Webroot Whitepapers


Sort by: Date | Company | Title


Endpoint Security and Virtualisation
By Webroot | 4/10/2012

Besides form factor, virtual systems are not really that different than physical systems. They both use the same operating systems and applications. They both present users with computing resources such as RAM and hard drives. Consequently, the ability to exploit vulnerabilities in a physical environment will present a significant threat to virtualised environments as well. This paper examines the different endpoint security methods for virtualised environments and presents how Endpoint Protection security provides optimal performance, protection and manageability.

Download this now


Financial Security with Webroot and Virginia Community Bank
By Webroot | 17/10/2012

Virginia Community Bank’s computer system, which networks these branches together, relies on connectivity to serve its customers and loan recipients, but was under a barrage of spam and spoof emails threatening bank security. Additionally, unrestricted Web use was impacting access, and bandwidth limits were disabling the phone system, while malware and other malicious code infected end-user machines. Read more.

Download this now


Flushing Bank Invests in Internet Security
By Webroot | 17/10/2012

Flushing Bank is comprised of 16 different branches across New York State, 350 employees, and an increasingly mobile workforce. Recently, as the individual demands of those separate entities became more apparent, the Internet security appliance the bank had in place could no longer effectively keep up with compliance and data loss prevention demands. Read more.

Download this now


Gympie Council Case Study - From country to coast, Gympie region gets protected
By Webroot | 19/10/2012

Gympie Regional Council in Queensland employs approximately 450 staff to provide infrastructure, programs and facilities for the community. With the implementation of Webroot’s email and web security services, the Council now has reliable protection against spam and viruses for staff and the general public who access the internet in the Council’s offices and public libraries. Read more.

Download this now


How Endpoint Protection and Windows® 8 Change Everything
By Webroot | 4/10/2012

This paper looks at the key new security features within Windows 8, the inclusion Microsoft’s AV for free, and what it is really saying about device protection and the implications for IT security.

Download this now


How to Protect Your Business from the Coming Malware Storm
By Webroot | 6/3/2012

The malware storm will force the cost and complexity of premise-based protection to levels sustainable only by national governments and multinational corporations. To keep from being overwhelmed, small and midsize businesses must move defenses outside their own walls, to stop malicious code before it reaches their gateways, servers, and data stores.

Download this now


How to Protect Your Business from the Coming Malware Storm
By Webroot | 17/10/2012

For the past few years, it seemed that mature on-premise antivirus, antispam, and Web defenses were making progress against the rising volume of malicious code aimed at businesses from the furthest corners of the Web. But a new generation of organized, well-funded, and financially-motivated online criminals are now launching attacks using social networks, exploiting consumer and mobile devices and vulnerabilities in Web applications, and deploying blended threats to attack financial targets and individual businesses. Read more.

Download this now


Managing Web Security in an Increasingly Challenging Threat Landscape
By Webroot | 5/9/2013

Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Those who would do harm to our computer systems for profit or malice always manage to focus their efforts on our most vulnerable weak spots. Today, that is the web, for a wide number of reasons. Download to find out why and what you can do to protect yourself.

Download this now


Penrith City Council Case Study - Productivity Rises as High as the Mountains
By Webroot | 19/10/2012

As the Council operations are integral to the community, IT security and the smooth running of IT systems are imperative. However, the complex processes and limited capabilities of the Internet and email filtering system was costing Council many hours in IT maintenance, including installing updates and managing user queries. Any Internet and email system downtime detracted from the IT staff time available to support users. Read more.

Download this now


Phishing 2.0
By Webroot | 24/7/2013

At one point, it seemed that phishing was receding to the status of a minor issue threatening only naïve consumers. However new cybercriminals and phishing techniques have lead this to become a greater concern. Download how to find out how phishing became the No. 1 web threat, and which web security solution can best protect your company.

Download this now

Most Popular Reviews

Join the PC World newsletter!

Error: Please check your email address.

Latest News Articles

Resources

PCW Evaluation Team

Matthew Stivala

HP OfficeJet 250 Mobile Printer

The HP OfficeJet 250 Mobile Printer is a great device that fits perfectly into my fast paced and mobile lifestyle. My first impression of the printer itself was how incredibly compact and sleek the device was.

Armand Abogado

HP OfficeJet 250 Mobile Printer

Wireless printing from my iPhone was also a handy feature, the whole experience was quick and seamless with no setup requirements - accessed through the default iOS printing menu options.

Azadeh Williams

HP OfficeJet Pro 8730

A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.

Andrew Grant

HP OfficeJet Pro 8730

I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.

Ed Dawson

HP OfficeJet Pro 8730

As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.

Michael Hargreaves

Windows 10 for Business / Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?