All Research Sponsored By:OpenText Security Solutions

Webroot Secure Anywhere Cloud vs. Six Traditional Security Products
WHITE PAPER: PassMark Software recently conducted performance testing on eight security software products, on Windows 7 Ultimate Edition. View this white paper to uncover how the software performed in different areas. Each guideline is explained further in the resource.
Posted: 27 Jul 2012 | Published: 24 Jul 2012


Webroot Secure Anywhere Business - Mobile Protection
WHITE PAPER: Learn more about the key benefits of Webroot SecureAnywhere Business by reading this informative white paper. Not only does it help secure devices from malware and malicious web sites, it also can protect data in case of accidental loss or theft.
Posted: 25 Jul 2012 | Published: 25 Jul 2012


Webroot  Endpoint Security eBook
EBOOK: This resource outlines how a new approach to security may be what your business needs. If constant downloads, installations and updates are slowing down the efficiency of your company; it may be time to make some changes. Read this eBook to find out more about how Webroot can improve your endpoint security.
Posted: 25 Jul 2012 | Published: 25 Jul 2012


Enterprise Antivirus Security: How Does Your Solution Stack Up?
WHITE PAPER: Thousands of malware attacks occur on a daily basis, and businesses are always searching for a solution to these threats. Inside, access a survey that explores anti-virus solutions and how each measures up. Check out the results to see if your security is up to date.
Posted: 20 Jul 2012 | Published: 30 Mar 2012


The State of Cloud Based Security - Taking a Cloud-Based Approach to Security Can Improve Protection and Lower Costs
WHITE PAPER: Traditional endpoint solutions are becoming less effective as the threat environment increasingly grows more complex. However, cloud-based security may be the answer, offering an opportunity for improved security, while saving costs. View this paper to explore the current state of cloud-based security, advantages of cloud-based security, and more.
Posted: 30 Jan 2012 | Published: 30 Jan 2012


How to Prevent IT Disasters at Work from Ruining Your Vacation
WHITE PAPER: The scenario is a familiar one. You’re about to step out for a leisurely day on the links, at the beach or in the backyard hammock and couldn’t be more excited about your time off, when the little red light starts blinking on your phone: URGENT.
Posted: 14 Nov 2011 | Published: 10 Nov 2011


Cloud Vs. Cloud: Which Side Are You On?
WHITE PAPER: The jury is in, and cloud computing is here to stay. So the question for organizations both large and small is not: “to cloud or not to cloud,” but rather, when and what kind — public or private?
Posted: 11 Nov 2011 | Published: 11 Nov 2011


The Best Smartphones for your Business
WHITE PAPER: The cell phone market is nothing if not dynamic. A couple of years ago, it would have been unthinkable that Blackberry would have slipped to the third most utilized operating system for smartphones.
Posted: 11 Nov 2011 | Published: 11 Nov 2011


When Benefits Outweigh the Fears: Is Your Business Ready for the Cloud?
WHITE PAPER: Eric Johnson was a network admin at a small company of 50 or so workstations. One of the biggest problems he continuously faced was growing pains.
Posted: 10 Nov 2011 | Published: 10 Nov 2011


Are You Securely Delivering Enterprise Data and Services?
WHITE PAPER: Cloud-adoption solutions to prevent  from violating corporate policy. Companies carefully craft security policies to protect sensitive enterprise data, intellectual property and financial information.
Posted: 10 Nov 2011 | Published: 10 Nov 2011


Endpoint Protection Solutions: Why the Traditional Model is Broken
WHITE PAPER: Securing the enterprise may never have been a simple task, but now it is far more complex as hackers have become more creative and as the enterprise itself has extended into remote locations and as far as “the cloud.”
Posted: 10 Nov 2011 | Published: 10 Nov 2011


Flushing Bank Invests in Internet Security with Webroot
CASE STUDY: New York-based financial institution, Flushing Bank, was in need of a new Internet security appliance as their current one could no longer effectively keep up with growing compliance and data loss prevention demands. View this case study to learn how Webroot Web Security was able to meet their needs as well as explore the key features it offers.
Posted: 27 Sep 2011 | Published: 27 Sep 2011


Presentation Transcript: Setting up Security Policies and Procedures for the Cloud
PRESENTATION TRANSCRIPT: This presentation transcript provides a framework for enterprises to transition to the cloud safely, as well as examines specific considerations for private, public and hybrid cloud initiatives and the controls you'll need to consider for each model.
Posted: 19 Aug 2011 | Published: 19 Aug 2011


Turning Security Upside-Down
WHITE PAPER: This white paper explains why security policies must be adapted to handle the sophisticated and highly targeted attacks that today's IT environments are prone to. Obtain best practices for developing a successful defence strategy and learn how cloud-based solutions fit into the security technology market.
Posted: 29 Jul 2011 | Published: 29 Jul 2011


Presentation Transcript: Is SaaS the Future of Enterprise Security?
PRESENTATION TRANSCRIPT: This presentation transcript discusses how The Web has become a primary attack vector most businesses are not yet prepared for. Compliance and data leakage are a growing concern, and the economic downturn is causing every organization to re-evaluate its spending on personnel and IT resources and how SaaS may just be the answer to these
Posted: 04 Jun 2009 | Published: 04 Jun 2009


Webroot Enterprise Spy Audit
TRIAL SOFTWARE: Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.
Posted: 16 Oct 2006 | Premiered: 16 Oct 2006