Webroot References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (558)
    23+ References
  • 4.8 / 5.0 (907)
    Verified8+ References
  • 4.8 / 5.0 (530)
    35+ References

Webroot Case Studies

  • Global MSP Enjoys Safer Clients & Streamlined Management with Webroot

  • Platte River Networks Proactively Protects Clients & Reduces IT Costs with Webroot

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References23 total
    About

    Living Security’s mission is to help prevent cybersecurity breaches with a human risk management solution that does more than meet compliance needs, it also truly changes behavior. Living Security believes empowering people is the key to ending cybersecurity breaches - picking up where traditional security awareness training drops off. Gamified learning and immersive experiences engage and educate users, while the science-backed, tech-enabled platform uniquely provides CISOs the ability to measure training efficacy and program ROI.

  • Reference Rating
    4.7 / 5.0
    Customer References8 total
    About

    RangeForce believes in the power of leveling up SOC and cybersecurity professionals through advanced cybersecurity defense training, combining it with the ability to accurately and quantitatively assess your team’s actual skills. RangeForce creates accessible cybersecurity training experiences for you and your team. Upskill continuously in a hands-on and interactive cyber range. Start your RangeForce journey today and prove your strength against the latest cyber attacks.

  • Reference Rating
    4.7 / 5.0
    Customer References35 total
    About

    SimSpace combines the highest-fidelity, military-grade cyber ranges and training content with unique user and adversary emulation techniques. SimSpace prepares individuals, teams and leaders for continued success against ever-evolving adversaries. SimSpace's mission is to provide an automated, cost-effective evaluation method for calculating cyber risks based on realistic comprehensive assessments of holistic capability to yield more secure networks globally.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked