets Slip Out the Back Door
  • An Interview with Qwest Security Expert Bob Schroeder
    Businesses of all sizes face the moving target of always changing security threats, but SMBs don't have the IT resources that larger organizations have to focus on the latest dangers. As Qwest Director of Product Management Bob Schroeder points out, there's not a textbook that tells business owners how much security is enough, but in this interview, he gives you the next best thing: a "CliffsNotes" for keeping your data protected.

  • How to Build a Secure Foundation for Electronic Health Records
  • An Interview with Healthcare IT Expert Mark Rein
    Healthcare providers have been dealing with the Health Information Privacy and Accountability Act (HIPAA) for more than a decade. Now, new requirements designed to protect electronic health records (EHRs), including the HIPAA Security Rule and HITECH Act, are adding another set of challenges. As an IT executive with extensive experience implementing new technologies and processes for healthcare organizations, Mark Rein has seen the challenges from the inside. In this interview he provides some important pointers for keeping records secure.

  • Managed Security for a Not-So-Secure World
  • CIOs must manage security risks while addressing business needs and focusing on revenue-generating activities. This paper offers a strategy for providing data security and protection that addresses the rising data threat landscape, the need for compliance, and today's lean IT staffs.

  • Mobile Security: The Essential Ingredient for Today's Enterprise
  • With a growing universal mobile workforce, it's important to understand the challenges and misconceptions about security in terms of complacency, cost, experience and do-it-yourself security management. Having a mobile security program that incorporates a trusted managed-security provider is a best business practice and an essential ingredient in protecting today's enterprises.

  • Six Basic Steps for Better Security
  • Follow these six essential steps to help protect your business and improve productivity
    Businesses of all sizes are vulnerable to security threats, and new hazards seem to arise daily. Small and midsize business may have fewer resources for dealing with security threats, but no less responsibility for them. How do you reduce the risk of data exposure, minimize vulnerabilities in your network, ensure regulatory compliance and still maintain productive access to information? The best data security practices are often a mix of technologies and policies that ensure that those technologies are used correctly.

In the News Icon

In the News

Fact Sheet

  • AVAS
  • Download this product overview.