Webroot Whitepapers


Sort by: Date | Company | Title


CryptoLocker - Your Money or Your Life
By Webroot | 7/1/2014

As of September 2013, a new and vicious form of malware has been wreaking havoc. CryptoLocker belongs to a family of malware called “ransomware”, which is designed to extort money from victims by denying them access to their personal files. It targets all Windows Operating Systems, from Windows XP to Windows 8, and typically remains unnoticed by victims until it’s too late and the damage to their files is irreparable.

Download this now


Cloud-Based Mobile Device Security Streamlines Data Protection
By Webroot | 7/1/2014

Read this white paper to learn why cloud-based security offers superior protection that meets today’s requirements for identifying and preventing access to malicious sites and applications while reducing management complexity and IT staff time and effort. This whitepaper discusses: • Increased use of mobile devices and the associated risks • Ways to address security challenges • Benefits of cloud-based anti-malware solutions

Download this now


Taking Managed Security Services to the Next Level
By Webroot | 7/1/2014

In this white paper, we will outline the changing landscape of security; the importance of a high-security posture; the elements of effective Web, endpoint, user and mobile protection; and the ways in which Webroot helps partners increase the value and profitability of their security practices.

Download this now


Cloud-Based Security Threats Present Challenges and Opportunities for MSPs
By Webroot | 7/1/2014

Cloud computing has fundamentally changed the way businesses and consumers use computers and technology and the way Information Technology (IT) professionals manage those resources. While the cloud has delivered a multitude of benefits to technical and non-technical people alike, there have also been significant downsides to reliance on cloud technology, including unplanned outages and even outright cyberattacks and data theft.

Download this now


The Wild, Wild West of Mobile Apps
By Webroot | 7/1/2014

How MDM vendors, carriers, service providers and app stores can protect users from malicious mobile apps

In this white paper, we will look at: 1. Why mobile attacks are exploding. 2. Options for protecting against malicious mobile apps. 3. The newest defense: mobile app reputation services. 4. The Webroot Mobile App Reputation Service.

Download this now


Phishing 2.0 - Why phishing is back as the No. 1 web threat, and how web security can protect your company
By Webroot | 7/1/2014

In this white paper we will: • Summarize the decline of Phishing 1.0. • Discuss how phishing has turned toward business and become more costly. • Outline the structure of new Phishing 2.0 attacks. • Delineate how the new campaigns evade standard antiphishing countermeasures. • Describe how web security services with real-time antiphishing capabilities can protect against Phishing 2.0 attacks.

Download this now


Closing the Circle: How to get manageable endpoint, mobile device and web security together
By Webroot | 7/1/2014

Closing the circle: Why you need to protect endpoints and mobile devices together Endpoint protection has gotten more complicated

In this white paper we will discuss: • Why traditional endpoints and mobile devices require overlapping (but not identical) security solutions. • How to enhance the protection of all endpoints by adding web security. • Why today’s threats require that endpoint protection and mobile device protection activities be moved to the cloud. • How Webroot makes it easy to “close the circle” by managing endpoint protection, mobile device protection and web security through one infrastructure.

Download this now


Managing Web Security in an Increasingly Challenging Threat Landscape
By Webroot | 5/9/2013

Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Those who would do harm to our computer systems for profit or malice always manage to focus their efforts on our most vulnerable weak spots. Today, that is the web, for a wide number of reasons. Download to find out why and what you can do to protect yourself.

Download this now


Benchmarks for Security - A Comparative Test
By Webroot | 5/9/2013

In a head to head comparison of 8 end-point security products, we look at which performs the best across crucial performance metrics - from installation time to memory usage. Download to find out which performs the best!

Download this now


Phishing 2.0
By Webroot | 24/7/2013

At one point, it seemed that phishing was receding to the status of a minor issue threatening only naïve consumers. However new cybercriminals and phishing techniques have lead this to become a greater concern. Download how to find out how phishing became the No. 1 web threat, and which web security solution can best protect your company.

Download this now

Most Popular Reviews

Join the newsletter!

Error: Please check your email address.

Latest News Articles

Resources

PCW Evaluation Team

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Matthew Stivala

HP OfficeJet 250 Mobile Printer

The HP OfficeJet 250 Mobile Printer is a great device that fits perfectly into my fast paced and mobile lifestyle. My first impression of the printer itself was how incredibly compact and sleek the device was.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?