Webroot Software

Displaying 41-80 of 85 results

  • Research // Sep 2012

    BYOD Survey Report: Mobile Threats are Real and Costly

    A lack of integrated mobile security is costing companies from lost productivity to lost data. In fact, 83% of IT professionals believe that mobile devices create a high security risk within the corporate environment. Webroot recently conducted research to assess the state of mobile security in organizations throughout the United...

    Provided By Webroot Software

  • White Papers // Jul 2012

    How Webroot SecureAnywhere Business-Endpoint Protection and Windows 8 Change Everything

    Endpoint Protection compliments this screening approach perfectly. With difficult to classify 'unknown' files, or those that have fooled the reputation filtering, the added power of the Webroot Intelligence Network layer enables real-time analysis of the true behavior of unknown files and instantaneous and accurate categorisation to whether they're malicious, or...

    Provided By Webroot Software

  • White Papers // Oct 2010

    Unifying electronic communications for enhanced security

    Through combined, integrated web and email protection, organisations will be in a better position to protect personal and sensitive corporate information from online and internal threats, which is especially important given the sophisticated nature of today's threats that are highly targeted and that use blended vectors of attack.

    Provided By Webroot Software

  • Webcasts // Aug 2010

    A Brief History of Malware

    Just when one thought it was safe to rely on the Internet again, attackers have unleashed a new set of exploits. Today's malware now hides not only in blacklisted websites and email attachments - it may emanate from the Web's most popular sites, from "Friends" on popular social networking sites,...

    Provided By Webroot Software

  • White Papers // Jul 2010

    Next-generation email and web security

    By combining email and web security controls, organisations can better protect themselves from the inbound and outbound threats that they face. This paper discusses what organisations should look for--especially given the benefits of outsourcing such services to a cloud-based service provider.

    Provided By Webroot Software

  • White Papers // Jul 2010

    The benefits of basing email and web security in the cloud

    Today's threat landscape is complex and no organisation is immune from security threats, no matter their size. The low upfront investment and the high level of protection that such services provide are key benefits of subscribing to such services rather than having to deploy the technology themselves.

    Provided By Webroot Software

  • White Papers // Jul 2010

    Why email and web security should be tied together

    Today's threat environment is increasingly complex, with hackers using sophisticated exploits that use both email and web vulnerabilities in combination to try to make their attacks more successful. Organisations need to take a holistic view of their communications mechanisms to shield themselves and safeguard their assets.

    Provided By Webroot Software

  • Case Studies // Jun 2010

    In the State V. Malware, the Supreme Court of Georgia Wins With Webroot

    The Supreme Court of Georgia located in Atlanta has seven justices and approximately 80 employees, including staff attorneys, administrators, docket clerks and IT staff. Supreme Court of Georgia fall victim to malware advertising itself as an anti-virus program. The fake virus alert would appear onscreen, but unlike similar versions, users...

    Provided By Webroot Software

  • Case Studies // Jun 2010

    Aspire to a Network Free of Malicious Programs

    Aspire of Western New York has served children and adults with cerebral palsy, intellectual disabilities, epilepsy, autism and other neurological impairments, striving to let them live as independently as possible. The malicious virus "Sality," which spreads rapidly through infected .exe and .scr files, as well as via a Trojan that...

    Provided By Webroot Software

  • Webcasts // May 2010

    4 Advantages You Must Know About SaaS Archiving

    The current regulatory environment has created a dramatic increase in employee generated content that needs to be archived for all businesses. In the new "Save Everything" environment, email is the single largest source of data that needs to be stored in a compliant form. The demand is far outpacing available...

    Provided By Webroot Software

  • Case Studies // Apr 2010

    City of Chula Vista Uses Webroot to Protect Government Email

    The city of Chula Vista, located on the San Diego harbor, is home to almost a quarter million California residents who love sun, surf and the perfect Mediterranean climate. The IT staff for Chula Vista serves several crucial government departments including police, fire, public works, building, planning, the library system,...

    Provided By Webroot Software

  • Case Studies // Apr 2010

    Technical Outsourcing Firm Chooses Webroot for Layered Web and Endpoint Security

    System One's IT staff consists of four people managing a network of 160 employees, almost all laptop users, along with over 20 remote office locations. Protection for the users was the requirement. Plus, they only have a T1 line here and the Web traffic was really spiking. They needed something...

    Provided By Webroot Software

  • Case Studies // Apr 2010

    Tribal Introduces Webroot Email Security and Business Continuity Services

    Tribal Group plc, is a leading provider of advisory, technology and service delivery solutions to the public sector in the UK and internationally. With its commitment to continuous improvement, the company both delivers, and expects, the best in every aspect of its business. They wanted email security which was not...

    Provided By Webroot Software

  • Case Studies // Mar 2010

    The Trinity School for Ministry Fights the Good Fight With Webroot

    The Trinity School for Ministry is a graduate school of religion located in Ambridge, Pennsylvania, about 30 minutes outside of Pittsburgh. As the use of laptops and the Internet became more prevalent, Heather Henkel, IT Manager, noticed a steady increase in malware and viruses. Mobile users were going to legitimate...

    Provided By Webroot Software

  • Case Studies // Mar 2010

    Total Fitness Introduces Webroot Web and Email Security Services

    With a chain of 24 centres employing up to 1,000 people, Total Fitness operates some of the leading leisure and fitness clubs across the UK and Ireland .The company takes information security seriously, especially the filtering of computers within its cafes which provide access to the Internet. Total Fitness decided...

    Provided By Webroot Software

  • White Papers // Mar 2010

    Why security is best served in the cloud

    With the web becoming the prime method of attack as other vectors are closed through security solutions, organisations are increasingly looking to beef up their security controls for web threats. But for many resource-strapped organisations looking to do more with less, managing an in-house deployment can prove to be too...

    Provided By Webroot Software

  • Case Studies // Jan 2010

    Neopost Introduces Webroot Web and Email Security Services

    The Neopost Group supplies mailroom, document and logistics systems in more than 90 countries, and is the no.1 supplier in Europe. Neopost decided to consolidate and find a solution that offered both Web and email security. On the email side they were looking at virus and spam protection, and for...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    How to Find Vulnerabilities Before Attackers Do

    Today's cybercriminals are smart. They know that the fastest way to attack the network is with web-based malware that exploits known vulnerabilities in the software and operating systems. One need a defense - but when resources are tight, can afford the time and expense of managing web security plus a...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    We All Have Mobile/remote Users: Most of Us Have Multiple Locations to Manage - All of Us Want: Airtight Security, Unbeatable TCO, an Easy-to-Use Management Console

    Recently there was zero-day vulnerability/attack against MS Internet Explorer. While other security vendors were scrambling to address the issue, Webroot sat back and watched their proprietary Javascript heuristics technology do its thing protecting all their customers. Issues like this occur frequently, and if one have an on-premise security appliance, one...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Safety in the Network Neighborhood: Protecting Enterprise Assets From Social Networking Threats

    Of all the network security threats, one of the most challenging to secure against is malware attacks originating from social networking sites, particularly as organizations begin to use social networking and other Web 2.0 sites for business purposes. Organizations must now reconcile how to enforce Web 2.0 acceptable use policies...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Email Encryption: How to Comply With New Privacy and Security Requirements

    New state regulations, updated HIPAA requirements due to HITECH, FINRA, and many other measures are driving the need to adopt more comprehensive encryption and data security technologies. For any organization that sends and receives sensitive data, Email Encryption is almost a mandatory component to any email communication strategy. During this...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Take a 2.0 Approach to Mobile User Protection

    Yesterday's Web security solutions are inadequate for today's mobile workforce. Not only is authentication tedious, but threat protection is unreliable and Internet policy enforcement is difficult. View this webcast and see why the Web Security Service is the BEST strategy to seamlessly protect the mobile users in a Web 2.0...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Managing Your Email Archive Can Be a Painful Experience. Without a Sound Email Archiving Service in Place, Your Database

    As if dealing with disorganized emails weren't hard enough, amendments to the Federal Rules of Civil Procedure (FRCP) require organizations to respond quicker than ever to discovery and internal investigation requests. Fees for delayed responses to e-discovery requests are substantial - in one case, the U.S. District Court determined a...

