0% found this document useful (0 votes)
57 views4 pages

Webroot Endpoint Protection Datasheet

The document provides information about Webroot SecureAnywhere Business Endpoint Protection. It discusses how the solution uses machine learning and cloud computing to effectively stop malware and zero-day threats. It also notes that deployment is quick and easy since updates are done via the cloud, avoiding definition updates. Management can be done via a standard or global site manager console.

Uploaded by

SathishKumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views4 pages

Webroot Endpoint Protection Datasheet

The document provides information about Webroot SecureAnywhere Business Endpoint Protection. It discusses how the solution uses machine learning and cloud computing to effectively stop malware and zero-day threats. It also notes that deployment is quick and easy since updates are done via the cloud, avoiding definition updates. Management can be done via a standard or global site manager console.

Uploaded by

SathishKumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

DATASHEET | Endpoint Protection

Webroot SecureAnywhere ®

Business Endpoint Protection

Next-gen security with advanced machine


learning that solves the challenges of
traditional solutions

Overview Visibile Efficacy


Confidence has never been so low in a key threat prevention technology: endpoint A feature-rich endpoint protection solution amounts to nothing if it
security. Conventional antivirus protection is struggling to keep up with today’s can’t deliver its key feature: malware prevention. SecureAnywhere
threats and attacks. It slows down machines and users and is complex and system Business Endpoint Protection is the first malware prevention
resource-intensive. technology to report on its own efficacy at detecting infections and
stopping malware. Dwell time reporting gives you visibility into any
Now, by combining innovative SecureAnywhere file pattern and predictive behavior infection on any endpoint within your network, showing you when the
recognition technology with 5th generation machine learning and the almost limitless infection began and how long it was contained by Webroot before
processing power of cloud computing, Webroot effectively stops malware and zero- being automatically remediated.
day threats at the moment of attack. The smarter, Webroot® approach to malware
prevention is more effective and accountable than any conventional antivirus. You A major factor contributing to the efficacy of SecureAnywhere
no longer need to rely on an outmoded detection model that is easily overwhelmed Business Endpoint Protection is its continuous infection monitoring,
by today’s malware—a model that yields unknown dwell times and doesn’t alert on journaling, and auto-remediation. If it cannot immediately categorize
attacks until long after the infiltration has occured. new or changed files and processes as ‘known’ good or ‘known’
bad, then the agent begins monitoring and journaling all events. If
Nearly every antivirus still presents the hassle of ensuring every endpoint has the latest an observed process is categorized as malicious, then any system
update. SecureAnywhere Business Endpoint Protection communicates with the cloud, changes are reversed and the endpoint is auto-remediated to its last
which means there are no definition or signature updates to deploy and manage. As known good state. This extra layer ensures minimal false positives.
malware detection occurs continuously in real time, performance issues fade away. On the rare occasion that a false positive does occur, admins can
Scheduled systems scans are normally around 30 seconds1 and never impact device easily white list files as needed within their management console.
performance. Virtual desktop and server environments, plus many embedded operating
systems, also see improved performance. Flexible Cloud-Based Management
Webroot SecureAnywhere solutions use cloud-based management,
The world’s smallest and fastest endpoint security client makes deployment fast and
which means no on-premise hardware or software is needed and the
easy. The SecureAnywhere antimalware agent happily coexists with other antivirus
console is always up to date. Webroot offers a standard console or
solutions, with no need to immediately rip and replace.
our Global Site Manager console, so you can choose the management
SecureAnywhere Business Endpoint Protection is a smarter way to solve malware features appropriate to your organization’s needs. The standard
prevention, endpoint security performance, management. It provides the protection console is perfect for managing anything up to 1,000 endpoints with
you need without the demanding overhead of conventional antivirus. less complex user groupings and only a few different policy types.
The Global Site Manager makes it straightforward to manage up to

The world’s smallest, fastest endpoint security client makes deployment quick and easy.
1
“Webroot SecureAnywhere® Business Endpoint Protection vs. Seven Competitors” PassMark Software. August 2015.
Webroot
Customers

Webroot
Files Data Center

Corporate Webroot®
Workstations Threat Intelligence
& Remote Users Platform

Uncovering zero-day malware

100,000 endpoints, and, through its hierarchical management architecture, technology partners worldwide, the Webroot Threat Intelligence Platform
you can easily control multiple sites and locations. The Global Site Manager identifies infections as they occur. This big data architecture continuously
also supports policies at the global and individual site level, plus local site processes, analyzes, correlates and contextualizes vast amounts of disparate
administration access rights and permissions that are easily managed information while also applying a patented, fifth-generation machine learning
alongside central administration of all sites. and malicious code identification system to create predictive behavioral
determinations on malware instantly – with incredibly high accuracy.
This makes Global Site Manager ideal for global and or multi-location
organizations, as well as Managed Services Providers (MSPs) administering Big data processing allows SecureAnywhere Business Endpoint Protection
numerous customer sites. Cloud-based management with full remote to uncover malware as it attempts to infect an individual user’s endpoint,
endpoint administration also makes the delivery of global management while simultaneously protecting all other SecureAnywhere endpoints against
extraordinarily cost-effective compared to conventional antivirus. the same attacks. This collective approach to threat intelligence creates
a massive real-time malware detection net that has intimate knowledge
Powering Predictive Prevention of more than 300 million executables, including their runtime behavioral
All Webroot SecureAnywhere solutions are powered by the Webroot® characteristics and interactions. This, coupled with hundreds of terabytes of
Threat Intelligence Platform. Leveraging big data analytics, 5th generation threat data, ensures that Webroot customers are continuously protected from
machine learning, and collective threat intelligence from customers and both existing and new threats.

Infection Dwell Time: Visibility into Containment and Remediation

First seen globally First date determined malicious First/last seen on this endpoint First/last seen in your network

Interactive drill down


malware information

Any other endpoint(s) infected


with this unique therat

Dwell time calculation


Key Security Features to determine their risk level. If the user commonly visits low-reputation
Webroot SecureAnywhere Business Endpoint Protection focuses on delivering websites, then the endpoint goes into a state of heightened awareness and
a high-performance endpoint malware prevention and management solution. closely interrogates any new files or processes that are introduced into their
It offers highly accurate and effective endpoint malware prevention with a system. Infrared also interprets user behaviors and the overall safety level of
range of additional security shield capabilities that keep both the user and the the user. So, if a user is classified as “high risk”, Webroot then dynamically
device safe. tunes malware prevention to that user, while preventing false positives for
less risky users.
Identity & Privacy Shield
These shields protect users by assuming the endpoint is already infected Web Threat Shield
by some completely undetectable malware. They protect user information The Web Threat Shield leverages Webroot anti-phishing technology to offer
and transactional data that could be exposed during online transactions unique real-time protection against polymorphic phishing URLs, as well as
from specific types of threats, including phishing, DNS poisoning, keystroke malicious and high-risk websites and domains.
logging, screen grabbing, cookie scraping, clipboard grabbing, and browser
Intelligent Outbound Firewall
and session hijacking by malicious software mounting man-in-the-browser
In addition to its Shields, Webroot SecureAnywhere Business Endpoint
or man-in-the-middle attacks. The Sheilds lock down the OS and browser to
Protection has its own intelligent system-monitoring and application-aware
protect all user information and credentials – even shared passwords. Aside
outbound firewall. This sophisticated firewall protects users both within and
from securing browser activities, the Identity Shield may be extended under
outside the corporate gateway, augmenting the Microsoft Windows® firewall
user policy to cover other endpoint applications by adding them to the Identity
to offer full control of outbound and inbound connections without adding
Shield protection list, securing those applications.
an unnecessary drain on endpoint resources. It manages and monitors all
Infrared outbound traffic to protect against “phone-home” threats and ensures that
Infrared is a multi-layer defense incorporating several aspects of Webroot only policy-approved applications communicate with the network. It also
Threat Intelligence to help thwart threats early on in their lifecycle – often automatically recognizes known good and bad programs, so users aren’t
before a threat researcher sees a single sample. It looks at the reputation pestered with pop-ups or forced to make uninformed judgments.
of the websites an individual visits and uses Webroot Threat Intelligence

The Webroot® Threat Intelligence Platform – the most powerful real-time threat analysis engine in the world
Powerful Heuristics Offline Protection
Heuristic settings can be adjusted based on risk tolerance for file execution. Stops attacks when an endpoint is offline with separate file execution policies
Heuristic settings include: applicable to local disk, USB, CD, and DVD drives.

»» Advanced Virtualization, Terminal Server & Citrix Support


Analyzes new programs for suspicious actions that are typical of malware In addition to supporting Windows PC environments, SecureAnywhere
Business Endpoint Protection also supports Windows Server, Virtualization,
»» Age
Terminal Server and Citrix environments.
Analyzes new programs based on the time a similar file has existed within
Webroot Threat Intelligence Mobile Smartphone and Tablet Support
»» Popularity Webroot SecureAnywhere® Business Mobile Protection is available for
Analyzes new programs based on how often a file is used or changed within Android® and iOS® smartphones and tablets.
Webroot Threat Intelligence
Resilient Distributed Cloud Architecture
Consists of multiple secure global data centers to support local offices
and roaming users through their nearest data center, providing full service
resilience and redundancy.

About Webroot
Webroot delivers next-generation network and endpoint security and threat intelligence services to protect businesses and individuals around the globe. Our smarter approach harnesses the power of cloud-
based collective threat intelligence derived from millions of real-world devices to stop threats in real time and help secure the connected world. Our award-winning SecureAnywhere® endpoint solutions and
BrightCloud® Threat Intelligence Services protect millions of devices across businesses, home users, and the Internet of Things. Trusted and integrated by market-leading companies, including Cisco, Citrix,
F5 Networks, Aruba, Palo Alto Networks, A10 Networks, and more, Webroot is headquartered in Colorado and operates globally across North America, Europe, and Asia. Discover Smarter Cybersecurity™
solutions at webroot.com.

World Headquarters Webroot EMEA Webroot APAC


385 Interlocken Crescent 6th floor, Block A Suite 1402, Level 14, Tower A
Suite 800 1 George’s Quay Plaza 821 Pacific Highway
Broomfield, Colorado 80021 USA George’s Quay, Dublin 2, Ireland Chatswood, NSW 2067, Australia
+1 800 772 9383 +44 (0) 870 1417 070 +61 (0) 2 8071 1900

©2017 Webroot Inc. All rights reserved. Webroot, Webroot BrightCloud and BrightCloud are trademarks or registered trademarks of Webroot Inc. in the United States and/or other countries. All other trademarks are properties of their respective owners.
DS _ 011917 _ US

You might also like