Webroot Software

Displaying 1-8 of 8 results

  • Webcasts // Aug 2010

    A Brief History of Malware

    Just when one thought it was safe to rely on the Internet again, attackers have unleashed a new set of exploits. Today's malware now hides not only in blacklisted websites and email attachments - it may emanate from the Web's most popular sites, from "Friends" on popular social networking sites,...

    Provided By Webroot Software

  • Webcasts // May 2010

    4 Advantages You Must Know About SaaS Archiving

    The current regulatory environment has created a dramatic increase in employee generated content that needs to be archived for all businesses. In the new "Save Everything" environment, email is the single largest source of data that needs to be stored in a compliant form. The demand is far outpacing available...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    How to Find Vulnerabilities Before Attackers Do

    Today's cybercriminals are smart. They know that the fastest way to attack the network is with web-based malware that exploits known vulnerabilities in the software and operating systems. One need a defense - but when resources are tight, can afford the time and expense of managing web security plus a...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    We All Have Mobile/remote Users: Most of Us Have Multiple Locations to Manage - All of Us Want: Airtight Security, Unbeatable TCO, an Easy-to-Use Management Console

    Recently there was zero-day vulnerability/attack against MS Internet Explorer. While other security vendors were scrambling to address the issue, Webroot sat back and watched their proprietary Javascript heuristics technology do its thing protecting all their customers. Issues like this occur frequently, and if one have an on-premise security appliance, one...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Safety in the Network Neighborhood: Protecting Enterprise Assets From Social Networking Threats

    Of all the network security threats, one of the most challenging to secure against is malware attacks originating from social networking sites, particularly as organizations begin to use social networking and other Web 2.0 sites for business purposes. Organizations must now reconcile how to enforce Web 2.0 acceptable use policies...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Email Encryption: How to Comply With New Privacy and Security Requirements

    New state regulations, updated HIPAA requirements due to HITECH, FINRA, and many other measures are driving the need to adopt more comprehensive encryption and data security technologies. For any organization that sends and receives sensitive data, Email Encryption is almost a mandatory component to any email communication strategy. During this...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Take a 2.0 Approach to Mobile User Protection

    Yesterday's Web security solutions are inadequate for today's mobile workforce. Not only is authentication tedious, but threat protection is unreliable and Internet policy enforcement is difficult. View this webcast and see why the Web Security Service is the BEST strategy to seamlessly protect the mobile users in a Web 2.0...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Managing Your Email Archive Can Be a Painful Experience. Without a Sound Email Archiving Service in Place, Your Database

    As if dealing with disorganized emails weren't hard enough, amendments to the Federal Rules of Civil Procedure (FRCP) require organizations to respond quicker than ever to discovery and internal investigation requests. Fees for delayed responses to e-discovery requests are substantial - in one case, the U.S. District Court determined a...

    Provided By Webroot Software

  • Webcasts // Aug 2010

    A Brief History of Malware

    Just when one thought it was safe to rely on the Internet again, attackers have unleashed a new set of exploits. Today's malware now hides not only in blacklisted websites and email attachments - it may emanate from the Web's most popular sites, from "Friends" on popular social networking sites,...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    How to Find Vulnerabilities Before Attackers Do

    Today's cybercriminals are smart. They know that the fastest way to attack the network is with web-based malware that exploits known vulnerabilities in the software and operating systems. One need a defense - but when resources are tight, can afford the time and expense of managing web security plus a...

    Provided By Webroot Software

  • Webcasts // May 2010

    4 Advantages You Must Know About SaaS Archiving

    The current regulatory environment has created a dramatic increase in employee generated content that needs to be archived for all businesses. In the new "Save Everything" environment, email is the single largest source of data that needs to be stored in a compliant form. The demand is far outpacing available...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    We All Have Mobile/remote Users: Most of Us Have Multiple Locations to Manage - All of Us Want: Airtight Security, Unbeatable TCO, an Easy-to-Use Management Console

    Recently there was zero-day vulnerability/attack against MS Internet Explorer. While other security vendors were scrambling to address the issue, Webroot sat back and watched their proprietary Javascript heuristics technology do its thing protecting all their customers. Issues like this occur frequently, and if one have an on-premise security appliance, one...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Safety in the Network Neighborhood: Protecting Enterprise Assets From Social Networking Threats

    Of all the network security threats, one of the most challenging to secure against is malware attacks originating from social networking sites, particularly as organizations begin to use social networking and other Web 2.0 sites for business purposes. Organizations must now reconcile how to enforce Web 2.0 acceptable use policies...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Email Encryption: How to Comply With New Privacy and Security Requirements

    New state regulations, updated HIPAA requirements due to HITECH, FINRA, and many other measures are driving the need to adopt more comprehensive encryption and data security technologies. For any organization that sends and receives sensitive data, Email Encryption is almost a mandatory component to any email communication strategy. During this...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Take a 2.0 Approach to Mobile User Protection

    Yesterday's Web security solutions are inadequate for today's mobile workforce. Not only is authentication tedious, but threat protection is unreliable and Internet policy enforcement is difficult. View this webcast and see why the Web Security Service is the BEST strategy to seamlessly protect the mobile users in a Web 2.0...

    Provided By Webroot Software

  • Webcasts // Jan 2010

    Managing Your Email Archive Can Be a Painful Experience. Without a Sound Email Archiving Service in Place, Your Database

    As if dealing with disorganized emails weren't hard enough, amendments to the Federal Rules of Civil Procedure (FRCP) require organizations to respond quicker than ever to discovery and internal investigation requests. Fees for delayed responses to e-discovery requests are substantial - in one case, the U.S. District Court determined a...

    Provided By Webroot Software