    Provided By Webroot Software

  • Case Studies // Nov 2009

    Everton Football Club Scores by Introducing Webroot Email Security Service

    Everton is a high profile brand, which means that it has a significantly higher proportion of inappropriate email than most businesses - indeed, only 1% of all inbound email traffic is legitimate mail. Being a Premier League club and a household name, Everton Football Club is a prime target for...

    Provided By Webroot Software

  • Case Studies // Jul 2009

    College of Law Resolves Email Security Issue With Webroot e-Mail Security SaaS

    Guildford-based College of Law is a leading supplier of legal education and training in the UK, with affiliations and endorsements from many of the country's leading legal firms. The IT team had installed GWAVA, an anti-spam and anti-virus solution for GroupWise systems, to protect its network of 2,500 PCs. However,...

    Provided By Webroot Software

  • Case Studies // Jul 2009

    Toshiba Taps Webroot to Provide Web Security in the Cloud

    The Tokyo-based Toshiba Corporation is a brand recognized for its innovative electronic and electrical products. At the Toshiba branch in France, Jerome Jasmin, Director of the Information Department, and his staffs of 12 were working hard to provide efficient Web protection to the branch's 600 employees. They had two different...

    Provided By Webroot Software

  • Case Studies // Jul 2009

    Sunco Cabinets Unifies Email and Web Security With Webroot

    Sunco Cabinets, known as one of the premier manufacturers of wood cabinetry for the home, has been in business for over twenty five years. Sunco ran all of its email through its own server, and utilized its own server based applications to scan email traffic for spam and viruses which...

    Provided By Webroot Software

  • White Papers // Apr 2009

    Technology Audit: Webroot Web and Email Security

    Webroot is an established security provider of Software as a Service (SaaS)-delivered e-mail and Web security suites. The e-mail security suite comprises anti-spam, anti-virus, content scanning for Data Loss Prevention (DLP), image scanning, continuity management for mails, e-mail archiving, and e-mail encryption. The Web security suite comprises anti-virus, anti-spyware, anti-phishing,...

    Provided By Webroot Software

  • Case Studies // Apr 2009

    Law Firm Simplifies Web and Email Security Across Multiple Offices With Webroot Security SaaS

    Lester Aldridge LLP is a leading law firm with over 350 staff based across four sites in the UK; Lester Aldridge relies upon email and the Internet for communication and research on a daily basis. The firm was securing and filtering its email messages with Webroot E-Mail Security Software as...

    Provided By Webroot Software

  • Case Studies // Mar 2009

    Richmond Ambulance Authority Turns to Webroot to Protect Mobile Devices

    Richmond Ambulance Authority (RAA) provides Emergency Medical Services (EMS) to more than 200,000 people across Richmond, Va., making it one of the busiest per-capita systems in the nation. RAA needed a comprehensive Web security solution that would allow administrators to monitor and manage Internet activity while providing an extra layer...

    Provided By Webroot Software

  • Case Studies // Mar 2009

    Texas Trust Credit Union Chooses Webroot for Web Security, email Security and Encryption Services

    Texas Trust Credit Union (TTCU) is one of the largest credit unions in the Dallas area, operating seven branch locations that serve over 58,000 members. The need for web filtering began when TTCU created a cybercaf? with Internet access in the lobby for customers to use for online banking. They...

    Provided By Webroot Software

  • Case Studies // Mar 2009

    The Ritz London Improves Security With Webroot e-Mail Security SaaS

    The Ritz London is one of the world's greatest hotels. For a hotel like The Ritz, the overall email reporting and tracking capabilities must be top-notch in order to efficiently respond to agents' enquiries, bookings, cancellations and even complaints. After considering the technical specifications of Webroot's design functionality - particularly...

    Provided By Webroot Software

  • Case Studies // Mar 2009

    The San Francisco Symphony Hits the Right Note With Webroot e-Mail Security SaaS

    The San Francisco Symphony is widely recognized as one of the foremost arts institutions in the United States. Numerous legacy systems were in place to support the Symphony's network, but its business needs had outgrown the applications' capabilities. Between email services for more than 100 staff, online ticket sales and...

