Webroot Software

Displaying 41-67 of 67 results

  • White Papers // Oct 2010

    Unifying electronic communications for enhanced security

    Through combined, integrated web and email protection, organisations will be in a better position to protect personal and sensitive corporate information from online and internal threats, which is especially important given the sophisticated nature of today's threats that are highly targeted and that use blended vectors of attack.

    Provided By Webroot Software

  • Webcasts // Aug 2010

    A Brief History of Malware

    Just when one thought it was safe to rely on the Internet again, attackers have unleashed a new set of exploits. Today's malware now hides not only in blacklisted websites and email attachments - it may emanate from the Web's most popular sites, from "Friends" on popular social networking sites,...

    Provided By Webroot Software

  • White Papers // Jul 2010

    Next-generation email and web security

    By combining email and web security controls, organisations can better protect themselves from the inbound and outbound threats that they face. This paper discusses what organisations should look for--especially given the benefits of outsourcing such services to a cloud-based service provider.

    Provided By Webroot Software

  • White Papers // Jul 2010

    The benefits of basing email and web security in the cloud

    Today's threat landscape is complex and no organisation is immune from security threats, no matter their size. The low upfront investment and the high level of protection that such services provide are key benefits of subscribing to such services rather than having to deploy the technology themselves.

    Provided By Webroot Software

  • White Papers // Jul 2010

    Why email and web security should be tied together

    Today's threat environment is increasingly complex, with hackers using sophisticated exploits that use both email and web vulnerabilities in combination to try to make their attacks more successful. Organisations need to take a holistic view of their communications mechanisms to shield themselves and safeguard their assets.

    Provided By Webroot Software

  • Case Studies // Jun 2010

    Aspire to a Network Free of Malicious Programs

    Aspire of Western New York has served children and adults with cerebral palsy, intellectual disabilities, epilepsy, autism and other neurological impairments, striving to let them live as independently as possible. The malicious virus "Sality," which spreads rapidly through infected .exe and .scr files, as well as via a Trojan that...

    Provided By Webroot Software

  • Case Studies // Jun 2010

    In the State V. Malware, the Supreme Court of Georgia Wins With Webroot

    The Supreme Court of Georgia located in Atlanta has seven justices and approximately 80 employees, including staff attorneys, administrators, docket clerks and IT staff. Supreme Court of Georgia fall victim to malware advertising itself as an anti-virus program. The fake virus alert would appear onscreen, but unlike similar versions, users...

    Provided By Webroot Software

  • Webcasts // May 2010

    4 Advantages You Must Know About SaaS Archiving

    The current regulatory environment has created a dramatic increase in employee generated content that needs to be archived for all businesses. In the new "Save Everything" environment, email is the single largest source of data that needs to be stored in a compliant form. The demand is far outpacing available...

    Provided By Webroot Software

  • Case Studies // Apr 2010

    City of Chula Vista Uses Webroot to Protect Government Email

    The city of Chula Vista, located on the San Diego harbor, is home to almost a quarter million California residents who love sun, surf and the perfect Mediterranean climate. The IT staff for Chula Vista serves several crucial government departments including police, fire, public works, building, planning, the library system,...

    Provided By Webroot Software

  • Case Studies // Apr 2010

    Technical Outsourcing Firm Chooses Webroot for Layered Web and Endpoint Security

    System One's IT staff consists of four people managing a network of 160 employees, almost all laptop users, along with over 20 remote office locations. Protection for the users was the requirement. Plus, they only have a T1 line here and the Web traffic was really spiking. They needed something...

    Provided By Webroot Software

  • Case Studies // Apr 2010

    Tribal Introduces Webroot Email Security and Business Continuity Services

    Tribal Group plc, is a leading provider of advisory, technology and service delivery solutions to the public sector in the UK and internationally. With its commitment to continuous improvement, the company both delivers, and expects, the best in every aspect of its business. They wanted email security which was not...

    Provided By Webroot Software

  • Case Studies // Mar 2010

    The Trinity School for Ministry Fights the Good Fight With Webroot

    The Trinity School for Ministry is a graduate school of religion located in Ambridge, Pennsylvania, about 30 minutes outside of Pittsburgh. As the use of laptops and the Internet became more prevalent, Heather Henkel, IT Manager, noticed a steady increase in malware and viruses. Mobile users were going to legitimate...

    Provided By Webroot Software

  • Case Studies // Mar 2010

    Total Fitness Introduces Webroot Web and Email Security Services

    With a chain of 24 centres employing up to 1,000 people, Total Fitness operates some of the leading leisure and fitness clubs across the UK and Ireland .The company takes information security seriously, especially the filtering of computers within its cafes which provide access to the Internet. Total Fitness decided...

