Webroot Software

Displaying 1-40 of 71 results

  • Downloads // Jun 2014

    Webroot protects your devices everywhere

    SecureAnywhere Endpoint Protection offers instantaneous protection and fast scans without the hassle of time-consuming patches and signature updates. You can get your free trial today - just click "download", fill out and submit the form, and we'll email you a download link and instructions. Then just go to your...

    Provided By Webroot Software

  • Downloads // Apr 2014

    Business Essential: Complimentary Vulnerability Scan

    This complimentary security scanner searches for endpoint vulnerabilities, including misconfigurations, missing patches, open services and backdoors. Run the scan to receive a detailed report so you can address security vulnerabilities before they become a problem. Find out if your endpoints are secure. Try this FREE vulnerability scanner now.

    Provided By Webroot Software

  • White Papers // Mar 2014

    Top 5 Malware Trends for 2014 and How to Combat Them

    Malware will continue to evolve and attacks will become more sophisticated this year. Increased use of mobile devices makes it more challenging to protect systems and data. Companies need a security solution that protects PCs, tablets, and smartphones against malware and web threats. Read More...

    Provided By Webroot Software

  • White Papers // Mar 2014

    Webroot Intelligence Network: Real-Time Protection Against Malware Infection

    Malware is at such high levels that protecting an endpoint with traditional antivirus software, has become futile. More than 100,000 new types of malware are now released every day, and antivirus vendors are racing to add new protection features to try to keep their protection levels up. A new malware...

    Provided By Webroot Software

  • White Papers // Jan 2014

    Cloud-Based Mobile Device Security Streamlines Data Protection

    As smartphones and tablets have become increasingly sophisticated, the amount and types of data stored on them have increased. Confidential data once stored inside the firewall now resides on mobile devices, but many small and medium businesses have not taken sufficient action to address the risks this presents. SMB IT...

    Provided By Webroot Software

  • White Papers // Jan 2014

    CryptoLocker - Your Money or Your Life

    CryptoLocker belongs to a family of malware called "ransomware", which is designed to extort money from victims by denying them access to their personal files. It targets all Windows Operating Systems, from Windows XP to Windows 8, and typically remains unnoticed by victims until it's too late and the damage...

    Provided By Webroot Software

  • White Papers // Oct 2013

    How to get manageable endpoint, mobile device and web security together

    Endpoint protection has never been easy, but it once was at least straightforward. Workers had one computer, used the corporate email system and visited only a few websites while at work. Today, endpoint protection is far more difficult with many employees have two, three or four Internet-connected devices containing sensitive...

    Provided By Webroot Software

  • White Papers // Sep 2013

    PassMark Ranks Leading Endpoint Protection Products

    In today's challenging security environment, using the best products that fulfill your business needs is of the essence. So when evaluating solutions, be sure to look at all aspects of a product - including performance benchmark testing. PassMark Software is a leading authority in software and hardware performance benchmarking, providing...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Whitepaper: Putting Web Threat Protection and Content Filtering in the Cloud

    This Webroot whitepaper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications. In addition to these benefits, cloud-based secure web gateways can also provide better...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Mobile Browsing - Is Your Company at Risk?

    This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Managing Web Security in an Increasingly Challenging Threat Landscape

    This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: 100% protection against known...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Faster Scans and Better Virus Detection - Can They Do That?

    This FAQ tells you how to move beyond the old trade-off between anti-malware effectiveness and speed. It answers questions such as what is wrong with conventional approaches, which includes the inability of clients to perform signature matching operations on today's more than 70 million malware variants. It also discusses how...

    Provided By Webroot Software

  • White Papers // Sep 2013

    How cloud architecture and behavior recognition are changing the security game and making traditional antivirus obsolete

    This whitepaper describes how new threats have stretched the capabilities of "fat client" security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Reinventing Anti-virus

    This whitepaper describes how new threats have stretched the capabilities of "fat client" security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Whitepaper: Reinventing Anti-virus

    This whitepaper describes how new threats have stretched the capabilities of "fat client" security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Survey: Web Threats Expose Businesses to Data Loss

    A study was conducted to gauge the prevalence of web-borne attacks, their consequences, and how IT pros are responding. Among the results, the vast majority of companies surveyed experienced one or more types of web-borne attacks in 2012. The survey report also includes recommendations - such as deploying a secure...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Phishing: No. 1 web threat and how web security can protect your company

    This whitepaper discusses a major new threat vector - "phishing 2.0." While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses. These phish evade traditional antivirus and antiphishing products. Learn...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Web Threats - Is Your Company Exposed?

