Webroot Whitepapers


Sort by: Date | Company | Title


A Forrester Consulting Thought Leadership Paper - The State Of Endpoint Protection
By Webroot | 5/10/2012

Webroot commissioned Forrester Consulting to conduct a survey study of 161 North American and European IT security decision-makers. The purpose of the study is to understand the current state of endpoint security strategies across enterprises and SMBs, as well as identify key trends and market directions for endpoint security. This study took a detailed look at how organisations deploy endpoint security products, their common practices, pain points, and challenges.

Download this now


Benchmarks for Security - A Comparative Test
By Webroot | 5/9/2013

In a head to head comparison of 8 end-point security products, we look at which performs the best across crucial performance metrics - from installation time to memory usage. Download to find out which performs the best!

Download this now


Bloor Research - Why web security is best served in the cloud
By Webroot | 17/10/2012

This paper discusses the new generation of web security offerings provided by service providers in the cloud, where protection is applied at the point where the threats are being seen—that is, directed at web-based applications. In taking the protection nearer to the threats, organisations can benefit from vastly improved internet security as the threats are stopped before they ever reach the network.

Download this now


Building a Better Mousetrap in Anti-Malware
By Webroot | 24/8/2012

This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.

Download this now


Case Study: Gadens Law Firm Reclaims 22 Hours of Lost Productivity Each Month
By Webroot | 24/8/2012

For the past eight years, Gadens Brisbane has used a “big three” security vendor to protect its network against malware and other threats. Despite deploying a complete antivirus package, the firm still experienced up to three infections across the network every week. This gap in security meant the firm’s IT team was spending up to six hours a week on security management, resulting in lawyers being unable to work on their computers for hours a time – an inconvenience for the individual, and costly for a business reliant on hourly charging. Read how Gadens Law Firm have reduced their security management time from about 6 hours a week to 30 minutes a week. Find out more.

Download this now


Casestudy: Managing an Antivirus Service and Improve the Customer Experience
By Webroot | 24/7/2013

Anittel Group has provided managed technology and connectivity services to organisations for more than 15 years, expanding to become one of the world’s largest full-service, IT and telecommunications companies. Previously, Anittel deployed an in-built antivirus solution as part of its managed service offering, which addressed a number of its customers’ needs, except for individual malware infections, which occurred as often as a several times a week. In this case study, find out what they did to solve this problem.

Download this now


Closing the Circle: How to get manageable endpoint, mobile device and web security together
By Webroot | 7/1/2014

Closing the circle: Why you need to protect endpoints and mobile devices together Endpoint protection has gotten more complicated

In this white paper we will discuss: • Why traditional endpoints and mobile devices require overlapping (but not identical) security solutions. • How to enhance the protection of all endpoints by adding web security. • Why today’s threats require that endpoint protection and mobile device protection activities be moved to the cloud. • How Webroot makes it easy to “close the circle” by managing endpoint protection, mobile device protection and web security through one infrastructure.

Download this now


Cloud-Based Mobile Device Security Streamlines Data Protection
By Webroot | 7/1/2014

Read this white paper to learn why cloud-based security offers superior protection that meets today’s requirements for identifying and preventing access to malicious sites and applications while reducing management complexity and IT staff time and effort. This whitepaper discusses: • Increased use of mobile devices and the associated risks • Ways to address security challenges • Benefits of cloud-based anti-malware solutions

Download this now


Cloud-Based Security Threats Present Challenges and Opportunities for MSPs
By Webroot | 7/1/2014

Cloud computing has fundamentally changed the way businesses and consumers use computers and technology and the way Information Technology (IT) professionals manage those resources. While the cloud has delivered a multitude of benefits to technical and non-technical people alike, there have also been significant downsides to reliance on cloud technology, including unplanned outages and even outright cyberattacks and data theft.

Download this now


CryptoLocker - Your Money or Your Life
By Webroot | 7/1/2014

As of September 2013, a new and vicious form of malware has been wreaking havoc. CryptoLocker belongs to a family of malware called “ransomware”, which is designed to extort money from victims by denying them access to their personal files. It targets all Windows Operating Systems, from Windows XP to Windows 8, and typically remains unnoticed by victims until it’s too late and the damage to their files is irreparable.

Download this now

Essentials

James Cook University - Master of Data Science Online Course

Learn more >

Mobile

Exec

Budget

Back To Business Guide

Click for more ›

Most Popular Reviews

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Latest News Articles

Resources

PCW Evaluation Team

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?