Webroot Company SummaryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Summary
Webroot

Overview: Webroot® Security Software-as-a-Service (SaaS) provides on-demand web, email and archiving solutions that offer flexible and cost-effective alternatives to on-premise security. To learn more, visit www.webroot.com or call 866.915.3208.

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by Webroot.
Research offered by Webroot

Anittel Simplifies Managed Antivirus Service Case Study by Webroot. May 14, 2013 - This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.

  View Anittel Simplifies Managed Antivirus Service Case Study research abstract

Are You Securely Delivering Enterprise Data and Services? by Webroot. November 10, 2011 - Cloud-adoption solutions to prevent  from violating corporate policy. Companies carefully craft security policies to protect sensitive enterprise data, intellectual property and financial information.

  View Are You Securely Delivering Enterprise Data and Services? research abstract

Case Study - Anittel Simplifies Managed AV Service by Webroot. December 31, 2013 - This informative whitepaper explores one company's success with simplified anti-virus services and how it provided their system with the security it was lacking.

  View Case Study - Anittel Simplifies Managed AV Service research abstract

Case Study - System One by Webroot. May 17, 2013 - This brief case study demonstrates how System One Services, a provider of technical outsourcing solutions for clients in the energy, discovered an endpoint protection system that enhanced mobile user protection and reduced network bandwidth while providing vastly improved endpoint security.

  View Case Study - System One research abstract

Cloud Vs. Cloud: Which Side Are You On? by Webroot. November 11, 2011 - The jury is in, and cloud computing is here to stay. So the question for organizations both large and small is not: “to cloud or not to cloud,” but rather, when and what kind — public or private?

  View Cloud Vs. Cloud: Which Side Are You On? research abstract

Cloud-Based Security Threats Present Challenges and Opportunities for MSPs by Webroot. December 31, 2013 - This guide explores the current cloud-based security threats and how MSPs can face the challenge head on.

  View Cloud-Based Security Threats Present Challenges and Opportunities for MSPs research abstract

Cloud-delivered Endpoint Security by Webroot. April 30, 2012 - Learn why protecting your endpoints with cloud-based services can help you improve your level of protection to not only the devices but also the data they contain and the individuals that use them – all at a lower cost and with better manageability.

  View Cloud-delivered Endpoint Security research abstract

Email and Web Security SaaS by Webroot. April 14, 2009 - Read this paper to learn about the many offerings of Webroot's Software as a Service (SaaS)-delivered e-mail and Web security suites, including anti-spam, anti-spyware, anti-virus, and email archiving and encryption.

  View Email and Web Security SaaS research abstract

Endpoint Protection Cheat Sheet by Webroot. August 28, 2012 - Consult this cheat sheet to discover a revolutionary approach to cloud security. Find out more about some of the key advantages and fast facts regarding, deployment and performance, threat detection and remediation and more.

  View Endpoint Protection Cheat Sheet research abstract

Endpoint Protection Solutions: Why the Traditional Model is Broken by Webroot. November 10, 2011 - Securing the enterprise may never have been a simple task, but now it is far more complex as hackers have become more creative and as the enterprise itself has extended into remote locations and as far as “the cloud.”

  View Endpoint Protection Solutions: Why the Traditional Model is Broken research abstract

Enterprise Antivirus Security: How Does Your Solution Stack Up? by Webroot. March 30, 2012 - Thousands of malware attacks occur on a daily basis, and businesses are always searching for a solution to these threats. Inside, access a survey that explores anti-virus solutions and how each measures up. Check out the results to see if your security is up to date.

  View Enterprise Antivirus Security: How Does Your Solution Stack Up? research abstract

Flushing Bank Invests in Internet Security with Webroot by Webroot. September 27, 2011 - New York-based financial institution, Flushing Bank, was in need of a new Internet security appliance as their current one could no longer effectively keep up with growing compliance and data loss prevention demands. View this case study to learn how Webroot Web Security was able to meet their needs as well as explore the key features it offers.

  View Flushing Bank Invests in Internet Security with Webroot research abstract

How Bad Are the Bad Guys? - The Changing Nature of Web Security Threats by Webroot. September 23, 2009 - This whitepaper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing, and other forms of remote access that could all potentially increase the attack surface of the organization. Read on to learn more about protecting your organization from emerging Web-based security threats.

