Today's huge volumes of malware simply overwhelm legacy endpoint security. Webroot designed a client/cloud architecture from the ground up to address the increasing rate of breaches and infections caused by the inadequacies of decades-old signature-based solutions. Webroot replaces signatures with real-time detection and real-time remediation to deliver best-in-class protection
Webroot SecureAnywhere - Cloud-Based Security
Webroot SecureAnywhere installs in milliseconds, scans in less than two minutes and becomes more intelligent every day. Its 700-kilobyte client efficiently accesses more than 75 terabytes of malware data in our cloud-based Webroot Intelligence Network.
As this collective intelligence delivers comprehensive real-time protection, endpoints collect over 200 gigabytes of behavioral hashes each day. Unique URL and IP data feeds from strategic partners to further enrich our malware intelligence. As a result, Webroot SecureAnywhere becomes more powerful every minute, and more effective each time an endpoint is added anywhere in the world.
- Prevent Breaches & Infections
- Improve Performance & Productivity
- Minimise Management Complexity
- Reduce Operational Risks
- End Abysmal Support
Once primarily annoyances, malware threats have evolved into more malicious and highly targeted attacks often developed by sophisticated and financially motivated hackers looking to steal everything from money to intellectual property. Powerful Webroot threat shields—including an identity shield that secures online personal information and financial transactions—thwart targeted attacks and other financially motivated malware.
Traditional signature-based approaches have proven woefully inadequate at preventing breaches by today’s highly adaptive malware and advanced persistent threats. Rather than relying on signatures, Webroot allows unknown files to execute initially in a safe sandbox where behavior is observed and changes are recorded. If the behavior of a file matches the behavior of malware, Webroot immediately blocks the file from executing. A rollback capability can also undo changes and return the machine to a pre-infected state.
In the case of highly targeted malware, signatures rarely, if ever, exist. In addition to behavior-based detection and cloud-based collective threat intelligence, Webroot protects against these threats with an Intelligent outbound firewall that prohibits the delivery of questionable outbound data.
Webroot replaces old fashioned heuristics—which are equivalent to guessing—with sophisticated, tunable, and behavioral-based capabilities that allow admins to customize an array of heuristic settings.
In an attempt to keep pace with today's changing threat landscape, legacy endpoint security vendors have packed their products with an array of disparate features. These bloated clients can cause conflicts with other software. The ultra-light yet powerful Webroot agent runs conflict-free alongside other software, including other security software.
Traditional endpoint security software is time-consuming to install. The ultra-light Webroot client—98% smaller than the average endpoint antivirus client—and cloud-based approach means installs take just seconds, and once installed the software requires no signature updates.
With traditional endpoint security, scans can take 45 minutes or longer. During this time, cumbersome client software drags down system performance. The Webroot cloud/client architecture improves both productivity and security by cutting scan times to less than two minutes.
The huge clients of legacy solutions hog memory and burn up to 90% of the CPU, rendering most endpoints unusable during scans. With the ultra-light Webroot cloud-client's minimal CPU load, users notice little or no impact on PC performance, which improves productivity and eliminates the need to schedule scans during off hours.
Signature-based solutions must push down huge daily updates that tax network performance or increase the risk of corrupting files and crashing the system. Webroot real-time collective intelligence eliminates the need for signatures and updates entirely, improving productivity while decreasing the risk of infections due to missed scans or delayed updates.
Remote workforces, virtualization, diverse endpoints, and increasingly sophisticated threats have driven legacy vendors to patch holes in their products with an array of features and technologies. Webroot replaces a jumble of disparate tools and overly complex consoles with a single streamlined web-based management console.
The typical endpoint security solution lacks support for enforcing policies without relying on dedicated servers or corporate networks. The Webroot cloud-based architecture and offline features provide effective command and control over all endpoints, while ensuring they always have up-to-date protection.
In virtualized environments, scans and signature updates degrade system performance due to multiple heavyweight clients straining shared host memory and CPU resources. The ultra-light Webroot cloud-client enables complete support for virtualization, which means admins can manage virtual machines using the same endpoint security tools as their physical counterparts.
