This quarter, Webroot CTO Hal Lonas explains how you can gauge the real value of threat intelligence in his informative white paper. You can also hear from a leading security vendor who chose to partner with Webroot on the criteria he looked for when researching threat intelligence providers. Additionally, we’ve included a checklist for vetting a threat intelligence solution during the Proof of Concept process, as well as insights from Webroot team members on the key technology trends they observed at the 2018 RSA Conference. And, for anyone who missed our Annual Threat Report, you can watch a quick video to get our findings from the last year.
What Makes Real Threat Intelligence
Hear from Hal Lonas, Webroot CTO, about real threat intelligence, what it means, what to look for when selecting a threat intelligence solution, and how to cut through the confusion when every vendor is slinging the same buzzwords.
Straight from an Expert: How to Evaluate Threat Intelligence Vendors
Finding the right threat intelligence solution and vendor partner can be a big challenge. Hear from industry expert Madhu Reddy, principal product manager at F5 Networks, as he provides his recommendations on what to look for.
Proof of Concept Checklist
Review the Three Simple Steps to Success for integrating threat intelligence with this guideline document on the Proof of Concept process.
RSA 2018: Clearing a Path for More Conversation and Context
The 2018 RSA Conference was the biggest yet! Our team got together to discuss their observations from the showroom floor, and share a glimpse into the future of cybersecurity.
Webroot 2018 Threat Report Infographic Video
This infographic video offers a quick overview of the most striking statistics and highlights from the 2018 Webroot Threat Report. Watch or share this handy video, or get a complete breakdown of all the numbers in the full report.