Hi [[ session.user.profile.firstName ]]

Increase ROI & Bandwidth with Full Endpoint Coverage

Do you currently deploy separate solutions for antimalware and antivirus protection? Wouldn’t it be nice if you only had to deploy and manage one solution to handle all your endpoint security needs? When you’re stuck managing multiple solutions, you also have to deal with the additional hassles of higher costs, poor productivity, reduced availability and uptime.

Join us as we address the challenges and frustrations admins typically face, and demonstrate how next generation cloud-based security can offer a simpler, more effective solution to managed endpoint protection.
Recorded Aug 28 2014 34 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bob Rowell, Director, Systems Engineers
Presentation preview: Increase ROI & Bandwidth with Full Endpoint Coverage

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Easiest and Most Effective Way to Secure Your Business Recorded: Nov 8 2017 37 mins
    Tim Sheahen | Senior Sales Manager
    The Webroot® Threat Intelligence Platform is a cloud-based architecture that classifies and scores 95% of the internet 3x per day.

    Comprised of millions of connected sensors and endpoints, in 2016 the Webroot Threat Intelligence Platform observed:

    •94% of malware and PUAs were seen only once
    •Approximately 1/3 of URLs were high risk
    •Zero-day phishing URLs doubled
    •And more…

    Discover the easiest and most effective way to secure your business with Webroot SecureAnywhere® Business Endpoint Protection.

    We hope you can join us for this live, educational session!
  • Ransomware Spotlight Recorded: Oct 19 2017 49 mins
    Tyler Moffitt | Senior Threat Reasearch Analyst
    Over the past few years, malware authors have developed increasingly sophisticated and creative ways to infect endpoints. Encrypting ransomware is no longer merely an annoyance. It's a highly persistent and organized criminal "business model" in full deployment, with new abilities to move laterally through networks and infect machines previously thought not possible to infect. The damage from becoming a ransomware victim is considerable, and can even put organizations out of business.

    At Webroot, we believe it's possible to effectively protect businesses and users, but only by understanding your adversary and the techniques they use for their attacks. In this webinar, Webroot's own Senior Threat Research Analyst, Tyler Moffitt, will offer expert insights into emerging encrypting ransomware variants--and how you can stay ahead.
  • WannaCry & NotPetya Deep Dive Recorded: Aug 15 2017 48 mins
    Tyler Moffitt | Senior Threat Research Analyst
    WannaCry and NotPetya have wreaked the most havoc seen by ransomware yet. Not only was it able to hit computers previously unsusceptible to ransomware by using NSA exploits, but it was also able to severely disrupt the infrastructure of nations like Ukraine and Health organization in the UK. Over 150 International Corporations ranging from car factories to container ships vessels had to halt in tracks to deal with this ransomware. In this Deep Dive presentation you will learn about these types of ransomware in depth and also learn how to keep your clients safe.

    Webinar highlights include:

    How Petya-based & WannaCry ransomware works and spreads
    The unpacked code analysis
    Other potential exploits and attack vectors to keep an eye on
    How you can protect your clients
  • Your Small Business Will Be Hacked - Because It Is Easy Recorded: Jul 25 2017 56 mins
    Sean Martin, ITSPmagazine | Rusty Sailors, LP3 | Russell Mosley, Dynaxys | Tom Caldwell, Webroot
    - Broadcast LIVE from Las Vegas during Black Hat 2017 -

    Small and medium businesses face countless threats, most of which have a human at their origin. These criminals, driven by financial gain, are essentially business owners – not unlike yourself – who are looking to spend as little money and as few resources as necessary to generate as much revenue as possible. Therefore, most cybercriminals target businesses that have a false sense of security.

    Why would a cybercriminal spend a fortune going after a Fortune 1,000 when they can spend a few bucks to crack a small business? Exactly!

    During this live webinar, we’ll explore the types of threats that small and medium businesses face and the business risk associated with these threats. It’s easier to get hacked than you think and it’s only a matter of time before it happens. Will your business be prepared? Are you doing everything you can to protect yourself beforehand?