    Provided By Webroot Software

  • Case Studies // Jan 2010

    Neopost Introduces Webroot Web and Email Security Services

    The Neopost Group supplies mailroom, document and logistics systems in more than 90 countries, and is the no.1 supplier in Europe. Neopost decided to consolidate and find a solution that offered both Web and email security. On the email side they were looking at virus and spam protection, and for...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    How to Find Vulnerabilities Before Attackers Do

    Today's cybercriminals are smart. They know that the fastest way to attack the network is with web-based malware that exploits known vulnerabilities in the software and operating systems. One need a defense - but when resources are tight, can afford the time and expense of managing web security plus a...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    We All Have Mobile/remote Users: Most of Us Have Multiple Locations to Manage - All of Us Want: Airtight Security, Unbeatable TCO, an Easy-to-Use Management Console

    Recently there was zero-day vulnerability/attack against MS Internet Explorer. While other security vendors were scrambling to address the issue, Webroot sat back and watched their proprietary Javascript heuristics technology do its thing protecting all their customers. Issues like this occur frequently, and if one have an on-premise security appliance, one...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Safety in the Network Neighborhood: Protecting Enterprise Assets From Social Networking Threats

    Of all the network security threats, one of the most challenging to secure against is malware attacks originating from social networking sites, particularly as organizations begin to use social networking and other Web 2.0 sites for business purposes. Organizations must now reconcile how to enforce Web 2.0 acceptable use policies...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Email Encryption: How to Comply With New Privacy and Security Requirements

    New state regulations, updated HIPAA requirements due to HITECH, FINRA, and many other measures are driving the need to adopt more comprehensive encryption and data security technologies. For any organization that sends and receives sensitive data, Email Encryption is almost a mandatory component to any email communication strategy. During this...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Take a 2.0 Approach to Mobile User Protection

    Yesterday's Web security solutions are inadequate for today's mobile workforce. Not only is authentication tedious, but threat protection is unreliable and Internet policy enforcement is difficult. View this webcast and see why the Web Security Service is the BEST strategy to seamlessly protect the mobile users in a Web 2.0...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Managing Your Email Archive Can Be a Painful Experience. Without a Sound Email Archiving Service in Place, Your Database

    As if dealing with disorganized emails weren't hard enough, amendments to the Federal Rules of Civil Procedure (FRCP) require organizations to respond quicker than ever to discovery and internal investigation requests. Fees for delayed responses to e-discovery requests are substantial - in one case, the U.S. District Court determined a...

    Provided By Webroot Software

  • Case Studies // Nov 2009

    Everton Football Club Scores by Introducing Webroot Email Security Service

    Everton is a high profile brand, which means that it has a significantly higher proportion of inappropriate email than most businesses - indeed, only 1% of all inbound email traffic is legitimate mail. Being a Premier League club and a household name, Everton Football Club is a prime target for...

    Provided By Webroot Software

  • Case Studies // Jul 2009

    College of Law Resolves Email Security Issue With Webroot e-Mail Security SaaS

    Guildford-based College of Law is a leading supplier of legal education and training in the UK, with affiliations and endorsements from many of the country's leading legal firms. The IT team had installed GWAVA, an anti-spam and anti-virus solution for GroupWise systems, to protect its network of 2,500 PCs. However,...

    Provided By Webroot Software

  • Case Studies // Jul 2009

    Toshiba Taps Webroot to Provide Web Security in the Cloud

    The Tokyo-based Toshiba Corporation is a brand recognized for its innovative electronic and electrical products. At the Toshiba branch in France, Jerome Jasmin, Director of the Information Department, and his staffs of 12 were working hard to provide efficient Web protection to the branch's 600 employees. They had two different...

    Provided By Webroot Software

  • Case Studies // Jul 2009

    Sunco Cabinets Unifies Email and Web Security With Webroot

    Sunco Cabinets, known as one of the premier manufacturers of wood cabinetry for the home, has been in business for over twenty five years. Sunco ran all of its email through its own server, and utilized its own server based applications to scan email traffic for spam and viruses which...

    Provided By Webroot Software

  • Case Studies // Apr 2009

    Law Firm Simplifies Web and Email Security Across Multiple Offices With Webroot Security SaaS

    Lester Aldridge LLP is a leading law firm with over 350 staff based across four sites in the UK; Lester Aldridge relies upon email and the Internet for communication and research on a daily basis. The firm was securing and filtering its email messages with Webroot E-Mail Security Software as...

    Provided By Webroot Software

  • White Papers // Apr 2009

    Technology Audit: Webroot Web and Email Security

    Webroot is an established security provider of Software as a Service (SaaS)-delivered e-mail and Web security suites. The e-mail security suite comprises anti-spam, anti-virus, content scanning for Data Loss Prevention (DLP), image scanning, continuity management for mails, e-mail archiving, and e-mail encryption. The Web security suite comprises anti-virus, anti-spyware, anti-phishing,...

