Webroot
Edit

Webroot

https://www.webroot.com/us/en/
Last activity: 11.06.2024
Active
Categories: DataHardwareHomeNetworksSecurityServiceSoftwareTime
Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe. Our smarter approach harnesses the power of cloud-based collective threat intelligence derived from millions of real-world devices to stop threats in real time and help secure the connected world.
Likes
114.29K
Website visits
766.4K /mo.
Mentions
115
Location: United States, Colorado, Broomfield
Employees: 201-500
Phone: +1 800-772-9383
Founded date: 1997

Investors 5

Mentions in press and media 115

DateTitleDescription
11.06.2024KnowBe4 enhances platform with PhishER Plus Threat IntelKnowBe4, renowned for providing the world’s largest platform for security awareness training and simulated phishing, has announced a significant enhancement to its services. The company has introduced PhishER Plus Threat Intel, a new featur...
07.03.2024Кто витает в облаках, или Как хакеры атакуют MSP-провайдеровДопустим, вы решили грабить банки. На дворе 2024-й и вы не спали в криокамере 50 лет, поэтому вряд ли пойдете искать револьвер и чулок на голову. Самый логичный путь — стать киберпреступником (или одуматься). Но можно пойти еще дальше — ата...
17.12.2023Holiday shopping safety: FIVE tips for secure online shoppingHere are online shopping tips to make sure your payments are secure.Photo: Tumisu/PIXABAY In the midst of the festive season hustle and bustle, online shopping and traditional malls seize the spotlight, attracting crowds in search of holida...
20.02.2023Zero trust, XDR prominent in Gartner’s Hype Cycle for Endpoint SecurityEvery enterprise is in an endpoint security arms race. Attackers adapt their tactics faster than the most advanced security teams can react. One of the most compelling insights from comparing successive editions of Gartner’s Hype Cycle for ...
27.01.202310 steps every business can take to avoid a cybersecurity breachCheck out all the on-demand sessions from the Intelligent Security Summit here. Businesses that survive cyberattacks understand that breaches are inevitable. That’s a strong motivator to make cyber-resilience and business recovery a core pa...
13.12.2022Why the manufacturing sector must make zero trust a top priority in 2023Check out all the on-demand sessions from the Intelligent Security Summit here. By making zero trust a high priority in 2023, manufacturers can close the IT and operational technology (OT) gaps that keep them open to attack. Despite million...
23.11.2022Where CISOs are getting quick zero-trust wins today to save tomorrow’s budgetsCheck out the on-demand sessions from the Low-Code/No-Code Summit to learn how to successfully innovate and achieve efficiency by upskilling and scaling citizen developers. Watch now. To shield their budgets from further cuts, CISOs are goi...
15.11.2022The manufacturing industry’s security epidemic needs a zero-trust cureThis article is part of a VB special issue. Read the full series here: Zero trust: The new security paradigm. Manufacturers’ tech stacks and industrial control systems (ICS) were designed to deliver speed and transaction efficiency first, w...
24.10.2022How self-healing endpoints are a solution to identities under siegeRegister now for your free virtual pass to the Low-Code/No-Code Summit this November 9. Hear from executives from Service Now, Credit Karma, Stitch Fix, Appian, and more. Learn more. >>Don’t miss our special issue: How Data Privacy Is...
08.10.2022How Shadow-Banned Influencers Can Lift Their BanShare Tweet Share Share Email Have you noticed lately that life on your social media accounts is somewhat slower than it once was? Perhaps you aren’t getting as many comments on your posts as you typically do; maybe you have fewer new follo...
Show more

Reviews 0

Sign up to leave a review

Sign up Log In