Events & Conferences
Learn about upcoming events Webroot will be attending and view archives of past events.
- 288 Topics
- 182 Replies
We've got a VAR Trends Webinar coming up in a few weeks that our VAR and MSP friends would probably find really interesting/worthwhile. Here are the details: [b]Over 1,000 VARs/MSPs Know The Secret to Profitable Security – Do You?[/b] November 19, 2014 | 11:00 AM AEST Presented by George Anderson, Director of Product Marketing, Webroot [b]We will be discussing: [/b] [list] [*]How VARS/MSPs can generate additional revenue by leveraging the power of cloud security [*]The ongoing challenges of the BYOD trend, and how to address them [*]How to make the transition to BYOD smoother for clients [/list][i]"When employees use personal devices for work, businesses have to give up a degree of control and trust employees to balance professional and personal use—and do so securely. This is where VARs and MSPs can play a vital role in bridging the gap between employee expectations and employer requirements for a successful BYOD rollout."[/i] &n
Business Solutions Webinar - Thursday Oct 9 at 11am MST - Using Mobile Security Creates Profit for MSPs
As an MSP you strive to protect ALL your clients and bring them new solutions. It’s no secret, mobile device usage is on the rise and threats are quickly catching up. In addition to cyber-attacks, mobile devices are highly vulnerable to theft and loss due to their size and portability. Be proactive. Generate additional revenue with Webroot and leverage the power of cloud security intelligence by offering mobile device protection with simple administration and centralized management. Keep your client’s data and mobile workforce safe with uncompromising protection against online threats. [url=https://event.webcasts.com/starthere.jsp?ei=1043371&sti=webroot]Register here.[/url]
We got a webinar coming up tomorrow for any folks interested in learning about our MSP options. Here's the topic description: As an MSP you strive to protect ALL your clients and bring them new solutions. It’s no secret, mobile device usage is on the rise and threats are quickly catching up. In addition to cyber-attacks, mobile devices are highly vulnerable to theft and loss due to their size and portability. Be proactive. Generate additional revenue with Webroot and leverage the power of cloud security intelligence by offering mobile device protection with simple administration and centralized management. Keep your client’s data and mobile workforce safe with uncompromising protection against online threats. [url=http://event.on24.com/r.htm?e=851721&s=1&k=FF432D1B6618C9FBAE2568BD375E4B92]Register here.[/url]
This should be a very good one! Given by [url=https://community.webroot.com/member/profile?mid=9060][user=9060][/user][/url] [b]Tyler Moffitt-Senior Threat Research Analyst, Webroot[/b] Encrypting ransomware is a key term in the title as just ransomware is broad and can include threats that are very different, easy to detect, and don't encrypt files at infection - the key differentiation point that gives these threats the upper hand against AV. The presentation is going to be on all the encrypting ransomwares we've seen thus far. It will cover in-depth features of each one and how malware authors made improvements as time went on. There is quite a few so it will be a full presentations worth (cryptolocker, dir-crypt, cryptowall, cryptodefense, zero-locker, critroni, synolocker, cryptographic locker). I'll show from start to finish of an infection and what a user will experience and will highlight social engineering tactics along with the methods of payment circumventing
We've got a team from Webroot at Synnex this week, which is being hosted in Greenville, SC. If you're there, please stop by and say hello! Here's what they look like so you can recognize them: [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/16247iBAF4299B12B253AD.jpg[/img] If you haven't already downloaded their mobile app, you can get it here: [list] [*][url=https://itunes.apple.com/us/app/synnex-nc-2014-for-ipad/id717011339?ls=1&mt=8]iPad[/url] [*][url=https://itunes.apple.com/us/app/synnex-national-conference/id717011230?ls=1&mt=8]iPhone[/url] [*][url=https://play.google.com/store/apps/details?id=com.synnex.nc]Android[/url] [*][url=http://www.windowsphone.com/s?appid=6d9d37dc-390d-4647-8b0f-18f2b8ed8770]Win Phone[/url] [*][url=http://apps.microsoft.com/windows/en-us/app/nc2014/34cd6d0a-02ca-4eeb-8e73-c2fd99196328]Win Tablet[/url][/list]
Richard and I were at SpiceWorld in Austin, TX last week. It was a lot of fun, but also very exhausting :) Our booth involved everyone building a Lego city collaboratively, and it turned out smashingly. Afterwards some SpiceHeads came to visit us in Colorado so I took them to Webroot HQ, and saw the sights of Boulder and Denver. After more than a solid week of partying, I'm ready to rest up for quite some time! Here's Scott Alan Miller, famous SpiceHead, getting icewater poured on him to cool off at the welcome party: [video]https://www.youtube.com/watch?v=NeJLB303wmU[/video] When we got back to Colorado, Grey and I took the British visitors Huw, Ivan and Simon clay shooting. We managed to "acquire" a golf ball from the SpiceWorld Unofficial Putt-Putt Golf Tournament, and tried to destroy it: [video]https://www.youtube.com/watch?v=0z6DvWXIl9c[/video] Here's me shooting the 12-gauge shotgun, which had quite a kick to it, and
Today (25th), Webroot is attending the Managed Services & Hosting Summit at the Pullman Hotel St. Pancras in London, UK. The summit is an excellent opportunity for members of the industry to meet and discuss business opportunities and share ideas on how to adapt to the future. For more information about the summit, follow the link below: [url=http://www.mshsummit.com/]http://www.mshsummit.com/[/url] [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/16043i66D278A21844AA55.jpg[/img] Webroot's Dan Gadd & Will Fletcher manning the Webroot stand. Snazzy suits, gentlemen!
