webroot

Results 51 - 75 of 84Sort Results By: Published Date | Title | Company Name
Published By: Webroot     Published Date: Dec 06, 2011
Unlock the true business value of IT security, and learn why companies of all sizes are choosing SaaS over on-premise solutions.
Tags : 
saas, service management, nimsoft, cloud service, delivery, models, monitor, monitoring, best practices, virtualize, virtualization, challenges, it security, security, on-premise
    
Webroot
Published By: Webroot UK     Published Date: Mar 22, 2010
This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.
Tags : 
webroot, web security threat, remote access, malware, viruses, spyware, phishing, threat protection
    
Webroot UK
Published By: Webroot UK     Published Date: Nov 11, 2009
This white paper discusses key issues around encryption for both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption. This white paper also briefly discusses Webroot Software, the sponsor of this white paper, and their relevant offerings.
Tags : 
webroot, encrypted email, file transfer encryption, email server, content interception, tls, transport layer security, openpgp, s/mime, policy-based encryption, archiving, virus scanning
    
Webroot UK
Published By: Webroot UK     Published Date: Mar 22, 2010
This paper examines the realities of web threats and looks at the promise that cloud-based solutions bring for organisations in terms of providing a higher level of protection against the increasingly complex and sophisticated threats being seen today.
Tags : 
webroot, web security, cloud computing, malware threats
    
Webroot UK
Published By: Webroot UK     Published Date: Mar 22, 2010
The web today is a prime vector for attack. Interrupting information flows, which are increasingly transmitted over the internet, has become the prime focus for today's financially motivated hackers.
Tags : 
webroot, web security protection, hackers, web threats, cloud computing, malware
    
Webroot UK
Published By: Webroot Inc     Published Date: Mar 05, 2014
In this environment, mobile app reputation services will be a key tool to retain credibility to increase competitiveness.
Tags : 
mobile app, credibility, reputation service, secure cloud service, endpoint, device protection
    
Webroot Inc
Published By: Webroot Inc     Published Date: Mar 05, 2014
Learn the top 5 malware trends for 2014 and how your organization can best protect against hackers and cyber thieves.
Tags : 
malware, security, cyber thieves, malware trends, security systems, webroot
    
Webroot Inc
Published By: Webroot UK     Published Date: Jan 30, 2014
In 2014, hackers and cyber thieves will continue to change their tactics, using new exploits to infect systems and steal data. This Executive Brief discusses the top five malware trends to keep an eye out for in 2014 and how Webroot SecureAnywhere can provide the endpoint protection that companies will need to be safe in 2014.
Tags : 
webroot, security, esecurity, cyber threat, malware, malware trends, breaches, safeguard, data protection, ddos attacks, web gateway security, online threats, virus, spyware protection, anti-phishing protection
    
Webroot UK
Published By: Webroot     Published Date: Dec 06, 2011
In this paper we go back to basics. We look at the kinds of security facilities needed now and in the future, and consider how to think about security
Tags : 
security, facilities, evolve, communication, collaboration
    
Webroot
Published By: ThreatTrack Security     Published Date: Jan 22, 2015
According to the report ‘Trail Blazers’ “hold the power to dethrone the current market leaders…[and] often shape the future of technology with their innovations and new product designs.” VIPRE was evaluated alongside nearly a dozen endpoint security products and was called a “highly capable solution for small and midsize enterprises with advanced needs that are looking for a solution that is easy to manage and deploy.”
Tags : 
threattrack, security, threat, track, information, admins, best, practices, training, defense, tips, web, email, smartphones, education, data, breach, prevention, vipre, mcafee
    
ThreatTrack Security
Published By: Webroot Inc     Published Date: Mar 05, 2014
In this paper we will look at factors favoring cloud and SaaS solutions in general, reasons why secure web gateways in the cloud can provide better security than appliances and local servers, and how the Webroot Web Security Service can maximize security and minimize costs using a cloud-based architecture.
Tags : 
web threat, security, could, saas solutions, webroot
    
Webroot Inc
Published By: Webroot Inc     Published Date: Aug 27, 2015
In the past year, Webroot encountered tens of millions of instances of malware and potentially unwanted applications (PUAs), monitored billions of IP addresses and URLs, analyzed millions of new and updated mobile apps for malicious behavior, and studied major malware trends based on data from millions of endpoints. This report contains insights, analysis, and information on how collective threat intelligence can protect organizations from sophisticated attacks.
Tags : 
malware, unwanted applications, malicious behavior, threat intelligence
    
