Endpoint Security

RSS
Endpoint security news, solutions, and analysis for IT professionals
  • Webcast

    Webroot System Analyzer

    Posted October 23, 2012 - 6:15 pm

    Webroot System Analyzer looks inside a problem system and gives you a quick assessment plus a detailed report on all aspects of hardware, OS and installed applications-in less than 2 minutes.
  • White Paper

    Faster Scans and Better Virus Detection - Can They Do That?

    Posted October 23, 2012 - 5:00 pm

    This FAQ answers questions about how IT professionals can meet the need for better malware detection without sacrificing performance.
  • White Paper

    Fact Sheet: Webroot Intelligent Network

    Posted October 23, 2012 - 5:00 pm

    Webroot Intelligent Network (WIN) integrates billions of pieces of information from multiple sources to create the world's largest malware detection net. Get the facts on how WIN is different from other cloud-based anti-virus solutions.
  • White Paper

    Doris Inc. - IT administrator Saves Engineering Firm More than 200 Hours a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection

    Posted October 23, 2012 - 3:45 pm

    Unhappy with their security solution, they chose Webroot. Their deployment of SecureAnywhere Business Endpoint Protection saved the firm more than 200 hour per week and dramatically improved security.
  • White Paper

    Webroot SecureAnywhere Business - Endpoint Protection eBook

    Posted August 21, 2012 - 12:45 am

    The eBook then details how Webroot innovations overcome these shortcomings and provide greater security.
  • Leaky web sites provide trail of clues about corporate executives

    Posted August 13, 2012 - 12:55 pm

    Fortune 500 executives are using their business e-mail addresses to access a wide range of prominent social media web sites, leaving a potentially troublesome trail of clues for sophisticated hackers and cyber criminals, a security researcher has discovered.
  • Review

    DLP tools deliver strong endpoint protection

    Posted August 13, 2012 - 11:42 am

    With serious data breaches occurring on almost a daily basis, concerns about data protection have skyrocketed. While some experts believe endpoint breaches may no longer comprise the majority of data leaks, the intentional or unintentional release of sensitive data from endpoints within an organization, whether by employees, contractors or guests, remains a serious problem that data loss prevention (DLP) products seek to address.
  • The long arm of the tweet

    Posted August 9, 2012 - 8:00 am

    The role of social media in law enforcement is significant and growing. According to a new survey, 80% of law enforcement personnel use social media to conduct investigations.
  • Don't buy that security software!

    Posted July 26, 2012 - 8:00 am

    First check out these 12 excellent free, open source personal security apps for PCs and mobile devices (and one for dirt cheap).
  • Webcast

    Webroot System Analyzer

    Posted July 24, 2012 - 4:16 pm

    Webroot System Analyzer looks inside a problem system and gives you a quick assessment plus a detailed report on all aspects of hardware, OS and installed applications-in less than 2 minutes.
  • White Paper

    PassMark: Webroot SecureAnywhere Endpoint Protection Cloud vs. Seven Traditional Endpoint Security Products - Endpoint Security Performance Benchmark

    Posted July 23, 2012 - 6:16 pm

    PassMark Software conducted performance testing on eight security software products to compare the performance impact of Webroot's SecureAnywhere Endpoint Protection Cloud. Their report represents the results of performance benchmark testing using 10 key performance metrics.
  • White Paper

    Doris Inc. - IT administrator Saves Engineering Firm More than 200 Hours a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection

    Posted July 23, 2012 - 6:16 pm

    Unhappy with their security solution, they chose Webroot. Their deployment of SecureAnywhere Business Endpoint Protection saved the firm more than 200 hour per week and dramatically improved security.
  • White Paper

    Webroot SecureAnywhere Business - Endpoint Protection: Security and Virtualization

    Posted July 23, 2012 - 6:16 pm

    This paper examines different endpoint security methods for physical, virtual and cloud-based systems with a goal of providing optimal performance, protection and manageability.
  • White Paper