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/15823i1C966C09EC1BF3AA.gif[/img] Some of you may be in the know, and others may be curious to where the glorious Fro and his trust bearded sidekick might be, so here is a little teaser for you. Do you know where Nic and I are this week? Still guessing? Need another hint? Well..... We are in Austin, Texas for SpiceWorld 2014. Some of you may know about Spiceworks and the community over there, where Nic and I help out other users and potential users of Webroot. It is also the community Nic used to manage before bringing his awesomeness to Webroot. But he and I are here, along with a great team, to conitnue to spread the word of Webroot and all the security solutions we can provide. We will be posting up photos throughout the week in this thread for everyone to enjoy. The event officially starts in 2 hours, and we could
[img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/15713iE86F03325DEB65DA.png[/img] On Friday October 3rd at 11am CET, Webroot will be co-hosting a Webinar with French company IPSteel on the topic of mobile threats on the modern world. The Webinar, which will be in French, will explore the various security challeges faced by companies in the modern business landscape, with more and more companies using mobile devices to conduct their commercial affairs. Here is the link for more information: [url=http://www.webikeo.fr/webinar/les-nouvelles-menaces-dans-le-monde-mobile-2/]http://www.webikeo.fr/webinar/les-nouvelles-menaces-dans-le-monde-mobile-2/[/url]
We've got this webinar coming up this week: Customers are looking for ways to increase their IT prowess without increasing their IT spend. VARs that are holding on to the traditional hardware, break/fix model of business soon will find themselves left behind by customers who need 24/7 support from a reliable services provider. In this webinar we'll discuss how you can evolve your business into a services-based model that can increase your customer base and your monthly revenue: - Why the traditional VAR model no longer is relevant - How service providers are positioning themselves as the go-to source for all things IT - What services every service provider must offer Webroot will be giving away one Jawbone Jambox Black Diamond (Approximate Retail Value: $179.99 USD Please refer to the terms and conditions on our event blog on smbnation.com. If you want to be entered into the drawing, please be sure to include ALL INFORMATION on your registration. [url=https://www1.