    Provided By Webroot Software

  • White Papers // Jan 2009

    SaaS Secures in Uncertain Times

    There are three truisms about a tight economy that every IT manager knows: One has to support more projects with fewer people and tighter budgets; approvals for infrastructure build-outs are scarce; and it's one's job to ensure employee productivity remains high. These may seem like Herculean tasks, especially when one...

    Provided By Webroot Software

  • Case Studies // Dec 2008

    Insurance Trade Association Improves Bandwidth and Productivity With Webroot Web Security SaaS

    The Massachusetts Association of Insurance Agents (MAIA) provides educational resources and networking opportunities for approximately 10,000 agents across the state. MAIA was concerned about dangerous Web-borne malware that employees might unknowingly bring into the network. The IT team had attempted to secure the system by employing a firewall, but they...

    Provided By Webroot Software

  • Case Studies // Oct 2008

    Leading Law Firm Solves Compliance Issue With Webroot Security SaaS

    Founded in 1984, Watson Goepel Maledy has grown from four partners to a mixed practice firm of over 35 lawyers. The firm attributes a large part of its success to a strong customer service commitment that ensures every client - regardless of size or budget - receives first-rate legal counsel...

    Provided By Webroot Software

  • White Papers // Oct 2008

    State of Internet Security: Protecting the Perimeter

    Over time, many fundamental business activities - marketing, advertising, customer support, research - have become Web dependent. At the same time, the Web is now considered the number one delivery mechanism for malware. This poses a significant security challenge to companies around the world. Compounding that challenge is the advent...

    Provided By Webroot Software

  • Case Studies // Sep 2008

    Texas' Largest Undergraduate Institution Finds e-Mail Security With Webroot SaaS

    With seven colleges that have served more than 1.5 million students since 1965, Dallas County Community College District (DCCCD) is the largest undergraduate institution in the state of Texas. The DCCCD needed a more effective, more manageable e-mail security solution to cut down on spam, which would not only increase...

    Provided By Webroot Software

  • Case Studies // Aug 2008

    Leading Law Firm Improves Security and Compliance With Webroot SaaS

    The new legislation created a conflict for Watson Goepel Maledy as its e-mail and Web security vendor's servers were located in the U.S. and the U.S. Patriot Act gave American authorities the ability to view personal data held by U.S. organizations. Since client confidentiality and security are at the heart...

    Provided By Webroot Software

  • White Papers // Jul 2008

    Why Security SaaS Makes Sense Today

    Corporate IT teams are waging a significant security battle on two fronts these days: stopping attacks via the Web and through email. They are tirelessly trying to protect their networks against known and unknown viruses, spyware and phishing attacks. However, the more complex these threats become, the more infrastructure companies...

    Provided By Webroot Software

  • Case Studies // Aug 2008

    Leading Law Firm Improves Security and Compliance With Webroot SaaS

    The new legislation created a conflict for Watson Goepel Maledy as its e-mail and Web security vendor's servers were located in the U.S. and the U.S. Patriot Act gave American authorities the ability to view personal data held by U.S. organizations. Since client confidentiality and security are at the heart...

    Provided By Webroot Software

  • White Papers // Jan 2009

    SaaS Secures in Uncertain Times

    There are three truisms about a tight economy that every IT manager knows: One has to support more projects with fewer people and tighter budgets; approvals for infrastructure build-outs are scarce; and it's one's job to ensure employee productivity remains high. These may seem like Herculean tasks, especially when one...

    Provided By Webroot Software

  • White Papers // Jun 2008

    Archiving Technical Overview: A Technical Overview Paper Describing Key Functions and Capabilities of the Managed Archiving Service

    Webroot's Email Archiving Service is designed as a mission critical service, offering organizations the option to quickly and easily deploy an archiving solution requiring no additional hardware or software. Driven through compliance requirements, business continuity and the need to continually manage storage costs, the Archiving Service offers a fully featured...

    Provided By Webroot Software

  • White Papers // Jun 2008

    Spyware: A Clear and Present Danger

    Used to be, a virus would tear through computer systems worldwide and within days, trash hundreds of thousands of systems, garnering global headlines before an antidote was created and distributed with similar alacrity. Now, silent and potentially far more deadly code is in play, which if it's working right, will...

