Press Room

In the News!

July 2014

7.30.14 CRN │ Webroot Aims To Attract VARs to SaaS Endpoint Security
Webroot made a complete transition to a channel sales model over the last year, establishing a global base of more than 1,200 resellers to grow its presence in the small and midsize market, said David Bennett, vice president of worldwide consumer and SMB sales. The newly unveiled channel program adds support tools and features to help resellers getting established with the vendor to deliver software trails, marketing materials and create security services around the cloud-based platform, Bennett said.

Read more Open

7.27.14 CIO Insight │ Missing in Action: BYOD Security
Incredibly, studies show that as many as 80 percent of companies lack this critical component. This includes informing employees about ways people inadvertently share or expose important data and information. Finally, there's a dire need for clear policies and, as the Webroot report suggests, a BYOD Bill of Rights that acknowledges employee concerns and allows them to provide input. A 2013 Acronis survey with Ponemon Institute found that 60 percent of firms lack a personal device policy.

Read more Open

7.26.14 PC Magazine │ Unwanted Apps Pretend to be Entertainment, Gaming Apps
About 12 percent of the more than 548,000 Android apps analyzed by Webroot in June were considered "unwanted." Webroot's monthly analysis makes it amply clear that potentially unwanted apps lurk everywhere. As always, check what permissions your apps are asking for before installing, and check the developer to make sure the title is legitimate. Download apps only from Google Play, and keep an eye out for what permissions the app will request.

Read more Open

7.25.14 SearchITChannel │ Webroot redesigns reseller program; ASCII Group expands forum
In this channel news roundup, Webroot doubles-down on its channel commitment, launching a redesigned partner program for resellers. Cloud-based, real-time Internet threat detection company Webroot launched its redesigned Webroot Channel Edge Reseller Program this week. The company said the program advances its commitment to the channel, which has driven year-over-year growth in the small and medium-size business market segment.

Read more Open

7.24.14 Fortune │ Showdown at the B.Y.O.D. corral
Though BYOD programs were instituted to ease tensions between employees and their companies, it turns out there’s still plenty to go around, particularly when it comes to security and privacy. Almost half of American workers said they would stop using their personal devices for business if their employer required them to install a specified security app, according to a July report from Harris Interactive, a market research firm, and Webroot, a cyber security company.

Read more Open

7.14.14 ITBusinessEdge │ Employers, Employees Still Not on Same Page About BYOD
If you read this blog or IT Business Edge regularly (and thank you for doing so!), I assume that you care about network security, emerging technologies, and the intersection between the two issues. But it seems like you are in the minority, at least within the workplace. Oh, we all love our technologies and gadgets and whatever will make our work life more efficient and productive. Security, though, remains elusive. This is especially true in Bring Your Own Device (BYOD).

Read more Open

7.11.14 Computerworld │ There's still a security disconnect on BYOD
Corporate employees -- and to a lesser extent IT managers -- are taking a surprisingly lax approach towards security issues raised by the business use of personally owned smartphones and other mobiles devices, according to two surveys. Enterprise users were found to be deeply suspicious of any IT effort to implement security controls on their devices. In fact, many said they would choose not to bring personal devices to the workplace if employers planned to install security software on them.

Read more Open

June 2014

06.26.14 Bank Info Security │ Improving Cyberthreat Communication
A common framework for communicating threats and alerts among security vendors' systems would bolster efforts to protect consumers' information, says David Duncan of Webroot. “Communicating threats and alerts across disparate devices that are used in the security infrastructure to help build a better, consistent understanding of these new [threats] we're encountering that are behavioral based ... is very critical," he says.

Read more Open

06.24.14 MSP Mentor │ Webroot's BrightCloud Security Services: Here's What MSPs Need to Know
Webroot, a cloud security software-as-a-service (SaaS) provider, has unveiled new enterprise-class threat intelligence services. The new BrightCloud Security Services for Enterprise are designed to provide threat intelligence through integration with popular network security and management platforms, according to the company.

Read more Open

06.23.14 IT World │ Endpoint security demands organizational changes
Wow, it's no wonder why some have declared that endpoint security software is "dead." Negative opinions like these have put leading security firms like Kaspersky, McAfee, Sophos, Symantec, Trend Micro, and Webroot on the defensive and opened the door for endpoint antimalware upstarts like Bromium, Cisco/Sourcefire, Cylance, Crowdstrike, IBM, Invincea, Malwarebytes, and Triumfant.

Read more Open

06.05.14 PC Magazine │ A Year of Snowden Revelations: What Has Changed?
The pace of revelations has slowed over the past couple months, but no one thinks we are done. "While the initial shock has diminished, the fundamental trust between businesses and their customers has certainly been challenged by the allegations of cooperation between government agencies and some very well-known technology companies," said Dick Williams, CEO of Webroot.

