Affordably Source Antivirus Software Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here

Zintro does not display, sell or trade e-mail addresses

An eye iconForgot password?
Submit Project

By clicking Submit Project you agree to our TermsVIEW

or Request Pricing Information

How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Antivirus Software Inquiries

Area Icon

Antivirus Software

I have developed software which is certified by digicert which is launching this week. I was told by my attorney that there is a process by which to get whitelisted or atleast stay in good standing with the 37 anti virus companies which is done via email mostly. I was told there is weekly maintenance that needs to be done and i need someone to help guide me exactly what needs to be done.

  1. Profile Picture

    Carmelo |CEO

    Hi Anti534M24, Can you please send me more *****t your software and what it does? I want ...

    8.9 Hours Later
  2. Profile Picture

    sheik |security analyst

    it is really simple- submit your sample in virus total, bit9 whitelisting, mcaffee whitelist- they w...

    55.5 Days Later
+2 Other Responses
Area Icon

Ai/ml Development Study For Students

We are looking to speak with multiple undergraduate or graduate students based in the us who can share their insights on ai technology. We are specifically interested in those who are majoring or have primary focus in computer engineering / computer science / software engineering / mathematics / ai / machine learning / deep learning / natural language processing / computer vision. This is a paid 1-hour video-based interview. Please provide a brief response below as to your relevance in the space. 1. Have you published or presented a paper focusing on ai/ml? 2. Are you personally listed under google scholar profiles? Please share link of your profile. 3. Do you have plans to pursue a career in research to advance the state of affairs in ai/ml?

  1. Profile Picture

    Patrick |Software Developer

    1) Yes, I'm a full-time AI/ML student at UC San Diego 2) Double major in Computer Science and Cognit...

    2.1 Hours Later
  2. Profile Picture

    Maurice |President, CEO & Founder

    I am the CEO of Kreo Solutions (https://kreo.co) and we provide services in the areas listed. Pleas...

    2.5 Hours Later
  3. Profile Picture

    Pranav |Masters Student

    Rate: $200 I am a *****ent in the University of North Carolina at Charlotte and graduating ...

    3.4 Hours Later
+76 Other Responses
Area Icon

Computer Security

Assist with protocols and develop collection tools; assist with data analysis, interpretation, reports; assist in writing final reports

  1. Profile Picture

    Lito |IT Consultant

    Hello I am an experienced *****yst and I am familiar with analysis tools. Would be good to talk,...

    6.7 Days Later
  2. Profile Picture

    Geoffrey |Consultant

    Have only now seen this Inquiry (21 Dec)! From limited *****lied, I doubt that my "data ...

    16 Days Later
+2 Other Responses
Area Icon

Computer Science

I am looking for computer science experts who can program apps and websites please give me where each of them graduated what qualification they have and ages. Also their other personal details.

  1. Profile Picture

    Guillermo |Software Developer

    Dear Sir, I have an extensive experience developing software for the oil industry. My company can...

    33 Minutes Later
  2. Profile Picture

    Will |CTO

    I'm a professional software engineer and internet executive who does such programming, among other t...

    4.2 Hours Later
  3. Profile Picture

    virender |.Net Developer with 7 Years exp.

    hi I have 6 years experience in web solutions. my area of expertise is Web Development and Android ...

    9.4 Hours Later
+4 Other Responses
Area Icon

Encryption Virus

I don't know if you can help with this issue. I was subject to a ransom encryption virus. It impacted the back up drive as well. The ransom was paid and the link was taken down. Do you offer services to help decrypt without a key or back up?

  1. Profile Picture

    Johnathan |Information Security Analyst II

    *****'re probably out of luck. There's a slight chance if the malware left behind a key....

    32 Minutes Later
  2. Profile Picture

    Clarence |Consultant

    Check historical backups they may be ok....

    45 Minutes Later
  3. Profile Picture

    Eric |Managing Partner

    agree - how many ***** does the backup tree goes...hope it's more than 1...start with th...

    4.2 Hours Later
+4 Other Responses
Area Icon

Check Point Software Technologies Ltd. (chkp)

Want to figure out if i should buy checkpoint firewall or competing product

  1. Profile Picture

    Darren |Consultant

    I am available to talk regardnig you firewall selection question. Please forward the best way to co...

    2.9 Hours Later
  2. Profile Picture

    James |Principal

    Dear AB, I am quoting a "quick informal proposal" here. The answer to your question depends on a nu...

    3.4 Hours Later
  3. Profile Picture

    Samer |Managed Service Program Director

    Hello I work for Orange business services/france telecom and we use lots of checkpoint firewalls and...

    3.7 Hours Later
+9 Other Responses
Area Icon

Kaspersky

My company is deploying kaspersky and we are looking for a technical consultant to manage the project. This person needs to have experience with kaspersky security center 10 with both anti-virus and encryption using kaspersky security center – other like applications should not be considered – we want clearly someone with experience with our exact toolset.

  1. Profile Picture

    David |Owner

    I specifically have experience with Kaspersky Security Center 10. I have another client that has tha...

    3.8 Hours Later
  2. Profile Picture

    Adrian |Zintro Expert

    Hello, I have just received this inquiry from one of my colleagues that has an account on zintro fo...

    5.5 Days Later
+2 Other Responses
Area Icon

Anti-malware

Exploit reported by google adwords bots - appears to be changing quickly all the time. Malware. Domain suspended in adwords. Our pages are being redirected and we cannot figure out how to fix the problem.

