Welcome!

News Feed Item

Webroot Offers SecureAnywhere® DNS Protection for Guest WiFi

Solution Makes WiFi Security Affordable, Safe, and Reliable by Protecting DNS Connections from Cyberattacks

BROOMFIELD, Colo., Feb. 14, 2018 /PRNewswire/ -- Webroot, the Smarter Cybersecurity® company expanded its SecureAnywhere® DNS Protection solution to include Guest WiFi protection to ensure WiFi connections at locations such as hotels, airports, coffee shops, or shopping centers are always managed and secured. This service uses the same industry leading DNS Protection components to enforce domain layer security and content filtering to protect browsing over WiFi from malware, data theft, redirection, and other common DNS-based attacks. It also ensures WiFi access is highly available and reliable through DNS access via Webroot's global network of datacenters.

Learn More: www.webroot.com/us/en/business/secure-guest-wifi

Webroot logo. (PRNewsFoto/Webroot)

Key Facts:

  • Webroot's DNS Protection automatically applies defenses at the domain layer, reducing the risk of online threats by up to 88 percent and stopping malware and phishing attempts before they reach an organization's network, reducing risk for both users and organizations.
  • The solution is powered by the Webroot BrightCloud® Web Classification and Reputation Threat Intelligence services, delivering one of the industry's most respected threat intelligence feeds.
  • DNS Protection for Guest WiFi is supported by secure Webroot DNS servers hosted in global datacenters, providing a high level of connectivity and resiliency.
  • Offering 80+ URL filtering categories, the WiFi service ensures granular filtering and visibility. Additionally, the solution allows for control over user bandwidth usage, providing the opportunity for increased network speed.
  • As a cloud-based SaaS solution, it's easy to set-up and deploy. Users redirect Guest WiFi traffic to Webroot's secure DNS servers.
  • The Guest WiFi use case is set up to offer more flexible billing options.  

WiFi Security Concerns:

  • The immense desire for free or guest WiFi has put pressure on businesses to meet the demand, but it also leaves their DNS connections open to hijacking, hacking, and even abuse by guest users that could create bandwidth or copyright issues.
  • Cybercriminals can exploit the DNS layer and view browser history, gain access to login information, redirect searches to malicious pages, and potentially take over connected devices for use in botnets.
  • DNS Protection for Guest WiFi filters users' requests so they can't reach illegal or undesirable content and blocks access to malicious sites.

Key Quote:
Chad Bacher, SVP of Product Strategy and Technology Alliances, Webroot
"Cybercriminals are taking note of the exponential growth of guest WiFi and taking advantage of the vulnerabilities associated with unsecured WiFi networks. This additional use case for our DNS Protection solution, helps small- to medium-sized businesses protect both their network and their customers from being abused by cybercriminals looking to steal data and redirect traffic."

Chris Mouncey, Operations Director, ip-Xchange
"SecureAnywhere DNS Protection for Guest WiFi, allows us to control user bandwidth, improving network speed and reducing downtime. Additionally, by controlling the content our guests' access on our network, we can reduce not only our users' exposure, but also our company's exposure to internet risks. Best of all, the solution integrates into our existing console so we can manage our endpoint protection and network security in one place."

Additional Resources:

About Webroot
Webroot was the first to harness the cloud and artificial intelligence to protect businesses and individuals against cyber threats. We provide the number one security solution for managed service providers and small businesses, who rely on Webroot for endpoint protection, network protection, and security awareness training. Webroot BrightCloud® Threat Intelligence Services are used by market leading companies like Cisco, F5 Networks, Citrix, Aruba, Palo Alto Networks, A10 Networks, and more. Leveraging the power of machine learning to protect millions of businesses and individuals, Webroot secures the connected world. Headquartered in Colorado, Webroot operates globally across North America, Europe, and Asia. Discover Smarter Cybersecurity® solutions at webroot.com.

Social Media: Twitter | LinkedIn | YouTube | Facebook

©2018 Webroot Inc. All rights reserved. Webroot, SecureAnywhere, Webroot SecureAnywhere, Webroot BrightCloud, BrightCloud, and Smarter Cybersecurity are trademarks or registered trademarks of Webroot Inc. in the United States and other countries. All other trademarks are properties of their respective owners. 

 

Cision View original content with multimedia:http://www.prnewswire.com/news-releases/webroot-offers-secureanywhere-dns-protection-for-guest-wifi-300598483.html

SOURCE Webroot

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
Having been in the web hosting industry since 2002, dhosting has gained a great deal of experience while working on a wide range of projects. This experience has enabled the company to develop our amazing new product, which they are now excited to present! Among dHosting's greatest achievements, they can include the development of their own hosting panel, the building of their fully redundant server system, and the creation of dhHosting's unique product, Dynamic Edge.
This session will provide an introduction to Cloud driven quality and transformation and highlight the key features that comprise it. A perspective on the cloud transformation lifecycle, transformation levers, and transformation framework will be shared. At Cognizant, we have developed a transformation strategy to enable the migration of business critical workloads to cloud environments. The strategy encompasses a set of transformation levers across the cloud transformation lifecycle to enhance ...
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Ge...
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
So the dumpster is on fire. Again. The site's down. Your boss's face is an ever-deepening purple. And you begin debating whether you should join the #incident channel or call an ambulance to deal with his impending stroke. Yes, we know this is a developer's fault. There's plenty of time for blame later. Postmortems have a macabre name because they were once intended to be Viking-like funerals for someone's job. But we're civilized now. Sort of. So we call them post-incident reviews. Fires are ne...
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app secu...
CloudEXPO New York 2018, colocated with DevOpsSUMMIT and DXWorldEXPO New York 2018 will be held November 12-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI and Machine Learning to one location.
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of computational needs for many industries. Their solutions provide benefits across many environments, such as datacenter deployment, HPC, workstations, storage networks and standalone server installations. ICC has been in business for over 23 years and their phenomenal range of clients include multinational corporations, universities, and small busines...
This sixteen (16) hour course provides an introduction to DevOps, the cultural and professional movement that stresses communication, collaboration, integration and automation in order to improve the flow of work between software developers and IT operations professionals. Improved workflows will result in an improved ability to design, develop, deploy and operate software and services faster.
Headquartered in Plainsboro, NJ, Synametrics Technologies has provided IT professionals and computer systems developers since 1997. Based on the success of their initial product offerings (WinSQL and DeltaCopy), the company continues to create and hone innovative products that help its customers get more from their computer applications, databases and infrastructure. To date, over one million users around the world have chosen Synametrics solutions to help power their accelerated business or per...
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
Authorization of web applications developed in the cloud is a fundamental problem for security, yet companies often build solutions from scratch, which is error prone and impedes time to market. This talk shows developers how they can (instead) build on-top of community-owned projects and frameworks for better security.Whether you build software for enterprises, mobile, or internal microservices, security is important. Standards like SAML, OIDC, and SPIFFE help you solve identity and authenticat...
The digital transformation is real! To adapt, IT professionals need to transform their own skillset to become more multi-dimensional by gaining both depth and breadth of a wide variety of knowledge and competencies. Historically, while IT has been built on a foundation of specialty (or "I" shaped) silos, the DevOps principle of "shifting left" is opening up opportunities for developers, operational staff, security and others to grow their skills portfolio, advance their careers and become "T"-sh...