    Provided By Webroot Software

  • Case Studies // Mar 2009

    Richmond Ambulance Authority Turns to Webroot to Protect Mobile Devices

    Richmond Ambulance Authority (RAA) provides Emergency Medical Services (EMS) to more than 200,000 people across Richmond, Va., making it one of the busiest per-capita systems in the nation. RAA needed a comprehensive Web security solution that would allow administrators to monitor and manage Internet activity while providing an extra layer...

    Provided By Webroot Software

  • White Papers // Jul 2010

    Next-generation email and web security

    By combining email and web security controls, organisations can better protect themselves from the inbound and outbound threats that they face. This paper discusses what organisations should look for--especially given the benefits of outsourcing such services to a cloud-based service provider.

    Provided By Webroot Software

  • White Papers // Jul 2010

    The benefits of basing email and web security in the cloud

    Today's threat landscape is complex and no organisation is immune from security threats, no matter their size. The low upfront investment and the high level of protection that such services provide are key benefits of subscribing to such services rather than having to deploy the technology themselves.

    Provided By Webroot Software

  • White Papers // Oct 2010

    Unifying electronic communications for enhanced security

    Through combined, integrated web and email protection, organisations will be in a better position to protect personal and sensitive corporate information from online and internal threats, which is especially important given the sophisticated nature of today's threats that are highly targeted and that use blended vectors of attack.

    Provided By Webroot Software

  • Case Studies // Mar 2009

    Richmond Ambulance Authority Turns to Webroot to Protect Mobile Devices

    Richmond Ambulance Authority (RAA) provides Emergency Medical Services (EMS) to more than 200,000 people across Richmond, Va., making it one of the busiest per-capita systems in the nation. RAA needed a comprehensive Web security solution that would allow administrators to monitor and manage Internet activity while providing an extra layer...

    Provided By Webroot Software

  • White Papers // May 2013

    Closing the Circle: How to get manageable endpoint, mobile device and web security together

    Endpoint protection has gotten more complicated. Endpoint protection has never been easy, but it once was at least straightforward. Workers had one computer, used the corporate email system and visited only a few websites while at work. Today, endpoint protection is far more difficult. In this white paper we will...

    Provided By Webroot Software

  • White Papers // Jun 2013

    Building a Business Case: Integrated mobile security for small and midsize businesses

    The shift to a more mobile workforce and business environment is taking place, dramatically, right before our eyes. We are seeing the rise of mobile applications and the use of smaller consumer devices for all types of applications. And we are seeing those same devices being used for business applications...

    Provided By Webroot Software

  • White Papers // Jun 2013

    Why phishing is back as the No. 1 web threat, and how web security can protect your company

    At one point, it seemed that phishing was receding to the status of a minor issue threatening only naive consumers. But a new version has emerged, fueled by new cybercriminals and new phishing techniques. New types of phishing campaigns are particularly worrisome for businesses because: They are aimed at...

    Provided By Webroot Software

  • White Papers // Jun 2013

    Web Threats Expose Businesses to Data Loss Commissioned Study

    Webroot recently conducted research to assess the state of the Web security layer in organizations throughout the United States and the United Kingdom. The study—which focused on companies that currently have a Web security solution or plan to deploy one in 2013—found that Web-borne attacks are impacting businesses, with the...

    Provided By Webroot Software

  • White Papers // Aug 2013

    Webroot System Analyzer - Free Application

    Fast, accurate diagnosis equals rapid, cost-effective remediation. Webroot System Analyzer looks inside a problem system and gives you a quick assessment plus a detailed report on all aspects of hardware, OS, and installed applications. Simply click web link and run application - no install or uninstall required Summary Analysis pinpoints...

    Provided By Webroot Software

  • White Papers // Aug 2013

    Infographic: Malicious Mobile Apps (MMA) - A Growing Threat in 2013 and Beyond

    With the exploding use of mobile devices and BYOD, mobile apps represent a major new threat. This infographic reveals some surprising facts about malicious mobile apps, including where they come from, what they do, and what other IT pros are thinking about MMAs.Download now to discover the interesting facts.

    Provided By Webroot Software

  • White Papers // Aug 2013

    Whitepaper: The Wild, Wild West of Mobile

    This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile...

    Provided By Webroot Software

  • White Papers // Aug 2013

    Survey: Remote Users Expose Companies to Cybercrime

    As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Malicious Mobile Apps (MMA) - A Growing Threat in 2013 and Beyond

    With the exploding use of mobile devices and BYOD, mobile apps represent a major new threat. This infographic reveals some surprising facts about malicious mobile apps, including where they come from, what they do, and what other IT pros are thinking about MMAs. Download now to discover the interesting facts.

    Provided By Webroot Software

  • White Papers // Sep 2013

    The Wild, Wild West of Mobile

    This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Remote Users Expose Companies to Cybercrime

    As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate...

