SecureAnywhere Internet Security Business Endpoint Protection – 10 Seats [Download]
Webroot Intelligence NetworkView larger CLOUD PREDICTIVE INTELLIGENCE Cloud Predictive Intelligence is the method Webroot uses to assess whether existing, new or changed files and processes are safe to run on a user’s machine. When the Webroot SecureAnywhere Agent is first installed, it scans the endpoint to build a local cache of all the files and
Webroot Intelligence Network
View larger CLOUD PREDICTIVE INTELLIGENCE
Cloud Predictive Intelligence is the method Webroot uses to assess whether existing, new or changed files and processes are safe to run on a user’s machine. When the Webroot SecureAnywhere Agent is first installed, it scans the endpoint to build a local cache of all the files and processes already present. It then continuously monitors for new or changed files that are attempting, or are poised, to execute. Files are instantaneously validated against the Webroot Intelligence Network to make a categorization as ‘known good’ or ‘known bad’. If a determination of ‘known good’ or ‘known bad’ cannot be made, files go into a third category: ‘unknown/undetermined’.
How it Works
When a new file is identified or an existing file is changed, a file hash is created on the local endpoint. That hash is then encrypted and securely sent to the Webroot Intelligence Network.
Known Safe – Known Malicious
If the Webroot Intelligence Network has seen the file before, and it is ‘known good’, the determination is sent back to the endpoint and the file is allowed to execute. If the Webroot Intelligence Network has seen the file before, and makes a ‘known bad’ determination, the file is immediately quarantined and blocked from being able to execute.
Integrated Shields can be individually tuned to meet protection needs
View larger INTEGRATED SHIELDS
Webroot SecureAnywhere’s real-time protection is enhanced by a series of security shields. These add additional layers to the default security provided within Webroot SecureAnywhere. Upon installation every endpoint is protected by the Real-time Shield, the Web Shield, the Identity Protection and integrated, cloud based Firewall.
You Are Protected Both On and Offline
View larger OFFLINE PROTECTION
Webroot SecureAnywhere is at its most effective when online and connected to the Webroot Intelligence Network; however, it also provides significant offline protection. Newly introduced applications will run through a series of behavioral checks, offline tools and customizable offline heuristics. If allowed to execute, they will be monitored and all modifications journaled until the endpoint is back online, where no newly introduced software will be allowed an internet connection until determined.
Flexible Heuristics Settings Can Be Tuned to Meet Your Needs
View larger ADVANCED HEURISTICS
Webroot SecureAnywhere’s heuristics settings allow administrators to adjust the level of heuristic threat analysis that is performed when an endpoint is scanned (on or offline). They are used to analyze any newly introduced programs as they run and can be tuned to monitor the following threat vectors: local, internet, network, USB, DV/DVD, and offline.
Intelligent Outbound Firewall offers additional security
View larger INTELLIGENT OUTBOUND FIREWALL
Conventional endpoint firewalls require the user or administrator to decide whether a program may access the Internet – Webroot SecureAnywhere does it differently.Webroot SecureAnywhere integrates a completely new outbound firewall helper that offers additional capabilities to protect and analyze all outbound connections and manage all outbound application traffic.
Changes To Your System Can Be Reversed
View larger JOURNALING, MONITORING AND ROLLBACK
If a brand new program is introduced to an endpoint protected by Webroot SecureAnywhere, and it has no existing relationship to anything else on that machine, then local heuristics and other defenses are automatically applied to make a good or bad determination. Webroot SecureAnywhere’s rollback process ensures every change made to that particular machine by a piece of malware is reversed, getting the endpoint back to its previously uninfected state.
Access The Web Console From Any PC
View larger WEB-BASED MANAGEMENT CONSOLE
The Webroot SecureAnywhere web-based management console can be accessed via any web browser by entering a user name and password, plus an individual security code that ensures only legitimate Administrators will gain access. This completely cloud based Management Console never needs to be managed, updated, powered or cooled. Additional administrators can be added and granted granular permissions to ensure the appropriate levels of control over policies, reporting, alerting and management of endpoints. The ‘Home’ page of the management console provides one pane of glass to access Endpoint Security, Mobile Security and the Webroot Community.
- Cloud-driven advanced protection against viruses and malware offering full protection against all of todays sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats
- Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data by sending it out over the Internet
- No need to worry about or run updates. Cloud-driven security intelligence means your endpoints are always up to date and protected when on or offline
- Built in automatic remediation means infected endpoints are repaired automatically reducing the need to ever re-image a machine or lose user productivity. Superfast installation means your fully protected in seconds
- Simple to use web console lets you manage user endpoints anytime, from any browser and FREE web and telephone Support is included in the price