White Papers
- SORT BY:
- Most Recent
- Topic
- Sponsor
-
FEATURED WHITE PAPEREndpoint Protection: Trade In Signature Updates for the Cloud
Sponsor:Webroot SoftwareTopic:Cloud Computing, SecurityThis eBook describes the many capabilities that put cloud endpoint protection far ahead of competitive solutions.
Download Now -
WHITE PAPERObtain Manageable Endpoint, Mobile Device and Web Security
Sponsor:Webroot SoftwareTopic:Mobile & Wireless, SecurityMany of today's most dangerous threats, such as advanced persistent threats, don't rely on a single method of attack. Instead, they combine several. Relying on endpoint protection alone may not be enough to stop these complex threats.
Download Now -
WHITE PAPERHow Cloud Architecture and Behavior Recognition are changing Security
Sponsor:Webroot SoftwareTopic:Cloud Computing, SecurityThis white paper describes how new threats have stretched the capabilities of "fat client" security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses.
Download Now -
WHITE PAPERFaster Scans and Better Virus Detection - Can They Do That?
Sponsor:Webroot SoftwareTopic:Cloud Computing, SecurityThis FAQ tells you how to move beyond the old trade-off between anti-malware effectiveness and speed.
Download Now -
WHITE PAPERPassMark Ranks Leading Endpoint Protection Products
Sponsor:Webroot SoftwareTopic:Application Management, SecurityIn this recent PassMark report, discover how eight different endpoint security software products compare on a variety of metrics - from performance to malware protection - to help you determine which would work best in your organization.
Download Now -
WHITE PAPERManaging Web Security in an Increasingly Challenging Threat Landscape
Sponsor:Webroot SoftwareTopic:Networking, SecurityThis whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps.
Download Now -
WHITE PAPERWeb Threat Protection and Content Filtering in the Cloud
Sponsor:Webroot SoftwareTopic:Cloud Computing, VirtualizationThis Webroot whitepaper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service.
Download Now -
WHITE PAPERPhishing 2.0: Why phishing is back as the No. 1 web threat
Sponsor:Webroot SoftwareTopic:Internet, SecurityThis whitepaper discusses a major new threat vector - "phishing 2.0." While many IT professionals have become less concerned with phishing, a new generation of sophisticated phishing attacks now target businesses.
Download Now -
WHITE PAPERThe Wild, Wild West of Mobile Apps
Sponsor:Webroot SoftwareTopic:Application Management, Mobile & WirelessThis whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps.
Download Now -
WHITE PAPERWeb Threats Expose Businesses to Data Loss
Sponsor:Webroot SoftwareTopic:Networking, SecurityWebroot commissioned a study to gauge the prevalence of web-borne attacks, their consequences, and how IT pros are responding. Among the results, the vast majority of companies surveyed experienced one or more types of web-borne attacks in 2012.
Download Now