    Knowing that perfection is not possible, our panel of experts will look at 4 key steps that small and medium businesses should take to reach a reasonable level of cybersecurity:

    - How to conduct an analysis to determine risk and the need to focus on cybersecurity within your business
    - How to assess the cost of a breach, a loss of information and the impact that a cybersecurity event can have on your customers and partners
    - How to create a plan to protect your systems, information, revenue and customers’ data
    - Best practices for guiding your implementation, from segmentation to employee access control policies to information protection controls

    Join us for an extremely informative session geared towards small and medium business owners and their IT staff.

    Sean Martin, CISSP, Editor-in-Chief, ITSPmagazine

    Rusty Sailors, President / CTO at LP3 and Chairman, Protecting Tomorrow
    Russell Mosley, Director, Infrastructure & Security, Dynaxys
    Tom Caldwell, Senior Director of Engineering at Webroot
  • Real-Time Multi-Vector Protection Recorded: Jul 5 2017 2 mins
    Ryan Free
    Multi-vector protection from Webroot is the only way to secure your endpoints and users across all stages of a cyberattack in real time. Using advanced behavioral heuristics to identify and protect against never-before-seen threats, see how Webroot is the Smarter Cybersecurity™ solution.
  • Stopping Malware Before It Reaches Your Network Recorded: May 30 2017 35 mins
    Jonathan Barnett | Sales Engineer
    Malware defenses have typically been concentrated at the network edge and then at the endpoint layer. When so much business is now in the cloud and user Internet requests are resolved outside the network it’s time to manage and control at the cloud ‘domain’ layer too. This webinar looks at a simple, fast, highly effective and easy way to block most malware before it reaches your network and deliver more secure Internet access at the same time.
  • FAKE NEWS – Signatureless! File less! Next Generation! X-Generation! Recorded: Apr 18 2017 29 mins
    Tim Sheahen | Senior Manager Sales
    Frankly I’m confused (and I work in endpoint security). In many ways you shouldn’t have to care about the terminology a vendor is using, but when it’s used to confuse and obscure reality, then you do.

    What really matters is how effective is your endpoint security at stopping users and devices from being compromised? How many ways will it prevent attacks and how do they all add up in delivering high performance, multi-vector protection?

    In this BrightTalk webinar we will be calling it as we see it, dispelling the ambiguous words and techno-babble being used and focusing on the core requirements you should ask all endpoint vendors for?

    Finally, this webinar is not going to be a pitch. At Webroot we have never claimed, and are not claiming that we’re a magic ‘silver bullet’, and with five years of cloud-driven endpoint security we’re not the ‘Emperor’s New Clothes’ either.

    What we want you to come away from this webinar with is the ammunition to ask hard questions about your endpoint security that will help you make better endpoint security decisions, when you or your colleagues have to make them.

    We want you to recognize the FAKE NEWS in endpoint security for what it really is – BS.
  • 2017 Webroot Threat Brief Recorded: Feb 23 2017 36 mins
    Tyler Moffitt | Senior Threat Research Analyst
    Get insights into the threat landscape.

    Presented by Tyler Moffitt, senior threat research analyst at Webroot, this webinar is based on data derived from the Webroot Threat Intelligence Platform, Webroot’s machine learning and contextual analysis engine.

    Comprised of millions of connected sensors and endpoints, in 2016 the Webroot Threat Intelligence Platform observed:

    •94% of malware and PUAs were seen only once
    •Approximately 1/3 of URLs were high risk
    •Zero-day phishing URLs doubled
    •And more…

    Get the insights you need to stay ahead of the malware curve in 2017.

    We hope you can join us for this live, educational session!
  • 8 Reasons Webroot is Smarter Recorded: Feb 7 2017 2 mins
    Recorded Video
    8 Reasons Webroot is Smarter
  • 2016 Malware Review and Top Threat Predictions for 2017 Recorded: Jan 24 2017 48 mins
    Tyler Moffitt | Senior Threat Research Analyst
    This presentation provides an overview of the threats against a wide range of organizations and individuals during 2016. This overview is based on research and analysis conducted by the Webroot Threat Research team. The report includes analysis of top ransomware variants, details on the changes to exploit kits, phishing detection statistics, insights into file reputation and encounter rates with malware and new information on the IoT environment. All data presented comes from Webroot’s Intelligence Network and was observed during 2016. We will also be looking forward into 2017 and making our predictions regarding the evolving threat landscape.
  • Smarter Cybersecurity™ solutions start with next-gen protection Recorded: Dec 8 2016 44 mins
    Shane Cooper | Senior Sales Engineer
    Discover the smarter way to protect endpoints.