    Bloor: Cloud-Delivered Endpoint Security

    Posted July 23, 2012 - 6:16 pm

    Bloor dives into why cloud-based endpoint security is a far better alternative to traditional defense measures providing superior data protection, streamlined management, ensured compliance and lower security costs.
  • White Paper

    Webroot SecureAnywhere Endpoint Protection

    Posted July 23, 2012 - 6:16 pm

    Webroot SecureAnywhere Endpoint Protection combines innovative file pattern and behavior recognition technology with the power of the cloud to effectively stop known threats and prevent zero-day attacks all without the hassle of managing signature file updates.
  • White Paper

    Fact Sheet: Webroot Intelligent Network

    Posted July 23, 2012 - 6:16 pm

    Webroot Intelligent Network (WIN) integrates billions of pieces of information from multiple sources to create the world's largest malware detection net. Get the facts on how WIN is different from other cloud-based anti-virus solutions.
  • Webcast

    SecureAnywhere Business Endpoint Protection

    Posted July 23, 2012 - 6:15 pm

    Traditional solutions have been failing us since the 90s. See how Webroot is changing endpoint data protection with a new way of looking at security that is 30x faster than leading solutions at a fraction of the footprint. Download a free-trial in just six seconds.
  • Hacked drones could become missiles over U.S., researchers warn

    Posted June 28, 2012 - 6:14 pm

    The FAA's plan to allow as many as 30,000 observation drones to fly over the U.S. by 2015 could be catastrophic, especially the big planes FedEx plans to use to cut delivery costs. GPS spoofing can confuse drones and give attackers "a missile" to direct as a weapon, not an instrument of rescue or law enforcement, researcher warns.
  • New tools finally give users a way to enforce their own privacy

    Posted June 28, 2012 - 12:45 pm

    A rush of new products are designed to add "military grade" encryption to email, text messages and corporate data. None are perfect; none are revolutionary. Collectively they represent acceptance, for the first time, that users should have tools to keep their data secure even from their own employers and tech suppliers.
  • Phil Zimmermann's followup to PGP: Silent Circle

    Posted June 27, 2012 - 10:49 am

    PGP creator to release encryption service for iPhone and iPad calls, texts, and emails.
  • MI-5 chief warns of "astonishing," industrial-scale state-sponsored cybercrime

    Posted June 26, 2012 - 4:32 pm

    The head of the British MI-5 counter-intelligence agency warned yesterday that state-sponsored efforts at cyberattacks had escalated into industrial-scale events involving thousands of people. Who is leading the charge? Superpowers like his government's closest ally.
  • White Paper

    Malware Security Report: Protecting Your Business, Customers, and the Bottom Line

    Posted June 26, 2012 - 10:45 am

    Protect your business and customers by understanding the threat from malware and how it can impact your online business. This paper highlights how attackers distribute malware, what the profit motivations are for modern criminals, and how cybercriminals have developed attack techniques that allow malware to infect thousands of web sites at once.
  • White Paper

    Protecting Users From Firesheep and other Sidejacking Attacks with SSL

    Posted June 26, 2012 - 10:45 am

    The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Firesheep allows an attacker connected to the local network to monitor the web sessions of other users on that network. As experts proclaimed in reaction to Firesheep, the best solution to the problem is to use TLS/SSL for all connections to web sites, including the home page. Download Protecting Users From Firesheep and other Sidejacking Attacks with SSL to learn how to avoid these attacks.
  • Malware raids bank accounts with no warning to show what happened

    Posted June 20, 2012 - 12:38 pm

    The Zeus and SpyEye Trojans are pretty effective at stealing financial data from victims, but they're not good at actually raiding bank accounts without having to try to hide warning screens. New malware adds an Automatic Transfer System to let your Trojans move money from your bank accounts without bothering you for approvals or signatures or calls to 911.
  • Google finds 9,500 new threat sites per day

    Posted June 20, 2012 - 11:24 am

    On the fifth anniversary of its Safe Browsing initiative, Google has opened up about some of the risks it sees trending and what it's been doing about them. Mainly it warns users, many of whom ignore warnings about legitimate sites that have been compromised by malware.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Join today!

See more content
Ask a Question