Webroot Inc
Published By: Webroot Inc     Published Date: Sep 14, 2015
Webroot SecureAnywhere® Business Endpoint Protection is the next generation of endpoint security. It's smarter, faster, more effective, and easier to use and deploy than traditional solutions. Learn about our unique approach to endpoint security and more in our complimentary eBook.
Tags : 
endpoint protection, security software, user protection
    
Webroot Inc
Published By: Webroot UK     Published Date: Feb 04, 2013
This paper examines the different endpoint security methods for virtualized environments and presents how Webroot Secure Anywhere Business - Endpoint Protection security provides optimal performance, protection and manageability.
Tags : 
endpoint, security, virtualization, environments, performance, protection, manageability
    
Webroot UK
Published By: Webroot UK     Published Date: Feb 04, 2013
Seeing traditional security software become too big and too much of a burden on endpoint devices, networks and IT staff, Webroot decided to start fresh.
Tags : 
webroot, security, software, endpoint devices, networks, it staff
    
Webroot UK
Published By: Webroot UK     Published Date: Dec 20, 2013
The Webroot® Intelligence Network (WIN) is a key component of a revolutionary approach to next-generation malware protection. Together, WIN and Webroot is combined with Webroot’s ultra-efficient endpoint agent — Webroot® SecureAnywhere™ Business - Endpoint Protection ensure that both known and... that both known and unknown infections are removed before they do harm.
Tags : 
webroot, passmark software, webroot security, endpoint protection, performance benchmark, testing, endpoint security
    
Webroot UK
Published By: Webroot UK     Published Date: Feb 04, 2013
This case study describes how a Law Firm with rapid growth and globally dispersed locations addressed concerns about Web security.
Tags : 
protects, appleby, law firm, web security, it analyst, bandwidth, cloud-based
    
Webroot UK
Published By: Webroot UK     Published Date: Sep 05, 2013
Webroot SecureAnywhere Business - Endpoint Protection offers a revolutionary approach to malware protection. It brings together Webroot's innovative file pattern and predictive behavior recognition technology, with the almost limitless power of cloud computing, to stop known threats and prevent unknown zero-day attacks more effectively than anything else. Read this white paper to learn about ultimate performance and minimal management security software from Webroot.
Tags : 
webroot, secureanywhere, business, software, security software, revolutionary software, predictive behavior, known threats, zero day attacks, ultimate protection
    
Webroot UK
Published By: Webroot Inc     Published Date: Jan 14, 2015
Seeing traditional security software become too big and too much of a burden on endpoint devices, networks and IT staff, Webroot decided to start fresh. We built a new type of security software that completely does away with old-school approaches like signature downloads, the need for constant updates and big footprint client software. The result is Webroot SecureAnywhere Business Endpoint Protection, the fastest, least disruptive and most effective endpoint protection - ever.
Tags : 
endpoint protection, networks, security software, endpoint devices
    
Webroot Inc
Published By: Webroot UK     Published Date: Jan 24, 2013
The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products.
Tags : 
webroot, secureanywhere, endpoint protection
    
Webroot UK
Published By: Webroot UK     Published Date: Sep 05, 2013
PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 7 Ultimate Edition (64-bit) during January 2013. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products. Read this report to learn how Webroot performed against competitors in all 13 performance metrics.
Tags : 
secure anywhere, business endpoint protection, passmark software, competitor software, benchmark performance, performance metrics, endpoint security
    
Webroot UK
Published By: Webroot     Published Date: Nov 02, 2012
This report presents our results and findings as a result of performance benchmark testing conducted for eight security software products, on Windows 7 Ultimate Edition from December 2011 to January 2012.
Tags : 
it security, endpoint security, endpoint protection
    
Webroot
Published By: Webroot     Published Date: Oct 27, 2012
An Overview by George Anderson- Product Marketing Manager May 2012
Tags : 
it security, endpoint security, anti-virus protection, malware protection, malware detection
    
Webroot
Published By: Webroot Inc     Published Date: Apr 29, 2015
Learn what the 2015 threat landscape looks like and gain some insights from this collective threat intelligence to position your company for success.
Tags : 
puas, webroot, urls, intelligence, phishing, brightcloud, ips
    
Webroot Inc
Published By: Webroot UK     Published Date: Mar 22, 2010
The components required of an effective web security solution are many and varied, including a range of tools that guard against specific types of threats
Tags : 
webroot, web security service, cloud computing, web threats, business process automation
    
Webroot UK
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.