Read more Open

06.04.14 Techday │ Webroot: Evolutions in endpoint security
The threat landscape has been rapidly evolving over the past few years, largely driven by an expansive and mature cybercrime-as-a-service (CaaS) ecosystem. Services range from rapid trojan development, access to infected PCs and C&C hosting, all the way to the liquidation of stolen information.

Read more Open

06.02.14 MSPMentor │ Webroot Announces New ConnectWise, LabTech Software Integrations
Webroot, an Internet threat protection provider, today announced new integrations with ConnectWise's professional services automation (PSA) software and LabTech Software's remote monitoring and management (RMM) platform. Webroot's BrightCloud security intelligence platform and SecureAnywhere products provide real-time Internet threat detection for businesses, consumers and enterprises.

Read more Open

May 2014

05.21.14 USA Today │ Experts: Consumers have to protect themselves online
Every day brings another story about a sophisticated computer hacking operation. Wednesday it was eBay announcing a database of user passwords had been breached. "Hackers today are not just two guys in a dorm room who are trying to goof on you. They're well-funded, well-organized criminal organizations whose intent is financial gain," said Michael Malloy.

Read more Open

05.21.14 CIO │ BYOD Widening Employee-Employer Trust Gap, Survey Finds
If your employer told you to install a security app on your personal smartphone or tablet, would you? This question was posed to more than 2,000 employees in the United States, as part of a Webroot-commissioned Harris Interactive survey.

Read more Open

05.21.14 USA Today │ Experts: Consumers have to protect themselves online
Every day brings another story about a sophisticated computer hacking operation. Wednesday it was eBay announcing a database of user passwords had been breached. "Hackers today are not just two guys in a dorm room who are trying to goof on you. They're well-funded, well-organized criminal organizations whose intent is financial gain," said Michael Malloy.

Read more Open

05.21.14 TechRepublic │ Months later, Ebay discloses personal details breach
Ebay disclosed overnight that it has suffered an attack earlier in the year that compromised customer's names, encrypted password, email address, physical address, phone number, and date of birth. "Although Ebay is still assessing the damage, the concern is the time between the breach and its public disclosure, possibly leaving users vulnerable for weeks," said Mike Malloy.

Read more Open

05.20.14 Fox News │ How to protect your computer form viruses and hackers
Among the top antivirus software include Symantec’s Norton Antivirus, McAfee, Kaspersky, Webroot and more. Like with the firewall software mentioned earlier, you might want to check on the most highly-rated program ahead of time.

Read more Open

05.20.14 Fierce Mobile IT │ BYOD Bill of Rights aims to close perceptions gap
A growing number of organizations are adopting, or at least condoning, bring-your-own-device practices, but there appears to be a growing disconnect between what employers want and what employees expect. The study looked at how employers and employees each view the elements and restrictions of a BYOD program.

Read more Open

05.19.14 PC Magazine │ Mobile Malware Not The Only Threat; Unwanted Apps Bad, Too
When it comes to mobile threats, most people can tell when an app is doing something bad. But a whole class of potentially unwanted applications—PUAs—are a little harder to figure out. They aren't malware, but they aren't harmless, either. Webroot researchers recently provided Security Watch with some insights on the types of apps available on Google Play.

Read more Open

05.06.14 Mobile Enterprise │ Attack of the Apps
Over the course of 10 years, Grayson Milbourne has watched the evolution of cyber threats move from the PC environment to the hands of near billions of mobile users. The director of security intelligence for Webroot says, “This is largely driven by user behavior—we are using our mobile devices much more than our traditional desktop environments. That’s definitely noticed by the cybercrime community and it follows the user activity.”

Read more Open

05.02.14 CNBC │ The anatomy of an Android smartphone cyberattack
Android's distribution network also is more complex. "Google has done a lot to address the distribution of updates by removing device manufacturers' and carriers' play into the distribution of updates," said Grayson Milbourne.

Read more Open

January 2014

01.08.14 Virtual Strategy Magazine │ Executive Viewpoint 2014 Prediction: TeleSign and Webroot
Developers are becoming more aware of secure app development practices and risky app behaviors to avoid. That said, some app developers will continue to seek new ways to generate revenue from building apps that may intrude on privacy.

Read more Open

01.03.14 PC Magazine│ 2014 Tech Predictions
Dick Williams, President and CEO of Webroot – In 2014 all of these smart devices, limitless social networks, and personal acquiescence will be used to an extra-ordinary extent to mine behaviors and identity with the aim of refining cyberattacks, cybercrime and cyber-espionage. As a result there will be some very high-profile compromises of individual, corporate and government data that will make Edward Snowden and the NSA seem benign in comparison. That will produce a privacy backlash that will spawn a host of new security services.

Read more Open

In the News