age

Results 20951 - 20975 of 21577Sort Results By: Published Date | Title | Company Name
By: Webroot     Published Date: Sep 18, 2013
This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild: • Collects millions of applications from a variety of sources • Stores mobile app data in the world’s largest cloud-based threat database • Analyzes and scores apps on a range from malicious (e.g., known malware such as Trojans or root kits) to trustworth
Tags : mobile app, mobile threat, mobile device management, mobile application management, malicious mobile app, security
     Webroot
By: Webroot     Published Date: Sep 18, 2013
This Webroot whitepaper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications. In addition to these benefits, cloud-based secure web gateways can also provide better security and faster performance than appliances or local servers. It discusses a number of advantages of cloud-based solutions that appliances cannot match, such as: • Better defense against zero-day threats and spam servers • More comprehensive signature and URL database • Supports remote users more securely and without the cost of putting servers in every location
Tags : web threat, content filtering, the cloud, security, web gateway, cloud-based applications
     Webroot
By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : web security, cybercriminals, web threats, web gateway, security
     Webroot
By: Webroot     Published Date: Sep 14, 2012
A free tool that provides the fastest, most comprehensive diagnostic report to help IT Managers identify where system issues exist.
Tags : system analyzer, security, improving performance, system scan, security threats, it management, av protection, webroot
     Webroot
By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : firewall, network security, urls, ips, adequate protection, security
     Webroot Inc
By: Webroot Inc     Published Date: Aug 01, 2015
PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 8.1 (64-bit) during July and August 2015. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products. Testing was performed on all products using 13 performance metrics, including: installation time, boot time, CPU Usage, Memory Usage, Browse Time and many others. Does your endpoint security measure up?
Tags : endpoint performance, software security, endpoint security products, performance metrics, security
     Webroot Inc
By: Webroot UK     Published Date: Nov 11, 2009
This report highlights ways Best-in-Class organizations harden themselves against threats from email.
Tags : webroot, email security, threats, spam, data security policy, knowledge management, performance management, encrytion
     Webroot UK
By: Webroot UK     Published Date: Nov 11, 2009
The software-as-a-service model can help you stay ahead of Web and email threats without breaking the bank on infrastructure and management. Find out more in this whitepaper.
Tags : webroot, saas, software-as-a-service, web security, email security, threats, storage management, tco
     Webroot UK
By: Webroot UK     Published Date: Nov 11, 2009
Software as a Service (SaaS)-delivered e-mail and Web security suites offer a good solution that Butler Group recommends as part of a more comprehensive security architecture comprising gateway and end point-based security solutions. Find out more in this whitepaper!
Tags : webroot, saas, software-as-a-service, web security, email security, policy-based encryption, security management, data loss prevention
     Webroot UK
By: Webroot UK     Published Date: Nov 11, 2009
Service Subscription Takes the Headache Out of Email and Web Threat Management. Read this white paper about the Seven Reasons to Adopt SaaS Security.
Tags : webroot, security saas, web security, email security, security management
     Webroot UK
By: Webroot UK     Published Date: Feb 04, 2013
This paper examines the different endpoint security methods for virtualized environments and presents how Webroot Secure Anywhere Business - Endpoint Protection security provides optimal performance, protection and manageability.
Tags : endpoint, security, virtualization, environments, performance, protection, manageability
     Webroot UK
By: Webroot UK     Published Date: Sep 06, 2013
In today's world of employees spending hours online everyday with multiple devices, Webroot offers a unique portfolio of solutions for protecting endpoints. This consists of three offerings that can be deployed independently or in any combination. When implemented together, they provide far-reaching benefits. Read this whitepaper and learn how to get manageable endpoint, mobile device and web security together.
Tags : closing the circle, manageable endpoint solutions, webroot, security, webroot security suite, protecting endpoints
     Webroot UK
By: Webroot UK     Published Date: Sep 05, 2013
Webroot SecureAnywhere Business - Endpoint Protection offers a revolutionary approach to malware protection. It brings together Webroot's innovative file pattern and predictive behavior recognition technology, with the almost limitless power of cloud computing, to stop known threats and prevent unknown zero-day attacks more effectively than anything else. Read this white paper to learn about ultimate performance and minimal management security software from Webroot.
Tags : webroot, secureanywhere, business, software, security software, revolutionary software, predictive behavior, known threats
     Webroot UK
By: Webroot UK     Published Date: Sep 25, 2013
Managing web security in an increasingly challenging threat landscape. Cybercriminals have increasingly turned their attention to the web, which has become by farther predominant area of attack. Small wonder. Those who would do harm to our computer systems for profit or malice always manage to focus their efforts on our most vulnerable weak spots. Today, that is the web, for a wide number of reasons.
