Webroot and RSA Team Up to Deliver Real-Time Phishing Detection

Tue Jul 23, 2013 8:00am EDT

* Reuters is not responsible for the content in this press release.

Webroot and RSA Team Up to Deliver Real-Time Phishing Detection

Webroot Adds Machine Learning, Content Classification and Active Learning Solutions to RSA FraudAction(SM) Anti-Phishing Services

PR Newswire

BROOMFIELD, Colo., July 23, 2013 /PRNewswire/ -- Webroot, a leader in cloud-based security intelligence solutions, announced a technology partnership with RSA, The Security Division of EMC (NYSE: EMC), to provide additional real-time phishing detection to RSA FraudActionSM Anti-Phishing Service. The combination of Webroot's Real-Time Anti-Phishing Service with RSA's industry-leading phishing solutions are engineered to allow enhanced analysis of suspected phishing sites and faster detection of attacks while helping to reduce false positives and delivering even more accurate results to customers.

(Logo: http://photos.prnewswire.com/prnh/20121016/LA94090LOGO)

Phishing is the most prevalent Web-borne attack, affecting 55% of companies, according to a recent Webroot Web security study and 2012 saw an increase of 59% in phishing attacks according to RSA's Online Fraud Report. By processing billions of URLs on a monthly basis, Webroot routinely discovers phishing sites ahead of other popular anti-phishing technologies and sources. This timing is critical given how quickly these criminal sites are taken down after they have been launched in order to avoid detection.

"Combining Webroot's capabilities with RSA's automated phishing detection helps us more rapidly qualify suspected phishing sites and quickly determine which URL requires further investigation," said Avi Rosen, Director of Anti-Fraud Solutions at RSA. "Having additional real-time capabilities helps us to reduce the lifecycle of phishing attacks while helping to ensure our customers are receiving the most efficient and effective anti-phishing service available."

The Real-Time Anti-Phishing Service from Webroot is based on advanced machine learning capabilities, which collects and processes hundreds of attributes of a web site in real-time in order to determine its threat profile. The cloud-based "big data" solution is also extremely scalable to handle increased workloads and has the added benefit of getting "smarter" and more accurate as more and more data is processed through the system.

"Teaming up with an industry leader like RSA demonstrates the value of our URL classification and reputation solutions to help solve today's challenging phishing attacks," said Jeff Santelices, Senior Vice President, Worldwide Field Operations at Webroot. "We provide an innovative cloud-based machine learning solution that automates what has traditionally been a manual process, ensuring that it takes mere seconds, instead of hours or days, to detect phishing attacks."

To learn how your organization can partner with Webroot, contact StrategicAlliances@Webroot.com or visit http://www.webroot.com/us/en/partners/technology-partners/real-time-antiphishing.

ABOUT WEBROOT
Webroot is bringing the power of software-as-a-service (SaaS) to Internet security with its suite of Webroot SecureAnywhere solutions for consumers and businesses, and security intelligence solutions to enterprises and technology partners focused on cyber-security worldwide. For more information, visit http://www.webroot.com or call 800.772.9383. Read the Webroot Threat Blog: http://blog.webroot.com. Follow Webroot on Twitter: http://twitter.com/webroot.

© 2013 Webroot Inc. All rights reserved. Webroot, SecureAnywhere, and Webroot SecureAnywhere are trademarks or registered trademarks of Webroot Inc. in the United States and other countries.  RSA and FraudAction are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries.  All other trademarks are properties of their respective owners.

For More Information:
Matt Nagel
SHIFT Communications for Webroot
mnagel@shiftcomm.com
+1-415-591-8403

SOURCE Webroot

Comments (0)
This discussion is now closed. We welcome comments on our articles for a limited period after their publication.