    Provided By Webroot Software

  • White Papers // Jul 2008

    Why Security SaaS Makes Sense Today

    Corporate IT teams are waging a significant security battle on two fronts these days: stopping attacks via the Web and through email. They are tirelessly trying to protect their networks against known and unknown viruses, spyware and phishing attacks. However, the more complex these threats become, the more infrastructure companies...

    Provided By Webroot Software

  • Case Studies // Mar 2009

    Richmond Ambulance Authority Turns to Webroot to Protect Mobile Devices

    Richmond Ambulance Authority (RAA) provides Emergency Medical Services (EMS) to more than 200,000 people across Richmond, Va., making it one of the busiest per-capita systems in the nation. RAA needed a comprehensive Web security solution that would allow administrators to monitor and manage Internet activity while providing an extra layer...

    Provided By Webroot Software

  • Case Studies // Sep 2008

    Texas' Largest Undergraduate Institution Finds e-Mail Security With Webroot SaaS

    With seven colleges that have served more than 1.5 million students since 1965, Dallas County Community College District (DCCCD) is the largest undergraduate institution in the state of Texas. The DCCCD needed a more effective, more manageable e-mail security solution to cut down on spam, which would not only increase...

    Provided By Webroot Software

  • White Papers // Aug 2013

    Infographic: Malicious Mobile Apps (MMA) - A Growing Threat in 2013 and Beyond

    With the exploding use of mobile devices and BYOD, mobile apps represent a major new threat. This infographic reveals some surprising facts about malicious mobile apps, including where they come from, what they do, and what other IT pros are thinking about MMAs.Download now to discover the interesting facts.

    Provided By Webroot Software

  • White Papers // Aug 2013

    Whitepaper: The Wild, Wild West of Mobile

    This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile...

    Provided By Webroot Software

  • White Papers // Aug 2013

    Survey: Remote Users Expose Companies to Cybercrime

    As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Malicious Mobile Apps (MMA) - A Growing Threat in 2013 and Beyond

    With the exploding use of mobile devices and BYOD, mobile apps represent a major new threat. This infographic reveals some surprising facts about malicious mobile apps, including where they come from, what they do, and what other IT pros are thinking about MMAs. Download now to discover the interesting facts.

    Provided By Webroot Software

  • White Papers // Sep 2013

    The Wild, Wild West of Mobile

    This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Remote Users Expose Companies to Cybercrime

    As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Free Application: Webroot System Analyzer

    Fast, accurate diagnosis equals rapid, cost-effective remediation. Webroot System Analyzer looks inside a problem system and gives you a quick assessment plus a detailed report on all aspects of hardware, OS, and installed applications. Simply click web link and run application - no install or uninstall required Summary Analysis...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Survey: Web Threats Expose Businesses to Data Loss

    A study was conducted to gauge the prevalence of web-borne attacks, their consequences, and how IT pros are responding. Among the results, the vast majority of companies surveyed experienced one or more types of web-borne attacks in 2012. The survey report also includes recommendations - such as deploying a secure...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Phishing: No. 1 web threat and how web security can protect your company

    This whitepaper discusses a major new threat vector - "phishing 2.0." While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses. These phish evade traditional antivirus and antiphishing products. Learn...

    Provided By Webroot Software

  • Case Studies // Oct 2008

    Leading Law Firm Solves Compliance Issue With Webroot Security SaaS

    Founded in 1984, Watson Goepel Maledy has grown from four partners to a mixed practice firm of over 35 lawyers. The firm attributes a large part of its success to a strong customer service commitment that ensures every client - regardless of size or budget - receives first-rate legal counsel...

    Provided By Webroot Software

  • White Papers // Apr 2009

    Technology Audit: Webroot Web and Email Security

    Webroot is an established security provider of Software as a Service (SaaS)-delivered e-mail and Web security suites. The e-mail security suite comprises anti-spam, anti-virus, content scanning for Data Loss Prevention (DLP), image scanning, continuity management for mails, e-mail archiving, and e-mail encryption. The Web security suite comprises anti-virus, anti-spyware, anti-phishing,...

    Provided By Webroot Software

  • White Papers // Oct 2008

    State of Internet Security: Protecting the Perimeter

    Over time, many fundamental business activities - marketing, advertising, customer support, research - have become Web dependent. At the same time, the Web is now considered the number one delivery mechanism for malware. This poses a significant security challenge to companies around the world. Compounding that challenge is the advent...

    Provided By Webroot Software

  • White Papers // Jun 2008

    Archiving Technical Overview

    Webroot's Email Archiving Service is designed as a mission critical service, offering organizations the option to quickly and easily deploy an archiving solution requiring no additional hardware or software. Driven through compliance requirements, business continuity and the need to continually manage storage costs, the Archiving Service offers a fully featured...

    Provided By Webroot Software

  • Case Studies // Mar 2009

    Texas Trust Credit Union Chooses Webroot for Web Security, email Security and Encryption Services

    Texas Trust Credit Union (TTCU) is one of the largest credit unions in the Dallas area, operating seven branch locations that serve over 58,000 members. The need for web filtering began when TTCU created a cybercaf? with Internet access in the lobby for customers to use for online banking. They...

    Provided By Webroot Software

  • Case Studies // Mar 2009

    The Ritz London Improves Security With Webroot e-Mail Security SaaS

    The Ritz London is one of the world's greatest hotels. For a hotel like The Ritz, the overall email reporting and tracking capabilities must be top-notch in order to efficiently respond to agents' enquiries, bookings, cancellations and even complaints. After considering the technical specifications of Webroot's design functionality - particularly...

    Provided By Webroot Software

  • Case Studies // Nov 2009

    Everton Football Club Scores by Introducing Webroot Email Security Service

    Everton is a high profile brand, which means that it has a significantly higher proportion of inappropriate email than most businesses - indeed, only 1% of all inbound email traffic is legitimate mail. Being a Premier League club and a household name, Everton Football Club is a prime target for...

    Provided By Webroot Software

  • Case Studies // Jul 2009

    Toshiba Taps Webroot to Provide Web Security in the Cloud

    The Tokyo-based Toshiba Corporation is a brand recognized for its innovative electronic and electrical products. At the Toshiba branch in France, Jerome Jasmin, Director of the Information Department, and his staffs of 12 were working hard to provide efficient Web protection to the branch's 600 employees. They had two different...

    Provided By Webroot Software

  • Case Studies // Dec 2008

    Insurance Trade Association Improves Bandwidth and Productivity With Webroot Web Security SaaS

    The Massachusetts Association of Insurance Agents (MAIA) provides educational resources and networking opportunities for approximately 10,000 agents across the state. MAIA was concerned about dangerous Web-borne malware that employees might unknowingly bring into the network. The IT team had attempted to secure the system by employing a firewall, but they...

    Provided By Webroot Software

  • Case Studies // Jul 2009

    Sunco Cabinets Unifies Email and Web Security With Webroot

    Sunco Cabinets, known as one of the premier manufacturers of wood cabinetry for the home, has been in business for over twenty five years. Sunco ran all of its email through its own server, and utilized its own server based applications to scan email traffic for spam and viruses which...

    Provided By Webroot Software

  • Case Studies // Jul 2009

    College of Law Resolves Email Security Issue With Webroot e-Mail Security SaaS

    Guildford-based College of Law is a leading supplier of legal education and training in the UK, with affiliations and endorsements from many of the country's leading legal firms. The IT team had installed GWAVA, an anti-spam and anti-virus solution for GroupWise systems, to protect its network of 2,500 PCs. However,...

    Provided By Webroot Software

  • Case Studies // Apr 2009

    Law Firm Simplifies Web and Email Security Across Multiple Offices With Webroot Security SaaS

    Lester Aldridge LLP is a leading law firm with over 350 staff based across four sites in the UK; Lester Aldridge relies upon email and the Internet for communication and research on a daily basis. The firm was securing and filtering its email messages with Webroot E-Mail Security Software as...