Tags : web security, webroot, web attack, ddos, web, internet security, malware, networking
     Webroot UK
By: Webroot UK     Published Date: Sep 25, 2013
Mobile applications are providing exciting new business opportunities for service providers and technology companies. Innovative firms are thriving by offering apps in app stores and app markets, by supporting apps with mobile services and infrastructure, and by managing apps through mobile device management (MDM) and mobile application management (MAM) products. Enterprises are providing mobile apps to their employees and customers through corporate app catalogs. But these business opportunities could be jeopardized by information security issues.
Tags : webroot, app reputation, app, mobile app, mam, enterprise mobile apps, app markets, mobile viruses
     Webroot UK
By: Webroot UK     Published Date: Sep 25, 2013
PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 7 Ultimate Edition (64-bit) during January 2014. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products. Testing was performed on all products using thirteen (13) performance metrics. These performance metrics are as follows.
Tags : webroot, passmark software, webroot security, endpoint protection, performance benchmark, testing, endpoint security, memory usage
     Webroot UK
By: Webroot UK     Published Date: Dec 20, 2013
The Webroot® Intelligence Network (WIN) is a key component of a revolutionary approach to next-generation malware protection. Together, WIN and Webroot is combined with Webroot’s ultra-efficient endpoint agent — Webroot® SecureAnywhere™ Business - Endpoint Protection ensure that both known and... that both known and unknown infections are removed before they do harm.
Tags : webroot, passmark software, webroot security, endpoint protection, performance benchmark, testing, endpoint security
     Webroot UK
By: Webroot UK     Published Date: Dec 20, 2013
The workplace technology landscape has changed dramatically over the past five years, and the security threats have changed along with it. This whitepaper will show you the growing factors that IT professionals can't afford to ignore.
Tags : webroot, mobile apps, mobile workers, mobile devices, accessing networks, workplace technology, security threats, infographic
     Webroot UK
By: Websense     Published Date: Oct 18, 2010
Data Loss Prevention (DLP) solutions are moving targets. They keep changing to meet evolving regulatory requirements and business needs. It's tough to select the best DLP solution. This white paper from leading information security research firm Securosis gives you an overview of the DLP industry, technologies, and architectures.
Tags : websense, dlp, data loss prevention, securosis, security, data management, testing
     Websense
By: Websense     Published Date: Apr 16, 2010
Web 2.0 technology has transformed the Web into a core business communication platform. Unfortunately, it's also become much easier to accidentally or intentionally disclose sensitive data. This white paper outlines the business need for Web data loss prevention (DLP), makes the case for DLP as an embedded capability within secure Web gateways, and defines what customers should look for in a solution.
Tags : websense, dlp, data loss prevention, securosis, security, data management, testing, secure gateways
     Websense
By: Websense     Published Date: Aug 23, 2012
This mobile security white paper outlines the essential steps for mobile security.
Tags : mobile security, websense, mobile device management, mdm, malware
     Websense
By: Websense     Published Date: Oct 06, 2014
This paper provides the seven stages of advanced threats and helps in the understanding the cyber attack kill chain
Tags : apts, understanding apts, apt security strategy, stages of advanced threats
     Websense
By: Webtrends     Published Date: Dec 19, 2009
According to Forrester, 48% of marketers need help demonstrating ROI on testing. Join Casey Carey, VP of Product and Bob Garcia, Director, Product Marketing and discover how to get ahead of the curve with the business-case answers they provide in this webinar.
Tags : webtrends, mobile strategy, app downloads, apps, performance indicators, optimization, testing, site
     Webtrends
By: Webtrends     Published Date: Jun 20, 2011
Marketers, managers and technologists all need real-time performance insights at their fingertips. Webtrends invites you to experience the award-winning Analytics 10, unified analytics uniquely made for digital marketing professionals in this webinar featuring Logitech and 3M.
Tags : webtrends, cmo, digital marketing, process, partnerships, go-to-market, customer experience, multi-channel marketing
     Webtrends
By: Wellspring     Published Date: Mar 15, 2019
Making the Right Decisions for Your Company's Innovation Needs Technology and R&D leaders contend daily with the daunting pace of technological change in their core products and platforms. Recognizing both new tech opportunities and disruptive threats, many managers have responded with tech scouting and tech landscaping programs. Building on these efforts, in the past few years a new mainstream has begun to adopt tech scouting as a mission-critical competency. Download this paper to learn how we examine the pros and cons of both internal (build) and outsourced (buy) tech scouting approaches. Then we will discuss various hybrid options that combine the best of “build” and “buy,” depending on your company’s existing structure and level of innovation maturity.
Tags : 
     Wellspring
Start   Previous    832 833 834 835 836 837 838 839 840 841 842 843 844 845 846    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com