The Garnter Security & Risk Management Summit in London is going on right now (September 8-9) and Webroot's a featured sponsor! Naturally, we have a booth. This year, we're showing people what their security is missing. Here's a pic of the booth activity: [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/15273i5A2A5E24151D6F6F.png[/img] Earlier today, our CTO Hal Lonas was part of a panel discussion on cybersecurity. First, some more specific information about the panel: Industry Panel: [b]How the Digital World Alters the IT Threat Landscape[/b] Description: [i]The digital world has gotten very real, very fast: every industry is being radically reshaped by digital opportunities and threats. Further, key Nexus of Forces technologies such as cloud, mobile, big data and analytics are revolutionizing how applications are built and secured. At this session, we will ask senior executives of some leading IT security companies to examine pr
We've got this webinar running twice this week, once on the 26th at 12pm MDT, and once on the 27th at 12pm MDT. Here's the description and the signup links: The bring-your-own-device movement has become ubiquitous, with companies of all sizes opening their networks to allow smartphones, tablets and other employee-owned mobile devices onto the network. But BYOD shouldn’t come at the expense of a company’s data security, and companies must take care of ensure their employees understand and adhere to company policies—which sometimes conflicts with what employees want. In this Channel Expert Hour webcast with Webroot, you’ll learn: [list] [*]How the notion of BYOD differs between employers and employees and how service providers can bridge the gap [*]What every company should consider when deciding whether to implement a BYOD policy [*]Why an Employee BYOD Bill of Rights is not only necessary but critical[/list][url=http://mspmentor.net/Webroot/getting-real-byod-matching-comp
As an Aussie myself, I can attest to the drinking prowess of my fellow countrymen and women. The team in Sydney took this photo - which of the three pictured do you think was able to put away the most beverages? [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/14745iD12A81187A6F58CC.jpg[/img]
If you're down under, or in that part of the world, we've got some events coming up for you to attend and meet Webroot folks: [b]GARTNER SECURITY AND RISK MANAGEMENT SUMMIT[/b] [b]25 – 26 AUGUST, SYDNEY ([/b]Hilton Hotel, 488 George Street) [url=http://www.gartner.com/technology/summits/apac/security/]http://www.gartner.com/technology/summits/apac/security/[/url] Gartner Security & Risk Management Summit 2014 helps you validate your security and risk management strategy, so you can see what needs to be improved, kept the same, or changed in your approach for a clear vision into the future. Don't let your organization remain vulnerable to attacks. Join us this year so you can become a more successful security and risk leader, and guide the enterprise quest for balance between security risk mitigation. Smart Risk — Balancing Security and Opportunity This year’s Gartner Security & Risk Management Summit shows you how to find the balance between enabling your organiza
Tue, Aug 19, 2014 10:00 AM - 11:00 AM MDT BYOD has the potential to be a source of tension with IT and the employer on one side and employees on the other. When employees use their own devices for work purposes, IT must necessarily give up a degree of control and employers must trust their employees to balance professional and personal time. When it works well, morale and productivity improve and businesses will save money. When it works poorly, though, it’s often security that suffers. This is where smart VARs and MSPs can play a vital role in bridging the gap between employee expectations and employer requirements for a successful BYOD rollout. Join our free webinar “Aligning Employer Needs with Employee Wants In a BYOD World”, in which you will: · Learn about the ongoing disconnect between employers and employees in terms of BYOD · Discover how the right software and services can help businesses deliver on the promise of BYOD and mitigate its challenges&nbs
Webinar Wed Aug 13th at 11am CT - Yin & Yang of BYOD: How MSPs Match Employee Wants with Company Needs
The bring-your-own-device movement is ubiquitous, now many companies allow employee-owned smartphones, tablets and other mobile devices onto the network. BYOD is convenient for employees, but it shouldn’t come at the expense of data security! To reduce risk, companies need to make their employees understand and follow to company policies – even if they conflict with what these workers want. In this webcast put on by experts at Webroot, you’ll learn: [list] [*]How the notion of BYOD differs between employers and employees [*]What your customers should consider when deciding on a BYOD policy [*]Why having an Employee BYOD Bill of Rights is critical [*]How MSPs can bridge the gap[/list][b]Webinar Bonus: [/b]One lucky attendee will win a GoPro Hero3+ Black Edition. [url=http://xact.spiceworks.com/u/gen/Aug2014/20140801114632_Q1_Webroot_Webinar_GoPro_Sweepstakes_Spiceworks__Aug13_14_.pdf]Terms and Conditions[/url]. [url=http://event.on24.com/eventRegi
If you weren't able to make the live broadcast, here's a recording for you to peruse at your leisure: [video]https://www.youtube.com/watch?v=ieOwqqF8adM[/video] We also have another live webinar on this topic happening on July 31st at 12pm MST. Sign up [url=https://event.webcasts.com/starthere.jsp?ei=1039318&sti=bsm]here[/url]!
