Webroot SecureAnywhere Business Endpoint Protection with Mobile Protection
August 22, 2016
Starts at £12/per device per year for 1,000-plus seats, plus mobile devices optionally at £7/ per device per year for 1,000-plus seats
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Extremely easy to deploy, strong next-generation capabilities, very low price.
- Weaknesses: None that we found.
- Verdict: This has pretty much all one needs in an endpoint protection tool. And, with its attractive pricing and low cost of ownership, we have to make this our Best Buy this month.
This is a very simple to deploy endpoint security system with optional mobile device management. The management console is in the Webroot cloud while agents sit on the endpoints. If one wants to add mobile devices, this can be done for an extra cost.
We started out by accessing our trial account - the trials work just like the production systems and, in fact, you can start with a trial and move up to an enterprise system. We began our test deployment after we had accessed our management console. That is done using a key that Webroot sends you. Once you have accessed your console, you can begin setting up policies. After the policies are in place, deploying endpoint agents can begin.
The agents are very lightweight and will run on just about any recent version of Windows - from Windows XP forward, from 10.8 forward and lots of Windows servers. It also will run in a virtual environment on VMware, Citrix, Hyper-V or Virtual Box.
The console has four default policies installed: Recommended Default, Recommended Server Defaults, Silent Audit and Unmanaged. If an endpoint is subject to any of the policies, except Unmanaged, the endpoint becomes secured and the user cannot remove the agent. You cannot edit the provided policies, as one would expect, but you can clone them and then edit the clone, saving it with a new name. Using that approach, you can build as many policies as you need to cover a wide range of unique requirements.
The agent checks for updates when certain events - such as scans, reboots or a new file - is found. Intervals can be set from 15 minutes to daily. Agents can be installed from .exe files or .msi files. For those masochists who like to work in command line, the tool provides that capability and the available switches are well-documented. The administrator, of course, can override policy actions from the console.
This is a next-generation tool that takes advantage of telemetry from all of the other Webroot installations, as well as its own threat intelligence platform. Webroot always has had a good anti-phishing reputation and that capability is built into the cloud-based system. All of this offloads processing from the endpoint onto the cloud.
Support is good with 24/7 web, email, in-product or phone aid. Because there are support centres around the globe follow-the-sun operation of help desks facilitates 100 percent assistance coverage. The website is complete and has lots of documentation for download, as well as a support portal, a knowledge base and an FAQ.
The documentation is complete and is available for download. In addition to the expected getting-started doc, there is an admin guide, as well as several specialised guides for GSM (Global System for Mobile Communications)-managed services providers and mobile device protection startup and admin guides. There are several other downloads that cover such things as best practices. The manuals and guides are well laid out, visually easy to follow with good use of screen shots. Along with the documentation, Webroot has a YouTube channel with a good collection of training videos. There also is a community section on the website. Pricing is very aggressive, especially considering Webroot's reputation over the years.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry