Top Green Fade


Internet Security Resource Center

In the modern age, securing your network, users, and data can be a tricky proposition. Webroot offers tips and solutions for meeting your security needs.

Top Green Fade

Malicious Mobile Apps (MMA) — A Growing Threat in 2013 and Beyond

With the exploding use of mobile devices and BYOD, mobile apps represent a major new threat. This infographic reveals some surprising facts about malicious mobile apps, including where they come from, what they do, and what other IT pros are thinking about MMAs.


Web Threats — Is Your Company Exposed?

This infographic gives a quick visual representation of some of the key findings of recent Webroot research on web security in the US and UK. The findings highlight the significant costs that web threats pose to businesses—such as increased help


Mobile Browsing — Is Your Company at Risk?

This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data.


Remote Users Expose Companies to Cybercrime

Webroot conducted research on web security in the US and the UK. As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities.


Web Threats Expose Businesses to Data Loss

Webroot commissioned a study to gauge the prevalence of web-borne attacks, their consequences, and how IT pros are responding. Among the results, the vast majority of companies surveyed experienced one or more types of web-borne attacks in 2012.


The Wild, Wild West of Mobile Apps

This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate


Phishing 2.0: Why phishing is back as the No. 1 web threat, and how web security can protect your company

This whitepaper discusses a major new threat vector — “phishing 2.0.” While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses.


Putting Web Threat Protection and Content Filtering in the Cloud

This Webroot whitepaper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications. In addition to these benefits, cloud-based


Managing Web Security in an Increasingly Challenging Threat Landscape

This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day.


Reinventing Antivirus

This white paper describes how new threats have stretched the capabilities of “fat client” security architectures to the limit, making


PassMark Ranks Leading Endpoint Protection Products

In today's challenging security environment, using the best products that fulfill your business needs is of the essence. So when evaluating solutions, be sure to look at all aspects of a product—including performance benchmark testing.


Faster Scans and Better Virus Detection—Can They Do That?

This FAQ tells you how to move beyond the old trade-off between anti-malware effectiveness and speed. It answers questions such as what is wrong with conventional approaches, which includes the inability of clients to perform signature matching operations on today's more than 70 million malware variants.


System Analyzer

Webroot® System Analyzer looks inside a problem system and gives you a quick assessment plus a detailed report on all aspects of hardware, OS and installed applications—in less than 2 minutes. You can run this free tool at any time to assess the health and security status of the PCs in your environment.


Closing the Circle

Many of today's most dangerous threats, such as advanced persistent threats, don't rely on a single method of attack - say, sending malware files as email attachments. Instead, they combine several. Relying on endpoint protection alone may not be enough to stop these complex threats.


Endpoint Protection: Trade In Signature Updates for the Cloud

This eBook describes the many capabilities that put cloud endpoint protection far ahead of competitive solutions. It describes the current broken endpoint security paradigm that relies on large-footprint client software, huge signature downloads, long scan times, and dedicated servers.

Follow Webroot:

Webroot Threat Blog