    This infographic gives a quick visual representation of some of the key findings of recent Webroot research on web security in the US and UK. The findings highlight the significant costs that web threats pose to businesses - such as increased help desk support - and the risks especially for...

    Provided By Webroot Software

  • White Papers // Sep 2013

    The Wild, Wild West of Mobile Apps

    This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Malicious Mobile Apps (MMA) - A Growing Threat in 2013 and Beyond

    With the exploding use of mobile devices and BYOD, mobile apps represent a major new threat. This infographic reveals some surprising facts about malicious mobile apps, including where they come from, what they do, and what other IT pros are thinking about MMAs. Download now to discover the interesting facts.

    Provided By Webroot Software

  • White Papers // Sep 2013

    The Wild, Wild West of Mobile

    This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Remote Users Expose Companies to Cybercrime

    As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Free Application: Webroot System Analyzer

    Fast, accurate diagnosis equals rapid, cost-effective remediation. Webroot System Analyzer looks inside a problem system and gives you a quick assessment plus a detailed report on all aspects of hardware, OS, and installed applications. Simply click web link and run application - no install or uninstall required Summary Analysis...

    Provided By Webroot Software

  • White Papers // Aug 2013

    Webroot System Analyzer - Free Application

    Fast, accurate diagnosis equals rapid, cost-effective remediation. Webroot System Analyzer looks inside a problem system and gives you a quick assessment plus a detailed report on all aspects of hardware, OS, and installed applications. Simply click web link and run application - no install or uninstall required Summary Analysis pinpoints...

    Provided By Webroot Software

  • White Papers // Aug 2013

    Infographic: Malicious Mobile Apps (MMA) - A Growing Threat in 2013 and Beyond

    With the exploding use of mobile devices and BYOD, mobile apps represent a major new threat. This infographic reveals some surprising facts about malicious mobile apps, including where they come from, what they do, and what other IT pros are thinking about MMAs.Download now to discover the interesting facts.

    Provided By Webroot Software

  • White Papers // Aug 2013

    Whitepaper: The Wild, Wild West of Mobile

    This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile...

    Provided By Webroot Software

  • White Papers // Aug 2013

    Survey: Remote Users Expose Companies to Cybercrime

    As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate...

    Provided By Webroot Software

  • White Papers // Jun 2013

    Building a Business Case: Integrated mobile security for small and midsize businesses

    The shift to a more mobile workforce and business environment is taking place, dramatically, right before our eyes. We are seeing the rise of mobile applications and the use of smaller consumer devices for all types of applications. And we are seeing those same devices being used for business applications...

    Provided By Webroot Software

  • White Papers // Jun 2013

    Why phishing is back as the No. 1 web threat, and how web security can protect your company

    At one point, it seemed that phishing was receding to the status of a minor issue threatening only naive consumers. But a new version has emerged, fueled by new cybercriminals and new phishing techniques. New types of phishing campaigns are particularly worrisome for businesses because: They are aimed at...

    Provided By Webroot Software

  • White Papers // Jun 2013

    Web Threats Expose Businesses to Data Loss Commissioned Study

    Webroot recently conducted research to assess the state of the Web security layer in organizations throughout the United States and the United Kingdom. The study—which focused on companies that currently have a Web security solution or plan to deploy one in 2013—found that Web-borne attacks are impacting businesses, with the...

    Provided By Webroot Software

  • White Papers // May 2013

    User-Based Licensing for Endpoint Protection and BYOD

    Can Smarter Licensing Improve Security? IT managers and security professionals don’t spend much time thinking about software licensing. But sometimes a smarter licensing plan can simplify IT administration, reduce costs and improve security. A perfect example is a new model for endpoint and mobile device protection that licenses software by...

