Hi [[ session.user.profile.firstName ]]

Information Technology Security

  • Date
  • Rating
  • Views
  • Real-Time Multi-Vector Protection
    Real-Time Multi-Vector Protection Ryan Free Recorded: Jul 5 2017 2 mins
    Multi-vector protection from Webroot is the only way to secure your endpoints and users across all stages of a cyberattack in real time. Using advanced behavioral heuristics to identify and protect against never-before-seen threats, see how Webroot is the Smarter Cybersecurity™ solution.
  • Stopping Malware Before It Reaches Your Network
    Stopping Malware Before It Reaches Your Network Jonathan Barnett | Sales Engineer Recorded: May 30 2017 35 mins
    Malware defenses have typically been concentrated at the network edge and then at the endpoint layer. When so much business is now in the cloud and user Internet requests are resolved outside the network it’s time to manage and control at the cloud ‘domain’ layer too. This webinar looks at a simple, fast, highly effective and easy way to block most malware before it reaches your network and deliver more secure Internet access at the same time.
  • FAKE NEWS – Signatureless! File less! Next Generation! X-Generation!
    FAKE NEWS – Signatureless! File less! Next Generation! X-Generation! Tim Sheahen | Senior Manager Sales Recorded: Apr 18 2017 29 mins
    Frankly I’m confused (and I work in endpoint security). In many ways you shouldn’t have to care about the terminology a vendor is using, but when it’s used to confuse and obscure reality, then you do.

    What really matters is how effective is your endpoint security at stopping users and devices from being compromised? How many ways will it prevent attacks and how do they all add up in delivering high performance, multi-vector protection?

    In this BrightTalk webinar we will be calling it as we see it, dispelling the ambiguous words and techno-babble being used and focusing on the core requirements you should ask all endpoint vendors for?

    Finally, this webinar is not going to be a pitch. At Webroot we have never claimed, and are not claiming that we’re a magic ‘silver bullet’, and with five years of cloud-driven endpoint security we’re not the ‘Emperor’s New Clothes’ either.

    What we want you to come away from this webinar with is the ammunition to ask hard questions about your endpoint security that will help you make better endpoint security decisions, when you or your colleagues have to make them.

    We want you to recognize the FAKE NEWS in endpoint security for what it really is – BS.
  • 2017 Webroot Threat Brief
    2017 Webroot Threat Brief Tyler Moffitt | Senior Threat Research Analyst Recorded: Feb 23 2017 36 mins
    Get insights into the threat landscape.

    Presented by Tyler Moffitt, senior threat research analyst at Webroot, this webinar is based on data derived from the Webroot Threat Intelligence Platform, Webroot’s machine learning and contextual analysis engine.

    Comprised of millions of connected sensors and endpoints, in 2016 the Webroot Threat Intelligence Platform observed:

    •94% of malware and PUAs were seen only once
    •Approximately 1/3 of URLs were high risk
    •Zero-day phishing URLs doubled
    •And more…

    Get the insights you need to stay ahead of the malware curve in 2017.

    We hope you can join us for this live, educational session!
  • 2016 Malware Review and Top Threat Predictions for 2017
    2016 Malware Review and Top Threat Predictions for 2017 Tyler Moffitt | Senior Threat Research Analyst Recorded: Jan 24 2017 48 mins
    This presentation provides an overview of the threats against a wide range of organizations and individuals during 2016. This overview is based on research and analysis conducted by the Webroot Threat Research team. The report includes analysis of top ransomware variants, details on the changes to exploit kits, phishing detection statistics, insights into file reputation and encounter rates with malware and new information on the IoT environment. All data presented comes from Webroot’s Intelligence Network and was observed during 2016. We will also be looking forward into 2017 and making our predictions regarding the evolving threat landscape.
  • Smarter Cybersecurity™ solutions start with next-gen protection
    Smarter Cybersecurity™ solutions start with next-gen protection Shane Cooper | Senior Sales Engineer Recorded: Dec 8 2016 44 mins
    Discover the smarter way to protect endpoints.

    Today’s threats evolve at an alarming pace. That means cybersecurity and threat intelligence have to move even faster to help businesses stay secure against modern cyberattacks. Join us for in-depth technical demonstration of Webroot SecureAnywhere® Business Endpoint Protection to learn how Webroot works to safeguard your employees, clients, and data without adding complexity or slowing users down.
  • The 2016 Malware Awards
    The 2016 Malware Awards Tyler Moffitt | Senior Threat Research Analyst Recorded: Nov 22 2016 48 mins
    This webinar will provide expert insights on the latest cybercriminal activity and recognize the year's most innovative, dangerous, and pervasive malware. Specifically, we will be covering the latest developments and providing updates on Angler, Neutrino, CryptXXX, TeslaCrypt, Locky, Cerber, CryptoMix, and RaaS. Come learn about these developments and strategies to help secure your organization from ransomware and next-generation cyberthreats.
  • Defeating Polymorphic Phishing
    Defeating Polymorphic Phishing George Anderson | Director of Product Marketing Recorded: Oct 26 2016 41 mins
    Phishing has long been one on the most successful ways of compromising users and also organizations’ networks. This webinar looks at the state of Phishing today, recommends what people, processes and technology can do to minimize the risks. And discusses a new Real-Time Anti-Phishing solution that is defeating this highly effective compromise.
  • Ransomware (R)evolution
    Ransomware (R)evolution Tyler Moffitt | Senior Threat Research Analyst Recorded: Sep 22 2016 49 mins
    Over the past few years, malware authors have developed increasingly sophisticated and creative ways to infect endpoints. Encrypting ransomware is no longer merely an annoyance. It's a highly persistent and organized criminal activity in full deployment, with Ransomware-as-a-Service at its core. The damage from becoming a ransomware victim is considerable, and can even put organizations out of business.

    At Webroot, we believe it's possible to effectively protect enterprises and users, but only by understanding your adversary and the techniques they use for their attacks. In this webinar, Webroot's own Senior Threat Research Analyst, Tyler Moffitt, will offer expert insights into the past, current, and emerging encrypting ransomware variants--and how businesses can stay ahead.

Embed in website or blog