Corporate Web Security: A Business Imperative

Webroot Corporate Web Security: A Business ImperativeBOULDER, Colo.  (  Business Internet security has never been easy to manage. But with the increasing sophistication of malware, plus the growing volume of spam that users receive directing them to malware sites—and the expanding numbers of ways threats can enter a network—these days, corporate Web security is downright challenging.

To illustrate how big the problem is: One source* estimates that a large organization of 40,000 computer users will view 48 million Web pages on a typical day and 83,000 of those pages will be infected with malware, which is an average of more than two infected Web pages per user each day.

So what’s a company to do?

The answer:

Develop a comprehensive security infrastructure, including security services that focus on protecting your company at the points where a breach may occur, such as the Web, email and every endpoint that touches the corporate network.

One of the ways to do this is by installing products like Webroot® Web Security Service, Webroot Email Security Service, Webroot Endpoint Security Software and Webroot Email Archiving Services, which, when combined, work together to provide companies with a comprehensive and constantly updated approach to business Internet security.

If companies have inadequate or outdated protection, they run the risk of exposing their system to spam and malware that can negatively impact their operations in a variety of ways, including:

  • Storage and bandwidth constraints. An estimated 75% of all email delivered to a typical email account is spam, which means that the majority of content flowing through corporate networks gets quarantined, then discarded. This represents an enormous strain on network bandwidth and overall storage requirements.
  • Higher costs. Spam volumes nearly double each year, requiring additional storage and continual improvements to spam filters, and increasing amounts of network bandwidth.
  • Stolen funds & data. If a computer becomes infected with a keystroke logger, all keystrokes that the user made before the threat was identified and remediated will be sent to the cybercriminal and may result in stolen funds, stolen data and more.
  • Compliance violations. By not adequately monitoring and managing Web-based threats, organizations can run afoul of a wide variety of statutes that require data to be protected and retained.

In addition to ensuring your company has the appropriate level of business Internet security to meet your needs now—and in the future—it’s important to properly archive email messages. This can help your business stay in compliance with the Federal Rules of Civil Procedure, lower the cost of storage, get improved messaging server performance and recover more rapidly from downtime incidents.

For additional information about upgrading your corporate Web security, visit

*Infected “Legitimate” Site A Growing Threat, Processor, October 23, 2009