Additional Content

  • Malicious Mobile Apps (MMA) — A Growing Threat in 2013 and Beyond
    With the exploding use of mobile devices and BYOD, mobile apps represent a major new threat. This infographic reveals some surprising facts about malicious mobile apps, including where they come from, what they do, and what other IT pros are thinking about MMAs.
  • Web Threats Expose Businesses to Data Loss
    Webroot commissioned a study to gauge the prevalence of web-borne attacks, their consequences, and how IT pros are responding. Among the results, the vast majority of companies surveyed experienced one or more types of web-borne attacks in 2012.
  • The Wild, Wild West of Mobile Apps
    This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate
  • Web Threats — Is Your Company Exposed?
    This infographic gives a quick visual representation of some of the key findings of recent Webroot research on web security in the US and UK. The findings highlight the significant costs that web threats pose to businesses—such as increased help
  • Reinventing Antivirus
    This white paper describes how new threats have stretched the capabilities of “fat client” security architectures to the limit, making
  • Mobile Browsing — Is Your Company at Risk?
    This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data.
  • Remote Users Expose Companies to Cybercrime
    Webroot conducted research on web security in the US and the UK. As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities.
  • Phishing 2.0: Why phishing is back as the No. 1 web threat, and how web security can protect your company
    This whitepaper discusses a major new threat vector — “phishing 2.0.” While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses.
  • Putting Web Threat Protection and Content Filtering in the Cloud
    This Webroot whitepaper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications. In addition to these benefits, cloud-based
  • Managing Web Security in an Increasingly Challenging Threat Landscape
    This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day.
  • PassMark Ranks Leading Endpoint Protection Products
    In today's challenging security environment, using the best products that fulfill your business needs is of the essence. So when evaluating solutions, be sure to look at all aspects of a product—including performance benchmark testing.
  • Faster Scans and Better Virus Detection—Can They Do That?
    This FAQ tells you how to move beyond the old trade-off between anti-malware effectiveness and speed. It answers questions such as what is wrong with conventional approaches, which includes the inability of clients to perform signature matching operations on today's more than 70 million malware variants.
  • System Analyzer
    Webroot® System Analyzer looks inside a problem system and gives you a quick assessment plus a detailed report on all aspects of hardware, OS and installed applications—in less than 2 minutes. You can run this free tool at any time to assess the health and security status of the PCs in your environment.