Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/21/2011
12:45 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Webroot Rolls Out Enhanced Email Security Service

Webroot Email Security Service simplifies management of securing individual users

Boulder, Colo., January 18, 2011 –Webroot, the first Internet security service company, today announced the latest release of Webroot' Email Security Service. As managed service providers, systems integrators and other resellers often take on the role of IT administrator for their customers’ security, this update provides Webroot’s channel partners with a consolidated view of all end users -- giving them more flexibility to quickly and easily manage user provisioning, and saving them valuable time that can be rededicated to more profitable activities.

Approximately 95 percent of Webroot channel partners serve as IT administrators for a portion of their customers. The enhanced Webroot Email Security Service simplifies the management of securing individual users for these channel partners, as well as for in-house IT administrators.

Webroot Email Security Service allows administrators to add or edit users individually or in bulk file uploads, and the ability to un-delete users. In addition, Webroot’s enhancements make it easier to configure site usage policies globally – either for all users or for select groups. It also provides administrators with three views of the user list for additional insights into activities.

“Webroot’s platform for both email and web security is rock solid and has proven to be extremely well received for customers who are looking for more of a total security offering,” said Steve Harper, CEO at MX Toolbox Inc. “We’ve been extremely impressed with Webroot’s willingness to build a relationship with us as partner, and with how the company continually enhances its services. We believe the latest release of the Webroot email security service will make it far easier to set up new accounts, and more efficiently and effectively mange end users, which should translate to time savings for us and our customers.”

"We really value customer and partner feedback and hold it in high regard, as our goal is not only to make security as effective as possible, but to make it as easy as possible as well,” said Jerry Jalaba, vice president of worldwide channels and alliances, Webroot. "We are pleased to be able to offer our partners features that will help make administration more efficient and effective so that they can spend more time on the things that matter most to them.”

About Webroot

Webroot is a leading provider of Internet security for consumers and businesses worldwide. Founded in 1997, privately held Webroot is headquartered in Colorado and employs more than 470 people globally in operations across North America, Europe and the Asia Pacific region. Consistently rated among the best security offerings available, Webroot’s products include email, Web and archiving security services for businesses, and anti-malware, privacy and identity protection for consumers. For more information, visit http://www.webroot.com or call 800.772.9383. Read the Webroot Threat Blog: http://blog.webroot.com. Follow Webroot on Twitter: http://twitter.com/webroot.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/14/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-14499
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper access control vulnerability. Successful exploitation of this vulnerability may allow an attacker to obtain all user accounts credentials.
CVE-2020-14501
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper authentication for critical function (CWE-306) issue. Successful exploitation of this vulnerability may allow an attacker to obtain the information of the user table, including the administrator credentials in plain text. An attacker may also ...
CVE-2020-14503
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper input validation vulnerability. Successful exploitation of this vulnerability could allow an attacker to remotely execute arbitrary code.
CVE-2020-14497
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, contains multiple SQL injection vulnerabilities that are vulnerable to the use of an attacker-controlled string in the construction of SQL queries. An attacker could extract user credentials, read or modify information, and remotely execute code.
CVE-2020-14505
PUBLISHED: 2020-07-15
Advantech iView, versions 5.6 and prior, has an improper neutralization of special elements used in a command (“command injection�) vulnerability. Successful exploitation of this vulnerability may allow an attacker to send a HTTP GET or POST request that create...