  1. Profile Picture

    Narendra |Director

    We are a consulting company in Cyber Security... m not clear as to what problem you are facing, plea...

    1.4 Days Later
  2. Profile Picture

    sheik |security analyst

    find the malware code and remove it! As per the google adwords or adsense policy, they won't pay if...

    1.5 Days Later
+3 Other Responses
Area Icon

Malwarebytes

I want to create a package with malwarebytes 2.1.6.1002 with sccm server 2012. I will need to know the command line, uninstall path, how to change detection path, how to put product id and key. Also un-check auto updates and user notification. Could you please help me with this. I really need help. Thank you mohammed

  1. Profile Picture

    David |Consultant

    Mohammed Are you using the *****l in SCCM or plain packages?...

    12.2 Hours Later
  2. Profile Picture

    Joshua |CEO

    Mohammed, Good morning. I have packaged this program for deployment via SCCM 2012 R2. I have ...

    1.7 Days Later
+2 Other Responses
Area Icon

Email Encryption Market

We are a us based investment firm that is looking to better understand the email encryption software market for enterprises. Key vendors include zix corp and proofpoint. We are looking to understand: 1) what are the key attributes that differentiate email encryption solutions from various vendors, including zix and proofpoint? 2) are there changes in encryption technology or new entrants who could threaten the incumbent position of vendors like zix? 3) can you discuss the default encryption provided with google (gmail) and office 365 (outlook)? Why would an enterprise in a high-security-requirements industry (government, healthcare, finance, etc.) find these defaults unsatisfactory and choose to pay for third-party email encryption through a vendor like zix? Good candidates would include: · customers of an email encryption solution at a large enterprise · former employees of zix and/or proofpoint · current or former employees of competitors to zix and/or proofpoint

  1. Profile Picture

    James |Security Evangelist

    Zix is a well establish incumbent with ***** users of Google or Microsoft cloud email/apps w...

    2.3 Hours Later
  2. Profile Picture

    Ken |Security / System Specialist

    All, This sounds like a very interesting position. I have ProofPoint expernece from the compliance s...

    3.1 Hours Later
  3. Profile Picture

    George Cristian |Partner, Executive Manager

    On short: Zix solution is best it you use G-Suite (*****) and Proofpoint if you company uses Offic...

    11.3 Hours Later
+25 Other Responses
Area Icon

Embedded Software Development

Embedded software engineer melbourne ,fl longterm the keys exp in c++ embedded greenhills rtos – definite plus s/w integrity exp – os cold fire ---- s/w analysis tools, ldra, the contractor will be responsible for embedded sw development in all phases of software product development life-cycle requirements, architecture, design, implementation and verification. Requirements • b.S. In computer engineering, computer science or equivalent. • minimum 5 years of embedded sw design experience in the following areas: industrial controls, aerospace, communications, or medical devices, etc. • experienced with coldfire, arm and/or powerpc micro-processor in a c/c++ environment • experienced with communication protocols such as tcp/ip, udp, rs232/rs422, hdlc • experienced with embedded green hills integrity rtos. • experienced with formal sw development, using configuration management tool (such as clearquest, etc.), requirements traceability tool (such as doors, etc.), sw analysis tools (such as klocwork, pc-lint), sw unit test tool (such as vectorcast, etc.). • experienced in writing formal documentation such as system requirements specification, system architecture specifications, software requirements specification, software design specification, etc. • good verbal and written communication skills. • self starter, team player, multi-tasking with good time management skills. Nice to have: • experienced in design of high reliability, safety, redundant fail-safe products is a strong plus. • experienced with industry standards (iec 61508, do-178b, cenelec-50128, etc). The key requirement for this candidate will be someone with embedded sw development experience in a real time environment. The cenelec and do-178b that we were focusing on previously is more of a nice to hav

  1. Profile Picture

    Denis |Head of Sales

    Hello my company Thinksys can provide you with outstanding services and would like to discuss with y...

    6.1 Days Later
  2. Profile Picture

    Raul |Zintro Expert

    Hello! My name is Raul Quintero. I live and work in Monterrey, Mexico. I am a Mechanical and Electr...

    9.9 Days Later
  3. Profile Picture

    New |

    It is part of the Resume....

    15 Days Later
+8 Other Responses
Area Icon

Mechatronics

Certified mechatronic consultants to train internal staff in mechatronic engineering with certification.

  1. Profile Picture

    Richard |Mechanical/Electrical Project Design Eng

    Thank you for the inquiry, but unfortunately, we are not able to take up the offer at this time....

    20 Minutes Later
  2. Profile Picture

    David |President & Princilpal Consultant

    I may be able to help this project. Please see my resume and *****rience on my website, d...

    4.2 Hours Later
  3. Profile Picture

    Ramuhalli |Systems Engineer

    I have 35 years of experience in Opto-electrical-Mechanical Engineering and am a very good trainer. ...

    12.5 Days Later
+3 Other Responses
See More Inquiries

Antivirus software (or anti-virus) is computer software used to identify and remove computer viruses, as well as many other types of harmful computer software, collectively referred to as malware. While the first antivirus software was designed exclusively to combat computer viruses, most modern antivirus software can protect against a wide range of malware, including worms, rootkits, and Trojans.

Top Antivirus Software Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+