    Today’s threats evolve at an alarming pace. That means cybersecurity and threat intelligence have to move even faster to help businesses stay secure against modern cyberattacks. Join us for in-depth technical demonstration of Webroot SecureAnywhere® Business Endpoint Protection to learn how Webroot works to safeguard your employees, clients, and data without adding complexity or slowing users down.
  • The 2016 Malware Awards Recorded: Nov 22 2016 48 mins
    Tyler Moffitt | Senior Threat Research Analyst
    This webinar will provide expert insights on the latest cybercriminal activity and recognize the year's most innovative, dangerous, and pervasive malware. Specifically, we will be covering the latest developments and providing updates on Angler, Neutrino, CryptXXX, TeslaCrypt, Locky, Cerber, CryptoMix, and RaaS. Come learn about these developments and strategies to help secure your organization from ransomware and next-generation cyberthreats.
  • Defeating Polymorphic Phishing Recorded: Oct 26 2016 41 mins
    George Anderson | Director of Product Marketing
    Phishing has long been one on the most successful ways of compromising users and also organizations’ networks. This webinar looks at the state of Phishing today, recommends what people, processes and technology can do to minimize the risks. And discusses a new Real-Time Anti-Phishing solution that is defeating this highly effective compromise.
  • Ransomware (R)evolution Recorded: Sep 22 2016 49 mins
    Tyler Moffitt | Senior Threat Research Analyst
    Over the past few years, malware authors have developed increasingly sophisticated and creative ways to infect endpoints. Encrypting ransomware is no longer merely an annoyance. It's a highly persistent and organized criminal activity in full deployment, with Ransomware-as-a-Service at its core. The damage from becoming a ransomware victim is considerable, and can even put organizations out of business.

    At Webroot, we believe it's possible to effectively protect enterprises and users, but only by understanding your adversary and the techniques they use for their attacks. In this webinar, Webroot's own Senior Threat Research Analyst, Tyler Moffitt, will offer expert insights into the past, current, and emerging encrypting ransomware variants--and how businesses can stay ahead.
  • 2016 Webroot Quarterly Threat Update Recorded: Aug 22 2016 48 mins
    Tyler Moffitt | Security Threat Research Analyst
    According to the latest annual Webroot Threat Brief, 97% of malware is unique to a specific endpoint, rendering static, signature-database security virtually useless. In fact, many attacks are staged, delivered, and terminated within a matter of hours, or even minutes, having harvested user credentials and other sensitive information. With the rising popularity of polymorphism and other trends, it is more crucial than ever that organizations strengthen their security postures with next-generation endpoint protection and real-time, highly accurate threat intelligence. Join this webinar for an in-depth discussion of the most recent quarter’s malware stats and trends, and how businesses can leverage this data to keep themselves, their users, and their customers safe from advanced attacks.
  • Cloud security best practices for defending against APTs Recorded: May 31 2016 43 mins
    Tyler Moffitt | Senior Threat Research Analyst
    Year over year, newer and more inventive social-engineering techniques, such as watering hole attacks and spear phishing, are combined with malware attacks to trick users into handing over their personal information. Traditional security solutions are unable to keep up with these new threats and provide effective solutions. By using big data analytics and security intelligence, a Security-as-a-Service platform provides real-time protection to millions of end users daily. This will define the next generation of cloud-based threat identification and advanced persistent threat prevention by leveraging collective cloud-hosted intelligence to offer up-to-the-minute protection—both on the web and across all device platforms.

