Webroot Whitepapers


Sort by: Date | Company | Title


The Vizada Satellite Network Selects Webroot® Web Security Services for Corporate Malware and WebSecurity Protection
By Webroot | 17/10/2012
The North American division of Vizada is comprised of 125 seats across four locations and includes a number of mobile users. Until recently, Dave Newbern, manager of applications and infrastructure, and his corporate IT staff, were experiencing a huge onslaught of web-borne viruses and malware. Read more.
Download this now


The State of Cloud Based Security
By Webroot | 17/10/2012
This paper examines the findings within the context of IT security and looks at whether similar companies could benefit from cloud-based security and how receptive they might be to using the technology.
Download this now


Building a Better Mousetrap in Anti-Malware
By Webroot | 24/8/2012
This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.
Download this now


Endpoint Security and Virtualisation
By Webroot | 4/10/2012
Besides form factor, virtual systems are not really that different than physical systems. They both use the same operating systems and applications. They both present users with computing resources such as RAM and hard drives. Consequently, the ability to exploit vulnerabilities in a physical environment will present a significant threat to virtualised environments as well. This paper examines the different endpoint security methods for virtualised environments and presents how Endpoint Protection security provides optimal performance, protection and manageability.
Download this now


Real-Time Protection Against Malware Infection
By Webroot | 4/10/2012
Malware is at such high levels (more than 60 million unique samples per year) that protecting an endpoint with traditional antivirus software, has become futile. More than 100,000 new types of malware are now released every day, and antivirus vendors are racing to add new protection features to try to keep their protection levels up. Read more.
Download this now


Revolutionary Security. Ultimate Performance. Minimal Management.
By Webroot | 4/10/2012
Endpoint Protection offers a revolutionary approach to endpoint malware protection. It brings together innovative file pattern and behaviour recognition technology with the power of cloud computing to stop known threats and prevent unknown zero-day attacks more effectively than anyone else. Read more.
Download this now


Webroot SecureAnywhere Endpoint Protection Cloud vs. Seven Traditional Endpoint Security Products
By Webroot | 19/10/2012
PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 7 Ultimate Edition (64-bit) from December 2011 to January 2012. This report presents results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Endpoint Protection cloud product with seven (7) Traditional Endpoint Security competitor products. Rea more.
Download this now


Webroot® SecureAnywhere™ Business - Endpoint Protection Overview
By Webroot | 4/10/2012
With the exponential growth and sophistication of malware today, the security industry can no longer afford to ‘bury its head in the sand’. The bottom line is that traditional endpoint security protection is now ineffective due to the sheer volume, quality, and complexity of malware. This paper looks at this problem and how Webroot, by going back to the drawing board on countering malware threats, is revolutionisng endpoint protection and solving the issues that hinder existing endpoint security solutions.
Download this now


Webroot® SecureAnywhere™ Business - Endpoint Protection Technocal Overview
By Webroot | 19/10/2012
This paper looks at this problem and how Webroot, by going back to the drawing board on countering malware threats, is revolutionising endpoint protection and solving the issues that hinder existing endpoint security solutions.
Download this now


Gympie Council Case Study - From country to coast, Gympie region gets protected
By Webroot | 19/10/2012
Gympie Regional Council in Queensland employs approximately 450 staff to provide infrastructure, programs and facilities for the community. With the implementation of Webroot’s email and web security services, the Council now has reliable protection against spam and viruses for staff and the general public who access the internet in the Council’s offices and public libraries. Read more.
Download this now

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?