All resources sponsored by:

Webroot

1 - 25 of 50 Matches
Double Kill, Other Favored Exploits, and How to Patch Against Them
sponsored by Webroot
PODCAST:Tune into this podcast where Hacker Files host Joe Panettieri talks with Webroot analysist Tyler Moffit about patching against the remote code execution flaw Double Kill and other exploits.
Posted: 06 Aug 2019 | Premiered: Aug 6, 2019
Get This Now


Cryptojacking, The Sequel: Life After Coinhive
sponsored by Webroot
PODCAST:The popular cryptomining tool Coinhive has closed its doors. So the cryptojacking threat should decline, right? 'Not so fast' Webroot threat analysts Tyler Moffitt tells host Joe Panettieri. Tune into this podcast to find out who's filling in where Coinhive left off.
Posted: 05 Aug 2019 | Premiered: Aug 5, 2019
Get This Now


The Future of Cybercrime and Security
sponsored by Webroot
ANALYST REPORT:In Juniper Research's The Future of Cybercrime & Security report, explore key takeaways and an overview of the network & endpoint cybersecurity competitive landscape.
Posted: 02 Aug 2019 | Published: 02 Aug 2019
Get This Now


Business Endpoint Protection
sponsored by Webroot
EBOOK:Download this e-book to learn about the benefits of Webroot's SecureAnywhere Business Endpoint Protection software.
Posted: 02 Aug 2019 | Published: 02 Aug 2019
Get This Now


What Makes Real Threat Intelligence
sponsored by Webroot
WHITE PAPER:This white paper will arm you with a set of criteria to gauge threat intelligence by its source, intended audience, and use cases to help narrow down the field to a few basic types. Read on to learn more.
Posted: 01 Aug 2019 | Published: 01 Aug 2019
Get This Now


A Quick Guide to Stopping Ransomware
sponsored by Webroot
RESOURCE:In this infographic, explore 9 proactive steps you can take to reduce the likelihood that you'll fall victim to a crypto-ransomware attack.
Posted: 01 Aug 2019 | Published: 01 Aug 2019
Get This Now


How To Harness Machine Learning
sponsored by Webroot
EBOOK:In this e-book, discover 5 of the most pressing issues facing cybersecurity professionals today and how Webroot's 6th generation machine learning can help stop these sophisticated attacks today and in the future.
Posted: 31 Jul 2019 | Published: 31 Jul 2019
Get This Now


2019 Webroot Threat Report
sponsored by Webroot
ANALYST REPORT:In this 2019 Webroot Threat Report, it details the threat activity throughout 2018, and compares the data with that from years past. Tap into the report to get insights on how you can combat cybercrime today and in the future.
Posted: 31 Jul 2019 | Published: 31 Jul 2019
Get This Now


Smarter Cybersecurity Solutions for Small and Medium-Sized Businesses
sponsored by Webroot
WHITE PAPER:Cobbling together multiple cybersecurity products to ensure you have adequate endpoint protection is not a strategy most businesses favor. It's a costly and complex attempt to compensate for the inherent deficiencies of conventional signature-based cybersecurity. There is a better way. Download this white paper to learn how Webroot can help.
Posted: 30 Jul 2019 | Published: 30 Jul 2019
Get This Now


Reconfigure Your Antimalware Strategy to Boost Endpoint Security For Advanced Threat Protection
sponsored by Webroot
EGUIDE:This expert e-guide explains why reconfiguration of your current antimalware strategy is all it takes to mitigate new trends in cyber-attacks.
Posted: 17 Sep 2013 | Published: 17 Sep 2013
Get This Now


Which Endpoint Security Service is Best? Breaking Down 5 Top Solutions
sponsored by Webroot
EGUIDE:This guide explores the management functionality of five cloud endpoint security services, along with the process needed to identify an effective anti-malware product for your clients' environments.
Posted: 01 May 2014 | Published: 01 May 2014
Get This Now


Case Study - Anittel Simplifies Managed AV Service
sponsored by Webroot
WHITE PAPER:This informative whitepaper explores one company's success with simplified anti-virus services and how it provided their system with the security it was lacking.
Posted: 30 Apr 2014 | Published: 31 Dec 2013
Get This Now


Phishing and Web Security
sponsored by Webroot
WHITE PAPER:This brief whitepaper explores why businesses need to prepare for phishing 2.0 and why this new cybercrime is aiming its sights at your business.
Posted: 29 Apr 2014 | Published: 31 Dec 2013
Get This Now


Drive More Value from Endpoint Security with Cloud-Based Anti-Virus Protection
sponsored by Webroot
WHITE PAPER:This guide shows how organizations can derive more value from their endpoint security by delivering bottom-line benefits of cloud-based antivirus protection from Webroot. This lowers MSP TCO. The paper also highlights the costs of archaic endpoint security when compared to newer security methods.
Posted: 21 Apr 2014 | Published: 31 Jan 2014
Get This Now


Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors (February 2014)
sponsored by Webroot
WHITE PAPER:This resource outlines testing results of 8 competing endpoint security software products and breaks down how each perform in relation to a wide variety of criteria.
Posted: 18 Apr 2014 | Published: 28 Feb 2014
Get This Now


Vantage Point Solutions Group Cut Costs and Strengthens Client Relationships with Webroot
sponsored by Webroot
CASE STUDY:This brief case study shows how one IT services company deployed a standardized single endpoint security solution and saw improved efficiency and performance.
Posted: 18 Apr 2014 | Published: 28 Feb 2014
Get This Now


Taking Managed Security Services To The Next Level
sponsored by Webroot
WHITE PAPER:This white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges.
Posted: 18 Apr 2014 | Published: 31 Oct 2013
Get This Now


Cloud-Based Security Threats Present Challenges and Opportunities for MSPs
sponsored by Webroot
WHITE PAPER:This guide explores the current cloud-based security threats and how MSPs can face the challenge head on.
Posted: 15 Apr 2014 | Published: 31 Dec 2013
Get This Now


Malicious Mobile Apps
sponsored by Webroot
WHITE PAPER:In this white paper, get industry statistics about today's IT threat landscape, and why IT professionals should heighten mobile security to defend against significant malicious mobile applications.
Posted: 15 Oct 2013 | Published: 14 Jun 2013
Get This Now


Webroot Projects Appleby as it Grows into the Largest Offshore Law Firm in the World
sponsored by Webroot
CASE STUDY:This case study describes how the leading offshore law firm Appleby Global leveraged the right security service in order to overcome the security challenges introduced by business growth – including web policy inconsistency, managerial complexity, and more.
Posted: 02 Aug 2013 | Published: 02 Aug 2013
Get This Now


User-Based Licensing for Endpoint Protection and BYOD
sponsored by Webroot
WHITE PAPER:User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization.
Posted: 11 Jun 2013 | Published: 11 Jun 2013
Get This Now


Phishing 2.0 - Why Phishing is back as the No.1 threat, and how Web Security can protect your company
sponsored by Webroot
WHITE PAPER:This resource takes an inside look at the new dangers posed by phishing 2.0 attacks. Read on to find an overview of the structure of these threats, learn about web security and anti-phishing capabilities your organization needs, and much more.
Posted: 31 May 2013 | Published: 31 May 2013
Get This Now


Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors
sponsored by Webroot
WHITE PAPER:This performance benchmark report reveals the results of an objective performance test conducted on eight endpoint security software products. Inside, learn which solutions are leading the pack for endpoint protection.
Posted: 30 May 2013 | Published: 17 Jan 2013
Get This Now


How Web Security Improves Productivity and Compliance
sponsored by Webroot
WHITE PAPER:This resource describes how the value of secure web gateways doesn't need to be limited to web protection. Inside, learn how your organization can strategically use this security technology to improve productivity, reduce costs, increase compliance, and more.
Posted: 30 May 2013 | Published: 31 Dec 2012
Get This Now


Case Study - System One
sponsored by Webroot
CASE STUDY:This brief case study demonstrates how System One Services, a provider of technical outsourcing solutions for clients in the energy, discovered an endpoint protection system that enhanced mobile user protection and reduced network bandwidth while providing vastly improved endpoint security.
Posted: 17 May 2013 | Published: 17 May 2013
Get This Now


1 - 25 of 50 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement