White Papers: cyber threats


Sort by: Date | Company | Title


Gympie Council Case Study - From country to coast, Gympie region gets protected
By Webroot | 19/10/2012
Gympie Regional Council in Queensland employs approximately 450 staff to provide infrastructure, programs and facilities for the community. With the implementation of Webroot’s email and web security services, the Council now has reliable protection against spam and viruses for staff and the general public who access the internet in the Council’s offices and public libraries. Read more.
Download this now


Webroot® SecureAnywhere™ Business - Endpoint Protection Technocal Overview
By Webroot | 19/10/2012
This paper looks at this problem and how Webroot, by going back to the drawing board on countering malware threats, is revolutionising endpoint protection and solving the issues that hinder existing endpoint security solutions.
Download this now


Penrith City Council Case Study - Productivity Rises as High as the Mountains
By Webroot | 19/10/2012
As the Council operations are integral to the community, IT security and the smooth running of IT systems are imperative. However, the complex processes and limited capabilities of the Internet and email filtering system was costing Council many hours in IT maintenance, including installing updates and managing user queries. Any Internet and email system downtime detracted from the IT staff time available to support users. Read more.
Download this now


Webroot SecureAnywhere Endpoint Protection Cloud vs. Seven Traditional Endpoint Security Products
By Webroot | 19/10/2012
PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 7 Ultimate Edition (64-bit) from December 2011 to January 2012. This report presents results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Endpoint Protection cloud product with seven (7) Traditional Endpoint Security competitor products. Rea more.
Download this now


The State of Cloud Based Security
By Webroot | 17/10/2012
This paper examines the findings within the context of IT security and looks at whether similar companies could benefit from cloud-based security and how receptive they might be to using the technology.
Download this now


The Vizada Satellite Network Selects Webroot® Web Security Services for Corporate Malware and WebSecurity Protection
By Webroot | 17/10/2012
The North American division of Vizada is comprised of 125 seats across four locations and includes a number of mobile users. Until recently, Dave Newbern, manager of applications and infrastructure, and his corporate IT staff, were experiencing a huge onslaught of web-borne viruses and malware. Read more.
Download this now


Security as a Service: Business Decision Factors
By Webroot | 17/10/2012
This paper reviews the business value of IT security, illustrates the business case for SaaS over “do it yourself” premise-based solutions, and outlines what to look for in SaaS solutions you can adopt with confidence and count on as you grow.
Download this now


Flushing Bank Invests in Internet Security
By Webroot | 17/10/2012
Flushing Bank is comprised of 16 different branches across New York State, 350 employees, and an increasingly mobile workforce. Recently, as the individual demands of those separate entities became more apparent, the Internet security appliance the bank had in place could no longer effectively keep up with compliance and data loss prevention demands. Read more.
Download this now


How to Protect Your Business from the Coming Malware Storm
By Webroot | 17/10/2012
For the past few years, it seemed that mature on-premise antivirus, antispam, and Web defenses were making progress against the rising volume of malicious code aimed at businesses from the furthest corners of the Web. But a new generation of organized, well-funded, and financially-motivated online criminals are now launching attacks using social networks, exploiting consumer and mobile devices and vulnerabilities in Web applications, and deploying blended threats to attack financial targets and individual businesses. Read more.
Download this now


Financial Security with Webroot and Virginia Community Bank
By Webroot | 17/10/2012
Virginia Community Bank’s computer system, which networks these branches together, relies on connectivity to serve its customers and loan recipients, but was under a barrage of spam and spoof emails threatening bank security. Additionally, unrestricted Web use was impacting access, and bandwidth limits were disabling the phone system, while malware and other malicious code infected end-user machines. Read more.
Download this now

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Compare & Save

Deals powered by WhistleOut
WhistleOut

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?