    Provided By Webroot Software

  • White Papers // Sep 2013

    Free Application: Webroot System Analyzer

    Fast, accurate diagnosis equals rapid, cost-effective remediation. Webroot System Analyzer looks inside a problem system and gives you a quick assessment plus a detailed report on all aspects of hardware, OS, and installed applications. Simply click web link and run application - no install or uninstall required Summary Analysis...

    Provided By Webroot Software

  • White Papers // Apr 2009

    Technology Audit: Webroot Web and Email Security

    Webroot is an established security provider of Software as a Service (SaaS)-delivered e-mail and Web security suites. The e-mail security suite comprises anti-spam, anti-virus, content scanning for Data Loss Prevention (DLP), image scanning, continuity management for mails, e-mail archiving, and e-mail encryption. The Web security suite comprises anti-virus, anti-spyware, anti-phishing,...

    Provided By Webroot Software

  • Case Studies // Nov 2009

    Everton Football Club Scores by Introducing Webroot Email Security Service

    Everton is a high profile brand, which means that it has a significantly higher proportion of inappropriate email than most businesses - indeed, only 1% of all inbound email traffic is legitimate mail. Being a Premier League club and a household name, Everton Football Club is a prime target for...

    Provided By Webroot Software

  • Case Studies // Jul 2009

    Toshiba Taps Webroot to Provide Web Security in the Cloud

    The Tokyo-based Toshiba Corporation is a brand recognized for its innovative electronic and electrical products. At the Toshiba branch in France, Jerome Jasmin, Director of the Information Department, and his staffs of 12 were working hard to provide efficient Web protection to the branch's 600 employees. They had two different...

    Provided By Webroot Software

  • Case Studies // Jul 2009

    Sunco Cabinets Unifies Email and Web Security With Webroot

    Sunco Cabinets, known as one of the premier manufacturers of wood cabinetry for the home, has been in business for over twenty five years. Sunco ran all of its email through its own server, and utilized its own server based applications to scan email traffic for spam and viruses which...

    Provided By Webroot Software

  • Case Studies // Apr 2010

    Tribal Introduces Webroot Email Security and Business Continuity Services

    Tribal Group plc, is a leading provider of advisory, technology and service delivery solutions to the public sector in the UK and internationally. With its commitment to continuous improvement, the company both delivers, and expects, the best in every aspect of its business. They wanted email security which was not...

    Provided By Webroot Software

  • Case Studies // Apr 2010

    Technical Outsourcing Firm Chooses Webroot for Layered Web and Endpoint Security

    System One's IT staff consists of four people managing a network of 160 employees, almost all laptop users, along with over 20 remote office locations. Protection for the users was the requirement. Plus, they only have a T1 line here and the Web traffic was really spiking. They needed something...

    Provided By Webroot Software

  • Case Studies // Mar 2010

    Total Fitness Introduces Webroot Web and Email Security Services

    With a chain of 24 centres employing up to 1,000 people, Total Fitness operates some of the leading leisure and fitness clubs across the UK and Ireland .The company takes information security seriously, especially the filtering of computers within its cafes which provide access to the Internet. Total Fitness decided...

    Provided By Webroot Software

  • Case Studies // Jan 2010

    Neopost Introduces Webroot Web and Email Security Services

    The Neopost Group supplies mailroom, document and logistics systems in more than 90 countries, and is the no.1 supplier in Europe. Neopost decided to consolidate and find a solution that offered both Web and email security. On the email side they were looking at virus and spam protection, and for...

    Provided By Webroot Software

  • Case Studies // Apr 2010

    City of Chula Vista Uses Webroot to Protect Government Email

    The city of Chula Vista, located on the San Diego harbor, is home to almost a quarter million California residents who love sun, surf and the perfect Mediterranean climate. The IT staff for Chula Vista serves several crucial government departments including police, fire, public works, building, planning, the library system,...

    Provided By Webroot Software

  • Case Studies // Mar 2010

    The Trinity School for Ministry Fights the Good Fight With Webroot

    The Trinity School for Ministry is a graduate school of religion located in Ambridge, Pennsylvania, about 30 minutes outside of Pittsburgh. As the use of laptops and the Internet became more prevalent, Heather Henkel, IT Manager, noticed a steady increase in malware and viruses. Mobile users were going to legitimate...

    Provided By Webroot Software

  • Case Studies // Jun 2010

    In the State V. Malware, the Supreme Court of Georgia Wins With Webroot

    The Supreme Court of Georgia located in Atlanta has seven justices and approximately 80 employees, including staff attorneys, administrators, docket clerks and IT staff. Supreme Court of Georgia fall victim to malware advertising itself as an anti-virus program. The fake virus alert would appear onscreen, but unlike similar versions, users...

    Provided By Webroot Software