  View How Bad Are the Bad Guys? - The Changing Nature of Web Security Threats research abstract

How to Prevent IT Disasters at Work from Ruining Your Vacation by Webroot. November 10, 2011 - The scenario is a familiar one. You’re about to step out for a leisurely day on the links, at the beach or in the backyard hammock and couldn’t be more excited about your time off, when the little red light starts blinking on your phone: URGENT.

  View How to Prevent IT Disasters at Work from Ruining Your Vacation research abstract

How Web Security Improves Productivity and Compliance by Webroot. December 31, 2012 - This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.

  View How Web Security Improves Productivity and Compliance research abstract

How Web Security Improves Productivity and Compliance by Webroot. December 31, 2012 - This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.

  View How Web Security Improves Productivity and Compliance research abstract

Improving Tools and Techniques to Combat Malware Evolution by Webroot. October 09, 2012 - Some researchers are working hard to create tools that strengthen malware analysis and improve security. Read this expert guide to learn more about what look look for in malware and the threat actors behind the scenes.

  View Improving Tools and Techniques to Combat Malware Evolution research abstract

IT Administrator Saves Engineering Firm More than 200 Hour a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection by Webroot. December 31, 2012 - In this case study, learn how engineering and project management firm Doris, Inc. was able to combat slow scan times, complex management, and ineffective protection by investing in the right endpoint security solution.

  View IT Administrator Saves Engineering Firm More than 200 Hour a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection research abstract

IT Administrator Saves Engineering Firm More than 200 Hours a Week by Switching to Webroot Secure Anywhere by Webroot. August 06, 2012 - The antivirus protection Doris network was using created problems and slowed the productivity of employees. Fortunately, Webroot offered an efficient and effective solution. Learn how Webroot remedied the inaccurate and difficult to manage reports by reading this informative resource.

  View IT Administrator Saves Engineering Firm More than 200 Hours a Week by Switching to Webroot Secure Anywhere research abstract

Leveraging the Cloud to Improve Endpoint Protection – Sept 6th at 10:00am (PDT) live date by Webroot. September 06, 2012 - Find the answers to all of your challenging endpoint protection and web security questions by viewing this informative Webcast. Go beyond the concepts on performance effectiveness and learn the critical aspects of threat protection.

  View Leveraging the Cloud to Improve Endpoint Protection – Sept 6th at 10:00am (PDT) live date research abstract

Live Fridays (hosted e-Seminar, every Friday at 10am AEST) by Webroot. August 29, 2012 - Register for a live demo with open Q & A to have all of your important questions answered. If security is bringing your VMs to a standstill, it may be time to make some changes. Luckily, you can protect your virtual systems without hurting performance or adding complexity. Learn more by listening in on this demo.

  View Live Fridays (hosted e-Seminar, every Friday at 10am AEST) research abstract

Lowering MSP TCO for Endpoint Security Solutions - Bottom-Line Benefits of Cloud-Based Antivirus Architecture by Webroot. January 31, 2014 - This guide shows how organizations can derive more value from their endpoint security by delivering bottom-line benefits of cloud-based antivirus protection from Webroot. This lowers MSP TCO. The paper also highlights the costs of archaic endpoint security when compared to newer security methods.

  View Lowering MSP TCO for Endpoint Security Solutions - Bottom-Line Benefits of Cloud-Based Antivirus Architecture research abstract

Malicious Mobile Apps by Webroot. June 14, 2013 - In this white paper, get industry statistics about today's IT threat landscape, and why IT professionals should heighten mobile security to defend against significant malicious mobile applications.

  View Malicious Mobile Apps research abstract

Phishing 2.0 - Why Phishing is back as the No.1 threat, and how Web Security can protect your company by Webroot. May 31, 2013 - This resource takes an inside look at the new dangers posed by phishing 2.0 attacks. Read on to find an overview of the structure of these threats, learn about web security and anti-phishing capabilities your organization needs, and much more.

  View Phishing 2.0 - Why Phishing is back as the No.1 threat, and how Web Security can protect your company research abstract

Phishing and Web Security by Webroot. December 31, 2013 - This brief whitepaper explores why businesses need to prepare for phishing 2.0 and why this new cybercrime is aiming its sights at your business.

  View Phishing and Web Security research abstract

Presentation Transcript: Is SaaS the Future of Enterprise Security? by Webroot. June 04, 2009 - This presentation transcript discusses how The Web has become a primary attack vector most businesses are not yet prepared for. Compliance and data leakage are a growing concern, and the economic downturn is causing every organization to re-evaluate its spending on personnel and IT resources and how SaaS may just be the answer to these

  View Presentation Transcript: Is SaaS the Future of Enterprise Security? research abstract

Presentation Transcript: Setting up Security Policies and Procedures for the Cloud by Webroot. August 19, 2011 - This presentation transcript provides a framework for enterprises to transition to the cloud safely, as well as examines specific considerations for private, public and hybrid cloud initiatives and the controls you'll need to consider for each model.

  View Presentation Transcript: Setting up Security Policies and Procedures for the Cloud research abstract

Putting Web Threat Protection and Content Filtering in the Cloud by Webroot. December 31, 2012 - In this informative white paper, discover the benefits of deploying security solutions, such as secure web gateways, in the cloud rather than on local servers and appliances. See how you can maximize security and minimize costs using a cloud-based architecture – read on to learn more.

  View Putting Web Threat Protection and Content Filtering in the Cloud research abstract

SecureAnywhere Web Security service by Webroot. May 17, 2013 - This case study highlights one organization's journey in finding a simple to install and easy to configure web filtering service that is as effective on the client side as it is on their network. Learn how they were able to boost their ability to effectively identify and protect all of their mobile users.

  View SecureAnywhere Web Security service research abstract

Six Ways to Embrace IT Consumerization by Webroot. March 01, 2013 - Here are six ways your organization can embrace consumerization. Get some helpful tips for working with end-users, focusing IT's role, avoiding "crapplications", and more.

  View Six Ways to Embrace IT Consumerization research abstract

Study commissioned by Webroot: Web Threats Expose Businesses to Data Loss by Webroot. May 06, 2013 - Eight in 10 companies experienced web-borne attacks in 2012. Don't be part of the statistic! Read this research paper to learn about the current state of web layer security in organizations today and learn what you should do to stay protected.

  View Study commissioned by Webroot: Web Threats Expose Businesses to Data Loss research abstract

Taking Action to Secure Web Applications by Webroot. May 03, 2013 - This expert E-Guide from SearchSecurity.com explores the vulnerabilities of web applications and explores steps you should take to keep them safe.

  View Taking Action to Secure Web Applications research abstract

Taking Managed Security Services To The Next Level by Webroot. October 31, 2013 - This white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.

  View Taking Managed Security Services To The Next Level research abstract

The Best Smartphones for your Business by Webroot. November 11, 2011 - The cell phone market is nothing if not dynamic. A couple of years ago, it would have been unthinkable that Blackberry would have slipped to the third most utilized operating system for smartphones.

  View The Best Smartphones for your Business research abstract

The Drivers for Web Security in the Cloud by Webroot. February 01, 2010 - This Bloor Research paper examines the key drivers for Web security in the cloud. View now to explore the realities of web threats and learn how cloud-based solutions can provide a high level of protection against these increasingly complex and sophisticated threats.

  View The Drivers for Web Security in the Cloud research abstract

The Need to Secure All Business Communications: A competitive Overview of Major Players in the Market by Webroot. December 01, 2010 - This Bloor Research paper offers an overview of the major players in the market for hosted email and web security services. View now to evaluate these services and explore key recommendations for selecting the right vendor for your organisations' needs.

  View The Need to Secure All Business Communications: A competitive Overview of Major Players in the Market research abstract

The State of Cloud Based Security - Taking a Cloud-Based Approach to Security Can Improve Protection and Lower Costs by Webroot. January 30, 2012 - Traditional endpoint solutions are becoming less effective as the threat environment increasingly grows more complex. However, cloud-based security may be the answer, offering an opportunity for improved security, while saving costs. View this paper to explore the current state of cloud-based security, advantages of cloud-based security, and more.

  View The State of Cloud Based Security - Taking a Cloud-Based Approach to Security Can Improve Protection and Lower Costs research abstract

Turning Security Upside-down by Webroot. September 23, 2011 - This white paper explains why security policies must be adapted to handle the sophisticated and highly targeted attacks that today's IT environments are prone to. Obtain best practices for developing a successful defense strategy and learn how cloud-based solutions fit into the security technology market.