    Provided By Webroot Software

  • White Papers // May 2013

    Closing the Circle: How to get manageable endpoint, mobile device and web security together

    Endpoint protection has gotten more complicated. Endpoint protection has never been easy, but it once was at least straightforward. Workers had one computer, used the corporate email system and visited only a few websites while at work. Today, endpoint protection is far more difficult. In this white paper we will...

    Provided By Webroot Software

  • White Papers // Jan 2013

    Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors

    PassMark Software® conducted objective performance testing on eight security software products, on Windows 7 Ultimate Edition (64-bit) during January 2013. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products. This report presents our results and findings...

    Provided By Webroot Software

  • White Papers // Dec 2012

    Delivering a Secure Mobile Future

    In two short years we have seen an explosion of Android powered devices. Google’s mobile growth is up 250% over last year’s, and seeing over 850,000+ new Android activations every day! The charge to adopt and harness this ‘perfect storm’ of mobile technology to increase productivity and simplify our work/...

    Provided By Webroot Software

  • White Papers // Dec 2012

    Webroot: BYOD - Delivering a Secure Mobile Future

    In two short years we have seen an explosion of Android powered devices. The mobile Internet has truly arrived and is starting to deliver on the anytime, anywhere and almost anyplace access that lets us take more control over our time and lives. However, BYOD does raise a lot of...

    Provided By Webroot Software

  • White Papers // Nov 2012

    How to Protect Your Business from the Coming Malware Storm

    A new generation of organized, well-funded and financially-motivated online criminals are now launching attacks using social networks, exploiting consumer and mobile devices and vulnerabilities in Web applications, and deploying blended threats to attack financial targets and individual businesses. These new attacks use human intelligence coupled with unique or customized code...

    Provided By Webroot Software

  • Videos // Oct 2012

    Short Video: Introducing Webroot SecureAnywhere Business - Endpoint Protection

    Until now, security has been a huge waste of time. It has been a lead weight on your system - an irritation. For the last 20 years, security has been anything but secure. That stops now. Introducing Webroot SecureAnywhere Business - Endpoint Protection - A completely new way of looking...

    Provided By Webroot Software

  • White Papers // Sep 2012

    Building a better mousetrap in anti-malware

    Change is a constant in security. Threats are constantly changing to evade security defenses and to reach their objectives, which is increasingly for financial gain. Oddly, some categories of security defenses have remained essentially unchanged in their operating principles. Is security money and resources being spent wisely? Are businesses buying...

    Provided By Webroot Software

  • Research // Sep 2012

    BYOD Survey Report: Mobile Threats are Real and Costly

    A lack of integrated mobile security is costing companies from lost productivity to lost data. In fact, 83% of IT professionals believe that mobile devices create a high security risk within the corporate environment. Webroot recently conducted research to assess the state of mobile security in organizations throughout the United...

    Provided By Webroot Software

  • White Papers // Jul 2012

    How Webroot SecureAnywhere Business-Endpoint Protection and Windows 8 Change Everything

    Endpoint Protection compliments this screening approach perfectly. With difficult to classify 'unknown' files, or those that have fooled the reputation filtering, the added power of the Webroot Intelligence Network layer enables real-time analysis of the true behavior of unknown files and instantaneous and accurate categorisation to whether they're malicious, or...

    Provided By Webroot Software

  • White Papers // Sep 2012

    Building a better mousetrap in anti-malware

    Change is a constant in security. Threats are constantly changing to evade security defenses and to reach their objectives, which is increasingly for financial gain. Oddly, some categories of security defenses have remained essentially unchanged in their operating principles. Is security money and resources being spent wisely? Are businesses buying...

    Provided By Webroot Software

  • White Papers // Nov 2012

    How to Protect Your Business from the Coming Malware Storm

    A new generation of organized, well-funded and financially-motivated online criminals are now launching attacks using social networks, exploiting consumer and mobile devices and vulnerabilities in Web applications, and deploying blended threats to attack financial targets and individual businesses. These new attacks use human intelligence coupled with unique or customized code...

    Provided By Webroot Software

  • White Papers // Jul 2012

    How Webroot SecureAnywhere Business-Endpoint Protection and Windows 8 Change Everything

    Endpoint Protection compliments this screening approach perfectly. With difficult to classify 'unknown' files, or those that have fooled the reputation filtering, the added power of the Webroot Intelligence Network layer enables real-time analysis of the true behavior of unknown files and instantaneous and accurate categorisation to whether they're malicious, or...

    Provided By Webroot Software

  • Videos // Oct 2012

    Short Video: Introducing Webroot SecureAnywhere Business - Endpoint Protection

    Until now, security has been a huge waste of time. It has been a lead weight on your system - an irritation. For the last 20 years, security has been anything but secure. That stops now. Introducing Webroot SecureAnywhere Business - Endpoint Protection - A completely new way of looking...

    Provided By Webroot Software

  • Research // Sep 2012

    BYOD Survey Report: Mobile Threats are Real and Costly

    A lack of integrated mobile security is costing companies from lost productivity to lost data. In fact, 83% of IT professionals believe that mobile devices create a high security risk within the corporate environment. Webroot recently conducted research to assess the state of mobile security in organizations throughout the United...

    Provided By Webroot Software

  • White Papers // Dec 2012

    Webroot: BYOD - Delivering a Secure Mobile Future

    In two short years we have seen an explosion of Android powered devices. The mobile Internet has truly arrived and is starting to deliver on the anytime, anywhere and almost anyplace access that lets us take more control over our time and lives. However, BYOD does raise a lot of...

    Provided By Webroot Software

  • White Papers // Dec 2012

    Delivering a Secure Mobile Future

    In two short years we have seen an explosion of Android powered devices. Google’s mobile growth is up 250% over last year’s, and seeing over 850,000+ new Android activations every day! The charge to adopt and harness this ‘perfect storm’ of mobile technology to increase productivity and simplify our work/...

    Provided By Webroot Software

  • White Papers // Jan 2013

    Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors

    PassMark Software® conducted objective performance testing on eight security software products, on Windows 7 Ultimate Edition (64-bit) during January 2013. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products. This report presents our results and findings...

    Provided By Webroot Software

  • White Papers // May 2013

    User-Based Licensing for Endpoint Protection and BYOD

    Can Smarter Licensing Improve Security? IT managers and security professionals don’t spend much time thinking about software licensing. But sometimes a smarter licensing plan can simplify IT administration, reduce costs and improve security. A perfect example is a new model for endpoint and mobile device protection that licenses software by...

    Provided By Webroot Software

  • White Papers // May 2013

    Closing the Circle: How to get manageable endpoint, mobile device and web security together

    Endpoint protection has gotten more complicated. Endpoint protection has never been easy, but it once was at least straightforward. Workers had one computer, used the corporate email system and visited only a few websites while at work. Today, endpoint protection is far more difficult. In this white paper we will...

    Provided By Webroot Software

  • White Papers // Jun 2013

    Building a Business Case: Integrated mobile security for small and midsize businesses

    The shift to a more mobile workforce and business environment is taking place, dramatically, right before our eyes. We are seeing the rise of mobile applications and the use of smaller consumer devices for all types of applications. And we are seeing those same devices being used for business applications...

    Provided By Webroot Software

  • White Papers // Jun 2013

    Why phishing is back as the No. 1 web threat, and how web security can protect your company

    At one point, it seemed that phishing was receding to the status of a minor issue threatening only naive consumers. But a new version has emerged, fueled by new cybercriminals and new phishing techniques. New types of phishing campaigns are particularly worrisome for businesses because: They are aimed at...

    Provided By Webroot Software

  • White Papers // Jun 2013

    Web Threats Expose Businesses to Data Loss Commissioned Study

    Webroot recently conducted research to assess the state of the Web security layer in organizations throughout the United States and the United Kingdom. The study—which focused on companies that currently have a Web security solution or plan to deploy one in 2013—found that Web-borne attacks are impacting businesses, with the...

    Provided By Webroot Software

  • White Papers // Aug 2013

    Webroot System Analyzer - Free Application

    Fast, accurate diagnosis equals rapid, cost-effective remediation. Webroot System Analyzer looks inside a problem system and gives you a quick assessment plus a detailed report on all aspects of hardware, OS, and installed applications. Simply click web link and run application - no install or uninstall required Summary Analysis pinpoints...

    Provided By Webroot Software

  • White Papers // Jan 2014

    Cloud-Based Mobile Device Security Streamlines Data Protection

    As smartphones and tablets have become increasingly sophisticated, the amount and types of data stored on them have increased. Confidential data once stored inside the firewall now resides on mobile devices, but many small and medium businesses have not taken sufficient action to address the risks this presents. SMB IT...

    Provided By Webroot Software

  • White Papers // Mar 2014

    Top 5 Malware Trends for 2014 and How to Combat Them

    Malware will continue to evolve and attacks will become more sophisticated this year. Increased use of mobile devices makes it more challenging to protect systems and data. Companies need a security solution that protects PCs, tablets, and smartphones against malware and web threats. Read More...

    Provided By Webroot Software

  • White Papers // Sep 2013

    The Wild, Wild West of Mobile Apps

    This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile...

    Provided By Webroot Software

  • White Papers // Mar 2014

    Webroot Intelligence Network: Real-Time Protection Against Malware Infection

    Malware is at such high levels that protecting an endpoint with traditional antivirus software, has become futile. More than 100,000 new types of malware are now released every day, and antivirus vendors are racing to add new protection features to try to keep their protection levels up. A new malware...

    Provided By Webroot Software

  • Downloads // Apr 2014

    Business Essential: Complimentary Vulnerability Scan

    This complimentary security scanner searches for endpoint vulnerabilities, including misconfigurations, missing patches, open services and backdoors. Run the scan to receive a detailed report so you can address security vulnerabilities before they become a problem. Find out if your endpoints are secure. Try this FREE vulnerability scanner now.

    Provided By Webroot Software

  • Downloads // Jun 2014

    Webroot protects your devices everywhere

    SecureAnywhere Endpoint Protection offers instantaneous protection and fast scans without the hassle of time-consuming patches and signature updates. You can get your free trial today - just click "download", fill out and submit the form, and we'll email you a download link and instructions. Then just go to your...

    Provided By Webroot Software

  • White Papers // Jul 2010

    Next-generation email and web security

    By combining email and web security controls, organisations can better protect themselves from the inbound and outbound threats that they face. This paper discusses what organisations should look for--especially given the benefits of outsourcing such services to a cloud-based service provider.

    Provided By Webroot Software

  • White Papers // Jul 2010

    The benefits of basing email and web security in the cloud

    Today's threat landscape is complex and no organisation is immune from security threats, no matter their size. The low upfront investment and the high level of protection that such services provide are key benefits of subscribing to such services rather than having to deploy the technology themselves.

    Provided By Webroot Software

  • White Papers // Oct 2010

    Unifying electronic communications for enhanced security

    Through combined, integrated web and email protection, organisations will be in a better position to protect personal and sensitive corporate information from online and internal threats, which is especially important given the sophisticated nature of today's threats that are highly targeted and that use blended vectors of attack.

    Provided By Webroot Software

  • White Papers // Jan 2009

    SaaS Secures in Uncertain Times

    There are three truisms about a tight economy that every IT manager knows: One has to support more projects with fewer people and tighter budgets; approvals for infrastructure build-outs are scarce; and it's one's job to ensure employee productivity remains high. These may seem like Herculean tasks, especially when one...

    Provided By Webroot Software

  • White Papers // Apr 2009

    Technology Audit: Webroot Web and Email Security

    Webroot is an established security provider of Software as a Service (SaaS)-delivered e-mail and Web security suites. The e-mail security suite comprises anti-spam, anti-virus, content scanning for Data Loss Prevention (DLP), image scanning, continuity management for mails, e-mail archiving, and e-mail encryption. The Web security suite comprises anti-virus, anti-spyware, anti-phishing,...

