Events & Conferences
Learn about upcoming events Webroot will be attending and view archives of past events.
- 288 Topics
- 182 Replies
[b]Is your mobile device secure?[/b] In an era of increased Bring Your Own Device acceptance, securing endpoints is becoming one of the toughest challenges in information security. Vulnerabilities in mobile services such as malicious code in applications or cloud backups are particularly worrying. Attend the BrightTALK Mobile Security Summit to learn how to secure your mobile devices, from establishing efficient corporate BYOD policies to malware protection and encryption. [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/1656iC60FF568F7610F01.png[/img] [u]Featured Webinar: Security in a BYOD World[/u] Presenters: Dr. Chenxi Wang, Forrester; [b]Darren Niller, Webroot[/b] Register here: [url=https://www.brighttalk.com/r/KrW]https://www.brighttalk.com/r/KrW[/url] BYOD is a reality and businesses need to build a security plan to protect their data. Dr. Chenxi Wang of Forrester discusses BYOD trends, challenges and recommendati
Webroot CEO, Dick Williams, will be speaking at the 15th Annual Needham Growth Conference for investors in New York, and you can have a virtual front-row seat via webcast. Mr. Williams will talk about cloud-based security as a service and how, with the rise of people bringing their own devices (BYOD) to work, the endpoint is the new business security perimeter. The Annual Needham Growth Conference gives institutional investors, private equity firms, and venture capitalists access to growth companies from a broad range of industries. By participating in the conference, growth companies like Webroot get fresh insights about the needs, trends and interests of investors and VCs. Dick’s presentation is slated for Tuesday, January 15, 2013 at 9 a.m. Eastern Time/7:00 MST/6:00 PST/14:00 GMT. The live webcast and (for those of you who are not early birds) replays of his talk will be available online. The official press release with additional information a
Webroot's George Anderson was recently interviewed by IT Security Pro about Webroot's new [url=http://www.webroot.com/En_US/business/mobile-protection/]SecureAnywhere Business Mobile Protection[/url]. Here are some highlights: [i] [/i] [i]“We’re very much cloud-based,”[/i] he said, adding that this does not mean the company has committed 100 per cent of its security resources into the cloud, since you always have to have some degree of security enabled locally, for the times when an Internet connection is not available. [i] [/i] [i]If someone is offline, he adds, then IT admins can set the security parameters of the mobile device very high, effectively locking down usage until such time as the device reconnects to the Internet and the cloud security platform.[/i] [i]In recent survey carried out by Webroot, he says, 57pc of respondents reported as that there is a significant security issue with the rise of Bring-Your-Own-Device (BYOD) in the enterprise.[
Hi all, Webroot will be at [url=http://bit.ly/TLRORA]IT Nation 2012[/url], a conference where over 1,500 IT professionals gather to discuss the latest technology trends and best practices. It starts tomorrow and goes through Saturday in Orlando, Florida. And because we're so confident in our SecureAnywhere Business Endpoint protection, we're doing a killer challenge! Click on the picture for the details! [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/838i6EBF99187616321B.png[/img]
This week is the RSA Europe conference this week in London. [b]Are you?[/b] Webroot's very own blog superstar, Dancho Danchev, is presenting on [b]"Cyber Jihad and Cyberterrorism"[/b] on Thursday, October 11th. A hot topic and Danchev provides some unique perspective. [url=http://blog.webroot.com/2012/10/08/upcoming-webroot-presentation-on-cyber-jihad-and-cyberterrorism-at-rsa-europe-2012/]Here is an overview of his presentation.[/url] If you're attending, be sure to stop by and say hello! See the full RSA agenda [url=http://www.rsaconference.com/events/2012/europe/agenda.htm?utm_source=Twitter&utm_medium=webpage&utm_campaign=EUAgenda]here[/url] and stay tuned in to the action by following [b]#RSAC[/b] on Twitter.