    Provided By Webroot Software

  • Webcasts // Aug 2010

    A Brief History of Malware

    Just when one thought it was safe to rely on the Internet again, attackers have unleashed a new set of exploits. Today's malware now hides not only in blacklisted websites and email attachments - it may emanate from the Web's most popular sites, from "Friends" on popular social networking sites,...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    How to Find Vulnerabilities Before Attackers Do

    Today's cybercriminals are smart. They know that the fastest way to attack the network is with web-based malware that exploits known vulnerabilities in the software and operating systems. One need a defense - but when resources are tight, can afford the time and expense of managing web security plus a...

    Provided By Webroot Software

  • Webcasts // May 2010

    4 Advantages You Must Know About SaaS Archiving

    The current regulatory environment has created a dramatic increase in employee generated content that needs to be archived for all businesses. In the new "Save Everything" environment, email is the single largest source of data that needs to be stored in a compliant form. The demand is far outpacing available...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    We All Have Mobile/remote Users: Most of Us Have Multiple Locations to Manage - All of Us Want: Airtight Security, Unbeatable TCO, an Easy-to-Use Management Console

    Recently there was zero-day vulnerability/attack against MS Internet Explorer. While other security vendors were scrambling to address the issue, Webroot sat back and watched their proprietary Javascript heuristics technology do its thing protecting all their customers. Issues like this occur frequently, and if one have an on-premise security appliance, one...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Safety in the Network Neighborhood: Protecting Enterprise Assets From Social Networking Threats

    Of all the network security threats, one of the most challenging to secure against is malware attacks originating from social networking sites, particularly as organizations begin to use social networking and other Web 2.0 sites for business purposes. Organizations must now reconcile how to enforce Web 2.0 acceptable use policies...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Email Encryption: How to Comply With New Privacy and Security Requirements

    New state regulations, updated HIPAA requirements due to HITECH, FINRA, and many other measures are driving the need to adopt more comprehensive encryption and data security technologies. For any organization that sends and receives sensitive data, Email Encryption is almost a mandatory component to any email communication strategy. During this...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Take a 2.0 Approach to Mobile User Protection

    Yesterday's Web security solutions are inadequate for today's mobile workforce. Not only is authentication tedious, but threat protection is unreliable and Internet policy enforcement is difficult. View this webcast and see why the Web Security Service is the BEST strategy to seamlessly protect the mobile users in a Web 2.0...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Managing Your Email Archive Can Be a Painful Experience. Without a Sound Email Archiving Service in Place, Your Database

    As if dealing with disorganized emails weren't hard enough, amendments to the Federal Rules of Civil Procedure (FRCP) require organizations to respond quicker than ever to discovery and internal investigation requests. Fees for delayed responses to e-discovery requests are substantial - in one case, the U.S. District Court determined a...

    Provided By Webroot Software

  • Case Studies // Mar 2009

    The San Francisco Symphony Hits the Right Note With Webroot e-Mail Security SaaS

    The San Francisco Symphony is widely recognized as one of the foremost arts institutions in the United States. Numerous legacy systems were in place to support the Symphony's network, but its business needs had outgrown the applications' capabilities. Between email services for more than 100 staff, online ticket sales and...

    Provided By Webroot Software

  • Case Studies // Apr 2010

    Tribal Introduces Webroot Email Security and Business Continuity Services

    Tribal Group plc, is a leading provider of advisory, technology and service delivery solutions to the public sector in the UK and internationally. With its commitment to continuous improvement, the company both delivers, and expects, the best in every aspect of its business. They wanted email security which was not...

    Provided By Webroot Software

  • Case Studies // Apr 2010

    Technical Outsourcing Firm Chooses Webroot for Layered Web and Endpoint Security

    System One's IT staff consists of four people managing a network of 160 employees, almost all laptop users, along with over 20 remote office locations. Protection for the users was the requirement. Plus, they only have a T1 line here and the Web traffic was really spiking. They needed something...

    Provided By Webroot Software

  • Case Studies // Mar 2010

    Total Fitness Introduces Webroot Web and Email Security Services

    With a chain of 24 centres employing up to 1,000 people, Total Fitness operates some of the leading leisure and fitness clubs across the UK and Ireland .The company takes information security seriously, especially the filtering of computers within its cafes which provide access to the Internet. Total Fitness decided...

    Provided By Webroot Software