By forcing customers to rely on support to remediate infections and network breaches, legacy approaches complicate the task of managing endpoints. Cloud-based granular commands in Webroot SecureAnywhere allow administrators to manage incidents remotely without waiting on custom scripts from customer support.
Legacy endpoint solutions lack the level of granular control that administrators need to effectively manage their environments. The Webroot SecureAnywhere web-based management console provides real-time visibility into the status of every endpoint, including the status of users that are not connected to the corporate network.
The large, feature-laden clients that have become the trend among legacy security vendors interfere with, or even crash, the OS or installed applications. By eliminating conflicts with other security software, the ultra-lightweight 700KB agent not only prevents outages but also enables a layered security approach.
The daily updates required by signature-based approaches impact user productivity, hog network bandwidth and can cause conflicts or even system crashes. Webroot replaces the need to download signature updates and definition files with cloud-based real-time intelligence, which significantly reduces the risks of negative impacts on machines.
Signature-based approaches expose organizations to a window of vulnerability between when a malicious threat is released and when it is detected. When Webroot real-time collective intelligence detects a Zero Day threat—for which no signature typically exists—it immediately protects every other machine in the world that is connected to the Webroot Intelligence Network.
Legacy systems lack not only capabilities to discern the dwell time of malware or changes it may have made but also a way to reverse damage short of re-imaging. Webroot journaling and rollback capabilities capture changes made by malicious programs—including granular forensic insights into dwell time—and can reverse them if necessary.
Controlling the files and applications allowed in the endpoint environment often requires intervention by the legacy vendor. The intuitive Webroot SecureAnywhere console provides full management control over every endpoint. It saves time and reduces risk by enabling admins to centrally create and manage whitelists and blacklists, and apply their own file overrides.
Sitting in long phone queues and waiting for custom signature delivery only adds to the frustration during a crisis. Better visibility via the Webroot Client/Cloud infrastructure and agent logs enables a proactive approach to helping customers resolve issues.
Regardless of the issue IT admins only recourse is to contact their legacy endpoint support center to begin the tedious remediation process. Webroot reduces or eliminates phone support by fully integrating help into the client UI and admin console. Within minutes of a request Webroot support is immediately able to begin the remediation process with limited additional information from a customer.
Once a legacy vendor diagnoses a problem, customers face additional delays while the vendor generates custom signatures and patches. Webroot's cloud-based approach bypasses the need for custom updates by protecting all endpoints in real time with the most up-to-date threat intelligence.
Even after enduring complex support processes, more often than not legacy vendors ultimately offer reimaging as the only way to fully restore infected endpoints. Webroot eliminates the need for reimaging with journaling and rollback capabilities that can return PCs to their previous uninfected state.
Solutions that force reliance on the vendor cause an array of delays and frustrations. When Webroot customers do require support, they have the ability to self-remediate issues or get answers with the speed required to urgently get the endpoint infrastructure back online
Compare with competitors
We do our job quickly and
stay out of your way.
See how we compare.
|Installation Size (MB)||Memory Usage during System Idle (MB)||Memory Usage during Initial Scan (MB)||Initial Scan Time (sec)|
|Webroot® SecureAnywhere™ Business||3.92||3.87||12.30||50.00|
WFBS 7.0 Standard
Endpoint Security 8.0
EP 12.1 Small Business
NOD32 Antivirus 4 Business
Endpoint Security 10.0
TP for SB
* PassMark Software, "Webroot SecureAnywhere Endpoint Protection Cloud vs. Seven Traditional Endpoint Security Products, February 2012"
This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding...
Webroot commissioned Forrester Consulting to conduct a survey study of 161 North American and European IT security decision-makers. The purpose of the study is to understand the current state of endpoint security strategies across enterprises and SMBs, as well as identify key trends and market directions for endpoint security.
This eBook describes the many capabilities that put Webroot SecureAnywhere Business – Endpoint Protection far ahead of competitive solutions. It describes the current broken endpoint security paradigm that relies on large-footprint client software, huge signature downloads, long scan times and dedicated servers...