Google Android systems have become the most popular smartphone platform, according to recent market research reports. Consequently, small and medium businesses need tools to manage those systems, and Webroot became the latest vendor to try to address that need.
Google Android systems have become the most popular smartphone platform, according to recent market research reports. Consequently, small and medium businesses need tools to manage those systems, and Webroot became the latest vendor to try to address that need.Webroot Mobile Security for Android is designed to protect Android smartphones and tablets. The product relies on cloud-based URL scanning to assess the safety of website links and block threats before users click on them. In addition, the security system scans applications before they are installed to ensure they are safe. The solution runs in background and automatically checks for updates, so businesses have the latest protection.
This product was built to protect the identity and personal information of individuals whose mobile device are lost or stolen. The security solution locks a mobile device, so it can't be used by outsiders, and wipes contact information, text messages, and other personal data from the system. In case the user has forgotten the password, the application sends a temporary access code to a trusted friend. Users can track the device: a map shows where it is located, and a loud alert is sounded once the person is in range of the system.
Founded in 1997, Webroot has done a good job carving out a niche in the highly competitive security software market. While its products have had a bit more of a consumer focus than a business thrust, many small and medium businesses have turned to its wares because of their low cost and easy deployment. These organizations are struggling to manage the ever growing array of handheld devices that users are buying, including Google Android systems, which have become quite popular. So small and medium businesses may want to take a look at what Webroot has to offer.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.