    Provided By Webroot Software

  • Webcasts // Aug 2010

    A Brief History of Malware

    Just when one thought it was safe to rely on the Internet again, attackers have unleashed a new set of exploits. Today's malware now hides not only in blacklisted websites and email attachments - it may emanate from the Web's most popular sites, from "Friends" on popular social networking sites,...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    How to Find Vulnerabilities Before Attackers Do

    Today's cybercriminals are smart. They know that the fastest way to attack the network is with web-based malware that exploits known vulnerabilities in the software and operating systems. One need a defense - but when resources are tight, can afford the time and expense of managing web security plus a...

    Provided By Webroot Software

  • Webcasts // May 2010

    4 Advantages You Must Know About SaaS Archiving

    The current regulatory environment has created a dramatic increase in employee generated content that needs to be archived for all businesses. In the new "Save Everything" environment, email is the single largest source of data that needs to be stored in a compliant form. The demand is far outpacing available...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    We All Have Mobile/remote Users: Most of Us Have Multiple Locations to Manage - All of Us Want: Airtight Security, Unbeatable TCO, an Easy-to-Use Management Console

    Recently there was zero-day vulnerability/attack against MS Internet Explorer. While other security vendors were scrambling to address the issue, Webroot sat back and watched their proprietary Javascript heuristics technology do its thing protecting all their customers. Issues like this occur frequently, and if one have an on-premise security appliance, one...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Safety in the Network Neighborhood: Protecting Enterprise Assets From Social Networking Threats

    Of all the network security threats, one of the most challenging to secure against is malware attacks originating from social networking sites, particularly as organizations begin to use social networking and other Web 2.0 sites for business purposes. Organizations must now reconcile how to enforce Web 2.0 acceptable use policies...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Email Encryption: How to Comply With New Privacy and Security Requirements

    New state regulations, updated HIPAA requirements due to HITECH, FINRA, and many other measures are driving the need to adopt more comprehensive encryption and data security technologies. For any organization that sends and receives sensitive data, Email Encryption is almost a mandatory component to any email communication strategy. During this...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Take a 2.0 Approach to Mobile User Protection

    Yesterday's Web security solutions are inadequate for today's mobile workforce. Not only is authentication tedious, but threat protection is unreliable and Internet policy enforcement is difficult. View this webcast and see why the Web Security Service is the BEST strategy to seamlessly protect the mobile users in a Web 2.0...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Managing Your Email Archive Can Be a Painful Experience. Without a Sound Email Archiving Service in Place, Your Database

    As if dealing with disorganized emails weren't hard enough, amendments to the Federal Rules of Civil Procedure (FRCP) require organizations to respond quicker than ever to discovery and internal investigation requests. Fees for delayed responses to e-discovery requests are substantial - in one case, the U.S. District Court determined a...

    Provided By Webroot Software

  • White Papers // Aug 2013

    Infographic: Malicious Mobile Apps (MMA) - A Growing Threat in 2013 and Beyond

    With the exploding use of mobile devices and BYOD, mobile apps represent a major new threat. This infographic reveals some surprising facts about malicious mobile apps, including where they come from, what they do, and what other IT pros are thinking about MMAs.Download now to discover the interesting facts.

    Provided By Webroot Software

  • White Papers // Aug 2013

    Whitepaper: The Wild, Wild West of Mobile

    This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile...

    Provided By Webroot Software

  • White Papers // Aug 2013

    Survey: Remote Users Expose Companies to Cybercrime

    As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Malicious Mobile Apps (MMA) - A Growing Threat in 2013 and Beyond

    With the exploding use of mobile devices and BYOD, mobile apps represent a major new threat. This infographic reveals some surprising facts about malicious mobile apps, including where they come from, what they do, and what other IT pros are thinking about MMAs. Download now to discover the interesting facts.

    Provided By Webroot Software

  • White Papers // Sep 2013

    The Wild, Wild West of Mobile

    This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Remote Users Expose Companies to Cybercrime

    As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Free Application: Webroot System Analyzer

    Fast, accurate diagnosis equals rapid, cost-effective remediation. Webroot System Analyzer looks inside a problem system and gives you a quick assessment plus a detailed report on all aspects of hardware, OS, and installed applications. Simply click web link and run application - no install or uninstall required Summary Analysis...

    Provided By Webroot Software