{"id":1470,"date":"2022-03-02T20:06:00","date_gmt":"2022-03-02T20:06:00","guid":{"rendered":"https:\/\/www.pax8.com\/future-blog\/webroot-threat-intelligence\/"},"modified":"2023-05-16T01:00:42","modified_gmt":"2023-05-16T01:00:42","slug":"webroot-threat-intelligence","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/webroot-threat-intelligence\/","title":{"rendered":"How MSPs can get back to security basics with Webroot OpenText Security Solutions and BrightCloud"},"content":{"rendered":"<p>Quickly build foundational levels of defense.<\/p>\n<p>According to key findings from <a href=\"https:\/\/www.verizon.com\/business\/en-gb\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener\">Verizon\u2019s 2021 Data Breach Investigations Report<\/a>, 85% of data breaches involved a human element, while 36% involved phishing and 10% involved ransomware. It\u2019s clear that end users continue to be the greatest vulnerability for their organizations. A single click can allow attackers to infiltrate a company\u2019s network\u2014 potentially leading to ransom payments, data breach fines and major downtime.<\/p>\n<p>This vulnerability is compounded for MSPs because of remote monitoring and management tools (RMM). RMMs can provide a single point of failure for all downstream clients.<\/p>\n<p>It\u2019s no secret that <a href=\"https:\/\/www.pax8.com\/blog\/the-msps-guide-to-a-building-a-security-stack\/\" target=\"_blank\" rel=\"noopener\">the best approach to security is through layers <\/a>that provide protective coverage against a wide range of threat vectors. These layers enable an organization\u2019s security solution ecosystem to combat and recover from evolving cyber threats. However, identifying and implementing multiple security solutions can be time-consuming, daunting and expensive.<\/p>\n<p>Given all these factors, how can MSPs get back to security basics and quickly build foundational levels of defense? <a href=\"https:\/\/www.pax8.com\/en-us\/vendors\/webroot\/?utm_source=blogpost&amp;utm_medium=text_link&amp;utm_campaign=blogpost_webroot_threat_intelligence_2022&amp;utm_term=general_brand&amp;utm_content=vendor_page\" target=\"_blank\" rel=\"noopener\">Webroot OpenText Security Solutions <\/a>and <a href=\"https:\/\/www.brightcloud.com\/\" target=\"_blank\" rel=\"noopener\">BrightCloud<\/a> offer robust security solutions and threat intelligence capabilities that provide multiple layers of protection to immediately boost an organization\u2019s overall security posture. Let\u2019s dive in.<\/p>\n<h2>First Line of Defense: Security Awareness Training<\/h2>\n<p>Every end user has become a key component of an organization\u2019s first line of defense. Whether it involves opening an email or clicking on a link, end users make decisions each day that could expose their organizations to risk. Since email continues to be a top threat vector due to phishing and business email compromise (BEC) \u00a0scams, humans continue to be the weakest link for attackers to exploit and find entry points into an organization\u2019s networks and systems.<\/p>\n<p>That\u2019s why security awareness training is the best first line of defense for businesses. It\u2019s a preventive approach to keep security incidents from occurring. According to the <a href=\"https:\/\/www.webroot.com\/us\/en\/business\/threat-intelligence?utm_medium=affiliate&amp;utm_source=pax8\" target=\"_blank\" rel=\"noopener\">2021 Webroot BrightCloud\u00ae Threat Report<\/a>, regular phishing simulations can reduce click-through by up to 72% \u2014 the more simulations users experience in training, the less end users fall for them in practice.<\/p>\n<p><a href=\"https:\/\/www.pax8.com\/en-us\/vendors\/webroot\/products\/webroot-security-awareness-training\/?utm_source=blogpost&amp;utm_medium=text_link&amp;utm_campaign=blogpost_webroot_threat_intelligence_2022&amp;utm_term=general_brand&amp;utm_content=vendor_product_page\" target=\"_blank\" rel=\"noopener\">Webroot\u00ae Security Awareness Training <\/a>offers interactive online training courses, trackable training campaigns and a fully-featured phishing simulator that MSPs can deliver to their clients.<\/p>\n<p>The end results of continuous security training include:<\/p>\n<p style=\"padding-left: 80px;\"><span class=\"s3\">\u2022 End users are less likely to click on risky content<\/span><\/p>\n<p style=\"padding-left: 80px;\"><span class=\"s3\">\u2022 The entire company is more aware of different types of threats and changing phishing methods<\/span><\/p>\n<p style=\"padding-left: 80px;\"><span class=\"s3\">\u2022 End users can take ownership and accountability for their role in their company\u2019s cybersecurity<\/span><\/p>\n<p style=\"padding-left: 80px;\"><span class=\"s3\">\u2022 Overall improved compliance<\/span><\/p>\n<h2>Second Layer of Defense: Web Security and Endpoint Protection<\/h2>\n<h3><strong>Web security with DNS protection<\/strong><\/h3>\n<p>One example of the way attackers continue to evolve their methods is through the use of HTTPs. Attackers know that HTTPS provides a false sense\u00a0 of security and are quickly adapting. By the end of 2020, <a href=\"https:\/\/www.brightcloud.com\/threat-intelligence-services\/\" target=\"_blank\" rel=\"noopener\">over half of all phishing sites <\/a>used HTTPS.<\/p>\n<p><a href=\"https:\/\/www.pax8.com\/en-us\/vendors\/webroot\/resources\" target=\"_blank\" rel=\"noopener\">Webroot\u00ae DNS Protection <\/a>is an efficient and straightforward way to secure DNS protocols against compromises. It blocks threats at the domain-level in over 82 URL categories that contain web \u00a0threats before they even reach the network. As an added benefit, web security can improve employee productivity by controlling access to certain websites, such as Facebook, Reddit, YouTube and Netflix.<\/p>\n<h3>Endpoint protection<\/h3>\n<p>Over one third of businesses with 21-100 protected endpoints encountered an infection in 2021. Traditional antivirus is simply not enough to combat today\u2019s sophisticated and ever-evolving attacks. Endpoints are under attack through a wide range of vectors, including email, web browsing, file attachments, apps, ads, social media and connected devices. In addition to known threats, businesses must also somehow find ways to protect themselves against never- before-seen threats.<\/p>\n<p>Enter <a href=\"https:\/\/www.pax8.com\/en-us\/vendors\/webroot\/products\/webroot-business-endpoint-protection\/?utm_source=blogpost&amp;utm_medium=text_link&amp;utm_campaign=blogpost_webroot_threat_intelligence_2022&amp;utm_term=general_brand&amp;utm_content=vendor_product_page\" target=\"_blank\" rel=\"noopener\">Webroot\u00ae Business Endpoint Protection. <\/a>It provides real-time, multi-vector endpoint protection backed by deep learning intelligence, using behavioral heuristics to provide zero-day security against new and emerging threats. Designed for MSPs, it improves automation and streamlines management to boost profitability, while enabling endpoint management from anywhere.<\/p>\n<h2>Core Defense: Threat Intelligence Platform<\/h2>\n<p>A security and threat intelligence layered approach is an effective method for combatting cyber threats. The BrightCloud\u00ae Threat Intelligence Platform and Webroot OpenText Security Solutions provide a single pane of glass for MSPs to gain the benefits of threat intelligence, endpoint protection and security awareness training.<\/p>\n<p>BrightCloud\u2019s robust, next-generation platform combines real-time intelligence from its vast database with machine learning and behavior-based heuristics. This means that Webroot\u2019s security tools are always up-to-date and provide resilience against the backdrop of a \u00a0continually changing security landscape. With its cloud-based management and hierarchical architecture, MSPs can remotely control multiple sites and locations with ease.<\/p>\n<h2>Closing<\/h2>\n<p>We\u2019ve said it before, and we\u2019ll say it again \u2014 the best security approach is layers of protection. But MSPs don\u2019t need to deploy and manage individual solutions for every security layer. Instead, MSPs can get back to basics with BrightCloud\u2019s threat intelligence and Webroot OpenText Security Solutions.<\/p>\n<p>Schedule a call with a Pax8 solution consultant to learn how to get global protection for yourself and your clients in minutes.<\/p>\n<p><a class=\"btn-primary\" href=\"https:\/\/www.webroot.com\/us\/en\/business\/threat-intelligence\">Read the report<\/a><br \/>\n<a href=\"https:\/\/www.pax8.com\/blog\/contact-pax8\">Schedule a call<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quickly build foundational levels of defense. According to key findings from Verizon\u2019s 2021 Data Breach Investigations Report, 85% of data breaches involved a human element, while 36% involved phishing and 10% involved ransomware. It\u2019s clear that end users continue to be the greatest vulnerability for their organizations. A single click can allow attackers to infiltrate [&hellip;]<\/p>\n","protected":false},"author":141,"featured_media":363,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[5],"tags":[],"class_list":["post-1470","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How MSPs can get back to security basics with Webroot OpenText Security Solutions and BrightCloud - Pax8 Blog<\/title>\n<meta name=\"description\" content=\"MSPs can get back to security basics and quickly develop foundational levels of defense with BrightCloud\u00ae Threat Intelligence and Webroot OpenText Security Solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/webroot-threat-intelligence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How MSPs can get back to security basics with Webroot OpenText Security Solutions and BrightCloud - Pax8 Blog\" \/>\n<meta property=\"og:description\" content=\"MSPs can get back to security basics and quickly develop foundational levels of defense with BrightCloud\u00ae Threat Intelligence and Webroot OpenText Security Solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/webroot-threat-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-02T20:06:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-16T01:00:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Pax8-Webroot-Blog-1024x576.