The [url=http://www.virusbtn.com/conference/vb2012/index]Virus Bullletin 2012 Conference[/url] is starting tomorrow. On Thursday, our Director of Threat Research, Grayson Milbourne, and our Senior Threat Research Analyst, Armando Orozco, will present best practices and research entitled, “Android Malware Exposed – An In-Depth Look at the Evolution of Android Malware.” The two of them will discuss the rapidly evolving world of Android malware and shed light on the various techniques used to exploit devices using the Android OS. They will also offer insight into methods to assist in the discovery of new malicious apps - a constant challenge with a rapidly growing and diverse app market space. From the speakers: [i]The world of malware targeting the Android OS is similar, yet very different from malware affecting Windows. This presentation will explore the rapidly evolving world of Android malware and shed light on the various techniques used to exploit
Leading experts will detail how replacing a traditional signature-based endpoint security solution cured headaches such as inaccurate reports, undetected infections, and lengthy scans that were slowing users' machines and making them unproductive for up to two hours a day. They will present new research on how cloud-based endpoint security solutions overcome many of the pain points of an aging signature-based model. [b] [/b] [b]Frost & Sullivan’s Stratecast analyst, Michael Suby,[/b] will present new research on the latest innovations in endpoint security. Attending this online event is essential for any IT professional trying to: [list] [*]Significantly improve protection against today’s rising cyber threat risks—including targeted attacks [*]Eliminate system crashes and other headaches stemming from signature updates [*]End complaints about AV scans slowing PCs to a crawl [*]Get back countless hours spent on reimaging machines[/list][b]Topics covered include:[/b][b] [/b] [
Is anybody here going to Comic-Con this year? Webroot will be there, and we're running a contest! There will be a street team handing out Webroot t-shirts. To participate, get your picture taken with a celebrity or fellow geeked-out fan and email the picture to us. Webroot will post the pics to Facebook (and maybe here too, just for fun). Get your friends to like your pictures. The more likes you have, the better your chances of winning some great prizes! [url=https://www.facebook.com/Webroot/app_345244332212011]Visit us on Facebook to see more![/url] [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/190i924A130A671995D3.jpg[/img] [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/182iC24CE2756E8FB49E.png[/img] [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/184iA89C9808C0CCC2D3.png[/img]
We asked the following question at last week's [url=http://bit.ly/JVP6nY]Live Friday[/url]: [b]"What is the top challenge you deal with in protecting your endpoints?"[/b] Here were the top 3 answers: [list=1] [*] Increasing breaches and infections [*] Poor system performance and productivity [*] Too much risk and uncertainty[/list]Do you agree? Don't miss any new questions, answers or solutions from industry peers. Join our next Live Friday, this Friday 2/22 at 10am PST. R[url=http://bit.ly/JVP6nY]egister here.[/url]
Attention all IT professionals and security leaders! Stop security software from stealing your time. Forget re-imaging of machines, massive downloads, and maintaining dedicated servers... We want to show you a much easier endpoint solution. (And by "we" I mean endpoint product experts, [url=https://community.webroot.com/member/profile?mid=56]brcoffey[/url].) [b]Join us for a free, 30-minute Live Friday interactive demo this Friday, June 1st - and EVERY Friday - at 10:00am (PDT).[/b] You’ll find out how Webroot® SecureAnywhere™ Business — Endpoint Protection gives you fastest, least disruptive and most effective business security. [url=http://www.webroot.com/En_US/business/land/livefridays.html]Sign up to attend this week's session.[/url] [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/114i0CC60F349429C56C.jpg[/img]
[b]Webroot is at InfoSec 2012 this week in London! [/b] Be sure to come by booth #G90 in London's Earls Court Exhibition Centre to hang out with the Webroot gang, see some demos and meet Webroot's lead blogger, Dancho Danchev! We also have a fun "Beat the Clock" contest running at the booth. If you can fold a paper airplane faster than our product installs, you win a prize! (And we'll even let you keep the paper airplane.) If you're at InfoSec and want to meet the Webroot team, send us a note and we'll hook you up with some swag. [img]http://community.webroot.com/t5/image/serverpage/image-id/27i6307D6D95A624AB3/image-size/large?v=mpbl-1&px=-1[/img]
While we think online communities are a great way to interact and stay in touch with our customers, next week we're taking a hands-on approach as well. We will be live, in person, full flesh and blood attending the RSA Conference at the Moscone Center in San Francisco, CA. Not only can you find many Webrooters attending the show (including all our lovely community moderators) at the Webroot booth or roaming through the conference isles, but we will also have a speaking session where we get down to the nitty gritty of how we find and stomp out Android malware. What would a conference be without a human-sized stress relief doll, a little old lady that speaks the [url=http://www.youtube.com/watch?v=qgervxMmoqA&list=UUfqdHh38_wniFjll7yWk16w&index=11&feature=plpp_video][i]real[/i] truth[/url] about traditional security and of course booth giveaways? Drop us a comment below if you're planning on attending and be on the lookout for more announcements with
Did you miss [url=http://community.webroot.com/t5/user/viewprofilepage/user-id/274]Grayson[/url] and Armando from our Threat Research team at RSA? No fear. You can download the podcast and hear how they're digging into Android apps to find the latest mobile malware. They'll even share where most of threats are coming from. [url=http://365.rsaconference.com/community/connect/blog/2012/01/17/rsac2012-podcast-ht2-303-cracking-open-the-phone-an-android-malware-automated-analysis-primer]http://365.rsaconference.com/community/connect/blog/2012/01/17/rsac2012-podcast-ht2-303-cracking-open-the-phone-an-android-malware-automated-analysis-primer[/url] Take a listen!
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.