Webroot Whitepapers


Sort by: Date | Company | Title


Bloor Research - Why web security is best served in the cloud
By Webroot | 17/10/2012

This paper discusses the new generation of web security offerings provided by service providers in the cloud, where protection is applied at the point where the threats are being seen—that is, directed at web-based applications. In taking the protection nearer to the threats, organisations can benefit from vastly improved internet security as the threats are stopped before they ever reach the network.

Download this now


Rob Clyde Consulting Report: Beyond the Wall: Security in a Post-Perimeter World
By Webroot | 6/3/2012

Walls have served multiple purposes throughout history. The Great Wall of China defended against invaders, while the Berlin Wall kept citizens from freely traveling beyond the control of their rulers. Network security relies on similar premises. For years network security professionals touted “perimeter security” as the primary solution to keep the bad guys out and the good guys in. However, just as guns and air attacks overcame protective walls, changes in malware attacks have rendered network firewalls and perimeter-centric security an ineffective defense.

Download this now


Realtime Publishers: Using Web Security Services to Protect Portable Devices
By Webroot | 6/3/2012

Today’s workforce is a security challenge. Employees no longer follow strict guidelines from the IT department regarding computer use at work, computer security measures, personal computing devices used for work, and so on. In fact, many CxO’s find that the stricter the rules, the less employees pay attention, leading to even less IT control of the computer infrastructure. One particularly difficult area to secure is the multiple‐ location workforce. Read this whitepaper on mobile security.

Download this now


Financial Security with Webroot and Virginia Community Bank
By Webroot | 17/10/2012

Virginia Community Bank’s computer system, which networks these branches together, relies on connectivity to serve its customers and loan recipients, but was under a barrage of spam and spoof emails threatening bank security. Additionally, unrestricted Web use was impacting access, and bandwidth limits were disabling the phone system, while malware and other malicious code infected end-user machines. Read more.

Download this now


How to Protect Your Business from the Coming Malware Storm
By Webroot | 17/10/2012

For the past few years, it seemed that mature on-premise antivirus, antispam, and Web defenses were making progress against the rising volume of malicious code aimed at businesses from the furthest corners of the Web. But a new generation of organized, well-funded, and financially-motivated online criminals are now launching attacks using social networks, exploiting consumer and mobile devices and vulnerabilities in Web applications, and deploying blended threats to attack financial targets and individual businesses. Read more.

Download this now


Web Security Services: Delegating Security Responsibility to the Cloud
By Webroot | 6/3/2012

Few readers need to be told that the Internet is a dangerous place. Anyone in the IT field is aware that viruses, spam, and malicious Web sites exist. Knowledge of these attacks and vulnerabilities was the domain of specialized security gurus just a few years ago. But the need to understand computer security has spread beyond the domain of specialists. Today, even IT end users need to be aware of threats and countermeasures to some degree.

Download this now


How to Protect Your Business from the Coming Malware Storm
By Webroot | 6/3/2012

The malware storm will force the cost and complexity of premise-based protection to levels sustainable only by national governments and multinational corporations. To keep from being overwhelmed, small and midsize businesses must move defenses outside their own walls, to stop malicious code before it reaches their gateways, servers, and data stores.

Download this now


Flushing Bank Invests in Internet Security
By Webroot | 17/10/2012

Flushing Bank is comprised of 16 different branches across New York State, 350 employees, and an increasingly mobile workforce. Recently, as the individual demands of those separate entities became more apparent, the Internet security appliance the bank had in place could no longer effectively keep up with compliance and data loss prevention demands. Read more.

Download this now


Security as a Service: Business Decision Factors
By Webroot | 17/10/2012

This paper reviews the business value of IT security, illustrates the business case for SaaS over “do it yourself” premise-based solutions, and outlines what to look for in SaaS solutions you can adopt with confidence and count on as you grow.

Download this now


Realtime Publishers: Can You Trust a Cloud-based Security Solution?
By Webroot | 6/3/2012

Cloud computing and security services seem like they would never go together. The former is a function that exists somewhere outside the host, outside the network, and is tapped when needed to perform a certain function such as data archival. The latter is a mindset, an approach that pervades throughout every facet of an IT infrastructure.

Download this now

Essentials

Mobile

Exec

Budget

Back To Business Guide

Click for more ›

Most Popular Reviews

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Latest News Articles

Resources

PCW Evaluation Team

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?