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"narnold\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"narnold\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/webroot-threat-intelligence\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/webroot-threat-intelligence\\\/\"},\"author\":{\"name\":\"narnold\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\"},\"headline\":\"How MSPs can get back to security basics with Webroot OpenText Security Solutions and BrightCloud\",\"datePublished\":\"2022-03-02T20:06:00+00:00\",\"dateModified\":\"2023-05-16T01:00:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/webroot-threat-intelligence\\\/\"},\"wordCount\":854,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/webroot-threat-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Pax8-Webroot-Blog.png\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/webroot-threat-intelligence\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/webroot-threat-intelligence\\\/\",\"name\":\"How MSPs can get back to security basics with Webroot OpenText Security Solutions and BrightCloud - Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/webroot-threat-intelligence\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/webroot-threat-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Pax8-Webroot-Blog.png\",\"datePublished\":\"2022-03-02T20:06:00+00:00\",\"dateModified\":\"2023-05-16T01:00:42+00:00\",\"description\":\"MSPs can get back to security basics and quickly develop foundational levels of defense with BrightCloud\u00ae Threat Intelligence and Webroot OpenText Security Solutions.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/webroot-threat-intelligence\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/webroot-threat-intelligence\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/webroot-threat-intelligence\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Pax8-Webroot-Blog.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/Pax8-Webroot-Blog.png\",\"width\":2000,\"height\":1125,\"caption\":\"Pax8 Webroot blog\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/webroot-threat-intelligence\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How MSPs can get back to security basics with Webroot OpenText Security Solutions and BrightCloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\",\"name\":\"narnold\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/narnold\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How MSPs can get back to security basics with Webroot OpenText Security Solutions and BrightCloud - Pax8 Blog","description":"MSPs can get back to security basics and quickly develop foundational levels of defense with BrightCloud\u00ae Threat Intelligence and Webroot OpenText Security Solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/webroot-threat-intelligence\/","og_locale":"en_US","og_type":"article","og_title":"How MSPs can get back to security basics with Webroot OpenText Security Solutions and BrightCloud - Pax8 Blog","og_description":"MSPs can get back to security basics and quickly develop foundational levels of defense with BrightCloud\u00ae Threat Intelligence and Webroot OpenText Security Solutions.","og_url":"https:\/\/www.pax8.com\/blog\/webroot-threat-intelligence\/","og_site_name":"Pax8 Blog","article_published_time":"2022-03-02T20:06:00+00:00","article_modified_time":"2023-05-16T01:00:42+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Pax8-Webroot-Blog-1024x576.png","type":"image\/png"}],"author":"narnold","twitter_card":"summary_large_image","twitter_misc":{"Written by":"narnold","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/webroot-threat-intelligence\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/webroot-threat-intelligence\/"},"author":{"name":"narnold","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c"},"headline":"How MSPs can get back to security basics with Webroot OpenText Security Solutions and BrightCloud","datePublished":"2022-03-02T20:06:00+00:00","dateModified":"2023-05-16T01:00:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/webroot-threat-intelligence\/"},"wordCount":854,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/webroot-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Pax8-Webroot-Blog.png","articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/webroot-threat-intelligence\/","url":"https:\/\/www.pax8.com\/blog\/webroot-threat-intelligence\/","name":"How MSPs can get back to security basics with Webroot OpenText Security Solutions and BrightCloud - Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/webroot-threat-intelligence\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/webroot-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Pax8-Webroot-Blog.png","datePublished":"2022-03-02T20:06:00+00:00","dateModified":"2023-05-16T01:00:42+00:00","description":"MSPs can get back to security basics and quickly develop foundational levels of defense with BrightCloud\u00ae Threat Intelligence and Webroot OpenText Security Solutions.","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/webroot-threat-intelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/webroot-threat-intelligence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/webroot-threat-intelligence\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Pax8-Webroot-Blog.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/Pax8-Webroot-Blog.png","width":2000,"height":1125,"caption":"Pax8 Webroot blog"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/webroot-threat-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How MSPs can get back to security basics with Webroot OpenText Security Solutions and BrightCloud"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c","name":"narnold","url":"https:\/\/www.pax8.com\/blog\/author\/narnold\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=1470"}],"version-history":[{"count":0,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1470\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/363"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=1470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=1470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=1470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}