  View Turning Security Upside-down research abstract

Turning Security Upside-Down by Webroot. July 29, 2011 - This white paper explains why security policies must be adapted to handle the sophisticated and highly targeted attacks that today's IT environments are prone to. Obtain best practices for developing a successful defence strategy and learn how cloud-based solutions fit into the security technology market.

  View Turning Security Upside-Down research abstract

User-Based Licensing for Endpoint Protection and BYOD by Webroot. June 11, 2013 - User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization.

  View User-Based Licensing for Endpoint Protection and BYOD research abstract

Vantage Point Solutions Group Cut Costs and Strengthens Client Relationships with Webroot by Webroot. February 28, 2014 - This brief case study shows how one IT services company deployed a standardized single endpoint security solution and saw improved efficiency and performance.

  View Vantage Point Solutions Group Cut Costs and Strengthens Client Relationships with Webroot research abstract

Webroot Cheat Sheet by Webroot. February 28, 2012 - Consult this helpful guide to find out the vendors who offer the best endpoint protection. Consider factors such as deployment, performance, threat detection and more with this resource.

  View Webroot Cheat Sheet research abstract

Webroot E-Mail Security Saas: Business Continuity by Webroot. January 01, 2007 - ‘On Tap' Business Continuity means that the service is constantly active and available at all times, not just when disaster strikes.

  View Webroot E-Mail Security Saas: Business Continuity research abstract

Webroot Enterprise Spy Audit by Webroot. October 16, 2006 - Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.

  View Webroot Enterprise Spy Audit research abstract

Webroot Projects Appleby as it Grows into the Largest Offshore Law Firm in the World by Webroot. August 02, 2013 - This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.

  View Webroot Projects Appleby as it Grows into the Largest Offshore Law Firm in the World research abstract

Webroot projects Appleby as it grows into the Largest Offshore Law Firm in the World by Webroot. May 15, 2013 - This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.

  View Webroot projects Appleby as it grows into the Largest Offshore Law Firm in the World research abstract

Webroot Secure Anywhere - Endpoint Protection by Webroot. August 06, 2012 - Threats are becoming more sophisticated and frequent than ever before, as a result businesses require a revolutionary approach to endpoint malware protection. Access this informative white paper to learn how Webroot is using its services to keep security up-to-date and effective.

  View Webroot Secure Anywhere - Endpoint Protection research abstract

Webroot Secure Anywhere Business - Mobile Protection by Webroot. July 25, 2012 - Learn more about the key benefits of Webroot SecureAnywhere Business by reading this informative white paper. Not only does it help secure devices from malware and malicious web sites, it also can protect data in case of accidental loss or theft.

  View Webroot Secure Anywhere Business - Mobile Protection research abstract

Webroot Secure Anywhere Business Value Assessment by Webroot. August 13, 2012 - Consult this helpful resource to get financial justification for endpoint protection. Though you can't slap a price tag on a fully secured business enterprise, these eight simple questions can help you rest easy knowing you made the right choice!

  View Webroot Secure Anywhere Business Value Assessment research abstract

Webroot Secure Anywhere Cloud vs. Six Traditional Security Products by Webroot. July 24, 2012 - PassMark Software recently conducted performance testing on eight security software products, on Windows 7 Ultimate Edition. View this white paper to uncover how the software performed in different areas. Each guideline is explained further in the resource.

  View Webroot Secure Anywhere Cloud vs. Six Traditional Security Products research abstract

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors by Webroot. January 17, 2013 - This performance benchmark report reveals the results of an objective performance test conducted on eight endpoint security software products. Inside, learn which solutions are leading the pack for endpoint protection.

  View Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors research abstract

Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014) by Webroot. February 28, 2014 - This resource outlines testing results of 8 competing endpoint security software products and breaks down how each perform in relation to a wide variety of criteria.

  View Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014) research abstract

Webroot  Endpoint Security eBook by Webroot. July 25, 2012 - This resource outlines how a new approach to security may be what your business needs. If constant downloads, installations and updates are slowing down the efficiency of your company; it may be time to make some changes. Read this eBook to find out more about how Webroot can improve your endpoint security.

  View Webroot  Endpoint Security eBook research abstract

When Benefits Outweigh the Fears: Is Your Business Ready for the Cloud? by Webroot. November 10, 2011 - Eric Johnson was a network admin at a small company of 50 or so workstations. One of the biggest problems he continuously faced was growing pains.

  View When Benefits Outweigh the Fears: Is Your Business Ready for the Cloud? research abstract

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts