Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Small Business

    Webroot Updates SecureAnywhere Mobile Protection Platform

    By
    Nathan Eddy
    -
    November 17, 2014
    Share
    Facebook
    Twitter
    Linkedin
      webroot and mobile security

      Cloud-based, real-time Internet threat detection specialist Webroot announced updates to its SecureAnywhere mobile protection platform for businesses.

      Webroot’s enhancements allow managed service providers (MSPs) and IT administrators insight into applications installed across all mobile devices under IT management.

      The latest edition of SecureAnywhere includes visibility into employees’ risky mobile behavior, including downloading third-party apps and using public WiFi networks.

      This enables enterprise-level visibility into mobile applications installed across businesses of all sizes, as well as insight into the specific security risks associated with those applications.

      “Businesses are challenged with developing an enforceable mobile security policy that requires security on all devices accessing corporate networks and data,” Cristian Novak, director of product management at Webroot, told eWEEK. “The variety of mobile devices, monitoring factory installed security applications and its settings, and operating systems requires a greater amount of IT support and resources to secure.”

      Novak noted that managing security from multiple consoles, if using different vendors for endpoint and mobile security, is often very challenging, and complex solutions, which may require on-premise deployments and complex non-security-based features, add additional layers of difficulties.

      The newest version of SecureAnywhere, which supports both iOS and Android devices, is available online, and existing customers will receive new product features automatically through the cloud.

      Webroot also offers an app for Apple iOS devices to provide security for iPhones and iPads and includes lost device protection for the more than 800 million iOS devices currently in use.

      Rather than rely on standard iOS device management capabilities to protect devices, Webroot’s app introduces additional functionality for lost device protection that allows customers to remotely locate an Apple mobile device, make the device scream and lock or wipe the device if it’s misplaced or stolen.

      The Webroot iOS app is also available for administrators to send download invitations to mobile device users they manage.

      Device Information Visibility, which will be available in early 2015, provides Webroot customers insight into the location and security status of the mobile devices they manage, without interrupting the user, including indicators of devices with security risks and whether a device has been compromised.

      The aim is to supply Webroot customers with the information to proactively minimize risks, maintain compliance with corporate bring-your-own-device (BYOD) policies and protect the multitude of mobile devices connected to the enterprise network.

      “Threats will continue to grow in 2015. According to research, 20 percent of all malware ever created appeared in 2013. Threats will be produced at a greater pace and with more complexity,” Novak said. “However, the tools to combat threats are improving—mobile app reputation, IP reputation, secure Web browsing, cloud-based antivirus and anti-malware. Cloud-based security and robust threat intelligence will have profound impact on protecting businesses.”

      He warned business are constantly under attack and hackers are becoming more targeted and bold.

      “Whaling—targeting high value individuals within a business is a newer threat that is on the rise,” Novak said. “Ransomware has also become more prevalent. Attacks combining mobile and online activities to gather credentials are being used, and phishing remains an issue.”

      Nathan Eddy
      A graduate of Northwestern University's Medill School of Journalism, Nathan was perviously the editor of gaming industry newsletter FierceGameBiz and has written for various consumer and tech publications including Popular Mechanics, Popular Science, CRN, and The Times of London. Currently based in Berlin, he released his first documentary film, The Absent Column, in 2013.

      MOST POPULAR ARTICLES

      Big Data and Analytics

      Alteryx’s Suresh Vittal on the Democratization of...

      James Maguire - May 31, 2022 0
      I spoke with Suresh Vittal, Chief Product Officer at Alteryx, about the industry mega-shift toward making data analytics tools accessible to a company’s complete...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×