    Attendees will leave this presentation with:
    • An overview of the common threats and methods used to perform attacks.
    • A summary of the impact such threats bring to both users and businesses.
    • A better understanding of the challenges and benefits of deploying a cloud-based security solution.
  • The Threat Landscape of Today and Tomorrow Recorded: Apr 12 2016 48 mins
    Tyler Moffitt, Sr Threat Research Analyst at Webroot, Inc.
    Today's advanced malware is increasingly difficult to remove and often even harder to detect in the first place. In this presentation, we examine the modern threat landscape and discuss the shortcomings of traditional antivirus; as well as how organizations can stay ahead of the malware curve. Malware authors aren't too concerned about what your traditional AV is capable of blocking since they've formed reliable tactics to circumvent that protection. Either through social engineering or advanced evasive tactics, traditional antivirus technology is fighting an uphill battle to defend against it. Learn about highlights and revelations from Blackhat 2015; specifically about the 1.4 million Chrysler vehicle hack, how windows software update services can be hacked, the future of biometrics, and the progress encrypting ransomware. We also will talk about updates on law enforcement's attempts to catch cybercriminals. We will also discuss the startling trends we've seen from phishing attacks and mobile malware and what it means for an end user.
  • Today’s Threats and What They Mean for Tomorrow - 2016 Webroot Threat Brief Recorded: Mar 16 2016 47 mins
    Grayson Milbourne, Security Intelligence Director at Webroot, Inc.
    2015 was yet another record setting year in the world of Internet security. More malware, malicious apps, websites, IP’s and phishing sites were discovered than in any previous year. At the same time, attacks on businesses and individuals continue to increase at an alarming rate.

    This presentation will look at data from Webroot’s 2016 Threat Brief and examine threat trends and draw comparisons to data from Webroot’s 2015 Threat Brief. Most notable is the near complete utilization of polymorphic distribution models for malware whereby over 97% of infections today are intentionally unique for each infected system. Attend to learn about the impacts of this strategy as well as many other aspects of the constantly evolving threat landscape.
  • What MSPs Really Need and Want from an Endpoint Security Vendor Recorded: Feb 18 2016 49 mins
    Andrew Bagnato, LabTech Technical Account Manager at Webroot, Inc.
    Today’s MSPs face a world full of malware, and not many options when it comes to productive and profitable endpoint security. Join us as we dive into the wants, needs and challenges of MSPs, and how Webroot SecureAnywhere Business Endpoint Protection uses a smarter approach to address these pain points. During this webinar you will learn how endpoint security can be profitable for MSPs with the following features:

    •Real time threat intelligence
    •Detection with a 99.7%+ efficacy
    •Automatic remediation
    •Multi-tenant cloud based management console
  • Crypto Ransomware: What You Really Need to Know Recorded: Jan 19 2016 47 mins
    George Anderson, Director Product Marketing and Tyler Moffitt, Senior Threat Research Analyst
    Due to the ever-changing nature of the Crypto* family and other ransomware, the sad truth is that no vendor can guarantee 100% protection. But, between advanced defenses with heuristic detection and a solid cybersecurity best practices strategy, it is possible to protect your business and data from these insidious threats.

    This webinar will examine:
    » How ransomware is developed, and who the newest players are
    » Why ransomware is so good at getting around the usual defenses
    » Your best chance at beating the threat (and minimizing the impact in the case that you don’t)
Intelligent Cybersecurity
Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe. Our smarter approach harnesses the power of cloud-based collective threat intelligence derived from millions of real-world devices to stop threats in real time and help secure the connected world. Our award-winning SecureAnywhere® endpoint solutions and BrightCloud® Threat Intelligence Services protect tens of millions of devices across businesses, home users, and the Internet of Things. Trusted and integrated by market-leading companies, including Cisco, F5 Networks, Aruba, Palo Alto Networks, A10 Networks, and more, Webroot is headquartered in Colorado and operates globally across North America, Europe, and Asia. Discover Smarter Cybersecurity™ solutions at www.webroot.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Increase ROI & Bandwidth with Full Endpoint Coverage
  • Live at: Aug 28 2014 5:00 pm
  • Presented by: Bob Rowell, Director, Systems Engineers
  • From:
Your email has been sent.
or close