@CloudExpo Authors: Elizabeth White, Carmen Gonzalez, Pat Romanski, Liz McMillan, Dana Gardner

News Feed Item

Webroot® Launches Mobile Security Solution for Businesses

Provides the Only Cloud-Based Single Pane of Glass for Managing both Mobile and Desktop Security in a Business Environment

BROOMFIELD, Colo., Nov. 13, 2012 /PRNewswire/ -- Webroot®, a leader in delivering Internet security as a service, today announced the launch of Webroot® SecureAnywhere™ Business – Mobile Protection, the only endpoint security solution to use a single, web-based administration console to secure mobile devices and PCs within a corporate environment . The newest member of this integrated Webroot SecureAnywhere Business platform of endpoint security solutions was developed specifically for small to medium businesses (SMB) that are looking for a mobile security solution that is easily deployable and manageable to answer to their security and protection needs.

(Photo: http://photos.prnewswire.com/prnh/20121113/LA11701)

(Logo: http://photos.prnewswire.com/prnh/20121016/LA94090LOGO)

Only Webroot uses a single cloud-based console to solve the distinct problem of managing the security of employee devices – something that more than 57 percent of recent survey respondents reported as a significant issue with the rise of Bring-Your-Own-Device (BYOD) in the enterprise. This web-based console also provides a view into an organization's desktop computers protected by Webroot SecureAnywhere Business – Endpoint Protection within the same view, a unique differentiator.

SecureAnywhere Business – Mobile Protection offers cloud-based security, over-the-air deployment and support for the most popular mobile platforms in the market – iOS and Android.  In addition, the solution delivers superior protection of corporate data against malware, lost devices and malicious websites and apps. 

"We developed this product specifically with the SMB market in mind, to provide a security option for smaller organizations that might not need a full mobile device management solution," said Mike Malloy, executive vice president of Webroot Products and Strategy. "The goal was always to ensure that IT administrators could support a broad range of devices from the same console – making the addition incredibly easy for our current customers and the switch incredibly logical for our future ones."

Along with simplified management, Webroot SecureAnywhere Business – Mobile Protection provides market-leading security capabilities to provide robust data protection against the unique threats to the mobile environment. Webroot provides advanced antimalware detection powered by the Webroot Intelligence Network. This scans all applications, files and SD cards in addition to providing multi-layered, real-time protection to alert users of potential threats and unsecured device settings. Lost device protection capabilities also provide administrators the ability to lock/unlock, wipe, locate and trigger a "scream" to help users find, recover or immobilize a lost device.

In addition to the many benefits already associated with SecureAnywhere Business -- Endpoint Protection, the mobile solution also includes:

Unified Management

  • Unified management from a single console for mobile devices and endpoints (PCs)
  • Cloud-based (SaaS) management and protection
  • Single point of support for Android and iOS devices as well as PCs

Market-Leading Protection

  • Advanced antimalware detection powered by Webroot Intelligence Network
  • Lost device protection
  • Secure web browsing – automatically blocks malicious or phishing websites a user tries to access from their mobile device
  • Call/SMS blocking – blocks unwanted calls or SMS messages in addition to blocking SMS messages that contain malicious URLs
  • Application inspector – scans apps and notifies the user of those that access sensitive data they shouldn't, track device location, send email or SMS messages, drain the battery, or cost money

Efficient Performance

  • Lightweight client, fast scans
  • Minimizes battery, bandwidth and memory consumption
  • Provides view of battery status and power usage by each application
  • Monitors applications that are accessing the network
  • Integrated Open Webroot technical support

Cloud-Based Security

  • No servers or on-premise infrastructure required, reducing capital expenditure and administrative costs
  • Infinitely scalable, unlimited number of devices can be managed from one account
  • Fast implementation and free feature upgrades included


    SecureAnywhere Business – Mobile Protection, which supports both the iOS and Android platforms, is available now for a FREE 30-day, no obligation trial that takes only minutes to set-up and deploy.

    About the Research

    Between July 30, 2012 and August 1, 2012, Webroot commissioned a study of endpoint and mobile security decision-makers in companies with 10 or more employees in the United States, United Kingdom, and Australia. Research Now provided respondents from their online panel of IT and business executives. A total of 741 people responded to an online survey hosted by Qualtrics. The margin of error for the study is +/- 3.6 percentage points at the 95 percent level of confidence.


    Webroot is committed to taking the misery out of Internet security with its suite of Webroot® SecureAnywhere offerings for consumers and businesses. Founded in 1997 and headquartered in Colorado, Webroot is the largest privately held security organization based in the United States. Webroot has operations across North America, Europe and the Asia Pacific region. For more information, visit http://www.webroot.com or call 800.772.9383. Read the Webroot Threat Blog: http://blog.webroot.com. Follow Webroot on Twitter: http://twitter.com/webroot.

    ©2012 Webroot Inc. All rights reserved. Webroot, SecureAnywhere, and Webroot SecureAnywhere are registered trademarks or trademarks of Webroot Inc. in the United States and other countries

    SOURCE Webroot Inc.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
In the 21st century, security on the Internet has become one of the most important issues. We hear more and more about cyber-attacks on the websites of large corporations, banks and even small businesses. When online we’re concerned not only for our own safety but also our privacy. We have to know that hackers usually start their preparation by investigating the private information of admins – the habits, interests, visited websites and so on. On the other hand, our own security is in danger bec...
"We've discovered that after shows 80% if leads that people get, 80% of the conversations end up on the show floor, meaning people forget about it, people forget who they talk to, people forget that there are actual business opportunities to be had here so we try to help out and keep the conversations going," explained Jeff Mesnik, Founder and President of ContentMX, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
Join Impiger for their featured webinar: ‘Cloud Computing: A Roadmap to Modern Software Delivery’ on November 10, 2016, at 12:00 pm CST. Very few companies have not experienced some impact to their IT delivery due to the evolution of cloud computing. This webinar is not about deciding whether you should entertain moving some or all of your IT to the cloud, but rather, a detailed look under the hood to help IT professionals understand how cloud adoption has evolved and what trends will impact th...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Enterprises have been using both Big Data and virtualization for years. Until recently, however, most enterprises have not combined the two. Big Data's demands for higher levels of performance, the ability to control quality-of-service (QoS), and the ability to adhere to SLAs have kept it on bare metal, apart from the modern data center cloud. With recent technology innovations, we've seen the advantages of bare metal erode to such a degree that the enhanced flexibility and reduced costs that cl...
Intelligent machines are here. Robots, self-driving cars, drones, bots and many IoT devices are becoming smarter with Machine Learning. In her session at @ThingsExpo, Sudha Jamthe, CEO of IoTDisruptions.com, will discuss the next wave of business disruption at the junction of IoT and AI, impacting many industries and set to change our lives, work and world as we know it.
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, will discuss the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They will also review two "free infrastruct...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
President Obama recently announced the launch of a new national awareness campaign to "encourage more Americans to move beyond passwords – adding an extra layer of security like a fingerprint or codes sent to your cellphone." The shift from single passwords to multi-factor authentication couldn’t be timelier or more strategic. This session will focus on why passwords alone are no longer effective, and why the time to act is now. In his session at 19th Cloud Expo, Chris Webber, security strateg...
As companies adopt the cloud-to-streamline workflow, deployment hasn’t been very seamless because of IT concerns surrounding security risks. The cloud offers many benefits, but protecting and securing information can be tricky across multiple cloud providers and remains IT’s overall responsibility. In his session at 19th Cloud Expo, Simon Bain, CEO of SearchYourCloud, will address security compliance issues associated with cloud applications and how document-level encryption is critical for sup...
In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, will be adding the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining sensor...
SYS-CON Events announced today that Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, will present at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Tintri VM-aware storage is the simplest for virtualized applications and cloud. Organizations including GE, Toyota, United Healthcare, NASA and 6 of the Fortune 15 have said “No to LUNs.” With Tintri they manag...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, will discuss how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team a...
Join IBM November 2 at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA, and learn how to go beyond multi-speed it to bring agility to traditional enterprise applications. Technology innovation is the driving force behind modern business and enterprises must respond by increasing the speed and efficiency of software delivery. The challenge is that existing enterprise applications are expensive to develop and difficult to modernize. This often results in what Gartner calls...
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It doe...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...