This webinar is sponsored by The Channel Company and is titled: [b]Be the One-Stop IT Shop Your Customers Need[/b] Description: Value-added resellers may have made their mark selling hardware in years past, but savvy VARs are quickly shifting to services-based models to capitalize on new opportunities in the channel. While hardware and software can remain an important part of the business, customers are increasingly moving to software and platforms as a service, saving money and IT resources along the way. Fortunately, this plays to the strengths of VARs in terms of sourcing and system integration. Customers want a one-stop shop for all things IT so they can devote their energy to strategic growth instead of managing multiple service providers, hardware vendors, software licensing, security, and more. [url=https://event.on24.com/eventRegistration/EventLobbyServlet?target=registration.jsp&eventid=818690&sessionid=1&key=8014E5D6088571A5F7A5C25372278
We've got a webinar coming up on Tuesday: [b]Adopting a Services-Based Model for Success[/b] Description: In today's evolving IT market, services are playing a larger role as customers look for ways to increase their IT prowess without increasing their IT spend. VARs that are holding on to the traditional hardware, break/fix model of business soon will find themselves left behind by customers who need 24/7 support from a reliable services provider. In this Channel Expert Hour webcast, learn what you can do to evolve your business to a services-based model that can increase your customer base and your monthly revenue stream. You'll learn: [list] [*]Why the traditional VAR model no longer is relevant [*]How service providers are positioning themselves as the go-to source for all things IT [*]What services every service provider must offer[/list]Attendees automatically will be entered into a drawing for a [url=http://www.penton.com/webcasts/Webroot_samsung.pdf]Samsung G
We just got the video recording back from the Gartner folks from their Events on Demand website. Mike does a great job telling the story of the evolution of malware, and how today's malware requires a whole new approach. Check it out. [url=http://gartner.mediasite.com/Mediasite/Play/0d7c487cbd47421582fdf63ccdff26ba1d]http://gartner.mediasite.com/Mediasite/Play/0d7c487cbd47421582fdf63ccdff26ba1d[/url] You can see that video and others on the Gartner Events on Demand site [url=http://www.gartnereventsondemand.com/]here[/url].
As some of you may or may not know, the Gartner Security & Risk Management Summit in Washington D.C began yesterday. Below are some of the key takeaways from a busy Day 1. 1. The Security Industry is growing at a Compound Annual Growth Rate (CAGR) of 9%. Last year, UT was at $60.5 billion dollars. This year? $65.735 billion dollars. And in 2016, it's projected to grow to $85 billion. 2. Endpoint protection leads the way of 'Most actively deployed security technology' with 87%. Close behind is Web filtering/blocking with 86%, and Standalone Antivirus rounds of the top three with 84%. 3. The least deployed security technology is Mobile Device Management, with just 45%. 4. When it comes to the top technology customers plan to deploy in the next year, Mobile Device Management is leading the pack with 51% (see below). [list] [*]Mobile Device Management = 51% [*]Data Loss Prevention = 32% [*]Advanced Threat Detection/Prevention = 26% [*]Unified Threat Managem
[b]Come see us at Automation Nation 2014, June 2-4[/b] [b]Orlando, Florida at the Hilton Bonnet Creek[/b] Don’t miss out, you’ll want to see what Webroot and flying pigs have in common! We are proud to be a Diamond Sponsor at this year’s event, not to mention excited about the integrated Keynote presentation and breakout session happening during the conference. Don’t miss it! You’ll hear about how Webroot partners with service providers and MSPs to deliver highly effective security solutions that protect against sophisticated viruses and malware. Integrated with LabTech’s RM M, Webroot delivers cloud-driven protection that is: [list] [*]Easy to deploy [*]Smple to remotely manage [*]Competitively priced[/list]We understand that providing internet security software as a service comes with a unique set of challenges while augmenting existing services, generating new revenue streams and maintaining margins. [b][i] [/i][/b] [b][i]Find out why Pigs are Flying!
[list] [*]Rocky Mountain Information Security Conference, May 14-15, Colorado Convention Center, Denver [*]Event website: [url=http://rmisc.squarespace.com/]http://rmisc.squarespace.com/[/url][/list][list] [*]We are a Platinum sponsor! [*]Visit us at Booth #111 [*]Vendor track session, Thursday May 15, 9:25-10:25 pm, presented by Grayson Milbourne, Director of Security Intelligence[/list] Title: Paranoid Android – Addressing the Risks of Mobile Description: This presentation will look at the rapidly growing and evolving space of malicious Android applications. Various threat vectors will be analyzed and examples will show where the vast majority of malicious app encounters occur. In addition to an overview of the Android threat landscape, this presentation will talk about new technology aimed at protecting Android devices such as mobile application reputation. Additionally, four corners of mobile device security will be discussed as well as policy suggestions for bus
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.