SecureAnywhere Internet Security Business Endpoint Protection – 10 Seats [Download]

February 28, 2014 - Comment

Webroot Intelligence NetworkView larger CLOUD PREDICTIVE INTELLIGENCE Cloud Predictive Intelligence is the method Webroot uses to assess whether existing, new or changed files and processes are safe to run on a user’s machine. When the Webroot SecureAnywhere Agent is first installed, it scans the endpoint to build a local cache of all the files and

Webroot Intelligence Network
View larger CLOUD PREDICTIVE INTELLIGENCE

Cloud Predictive Intelligence is the method Webroot uses to assess whether existing, new or changed files and processes are safe to run on a user’s machine. When the Webroot SecureAnywhere Agent is first installed, it scans the endpoint to build a local cache of all the files and processes already present. It then continuously monitors for new or changed files that are attempting, or are poised, to execute. Files are instantaneously validated against the Webroot Intelligence Network to make a categorization as ‘known good’ or ‘known bad’. If a determination of ‘known good’ or ‘known bad’ cannot be made, files go into a third category: ‘unknown/undetermined’.

How it Works

When a new file is identified or an existing file is changed, a file hash is created on the local endpoint. That hash is then encrypted and securely sent to the Webroot Intelligence Network.

Known Safe – Known Malicious

If the Webroot Intelligence Network has seen the file before, and it is ‘known good’, the determination is sent back to the endpoint and the file is allowed to execute. If the Webroot Intelligence Network has seen the file before, and makes a ‘known bad’ determination, the file is immediately quarantined and blocked from being able to execute.

Integrated Shields can be individually tuned to meet protection needs
View larger INTEGRATED SHIELDS

Webroot SecureAnywhere’s real-time protection is enhanced by a series of security shields. These add additional layers to the default security provided within Webroot SecureAnywhere. Upon installation every endpoint is protected by the Real-time Shield, the Web Shield, the Identity Protection and integrated, cloud based Firewall.

You Are Protected Both On and Offline
View larger OFFLINE PROTECTION

Webroot SecureAnywhere is at its most effective when online and connected to the Webroot Intelligence Network; however, it also provides significant offline protection. Newly introduced applications will run through a series of behavioral checks, offline tools and customizable offline heuristics. If allowed to execute, they will be monitored and all modifications journaled until the endpoint is back online, where no newly introduced software will be allowed an internet connection until determined.

Flexible Heuristics Settings Can Be Tuned to Meet Your Needs
View larger ADVANCED HEURISTICS

Webroot SecureAnywhere’s heuristics settings allow administrators to adjust the level of heuristic threat analysis that is performed when an endpoint is scanned (on or offline). They are used to analyze any newly introduced programs as they run and can be tuned to monitor the following threat vectors: local, internet, network, USB, DV/DVD, and offline.

Intelligent Outbound Firewall offers additional security
View larger INTELLIGENT OUTBOUND FIREWALL

Conventional endpoint firewalls require the user or administrator to decide whether a program may access the Internet – Webroot SecureAnywhere does it differently.Webroot SecureAnywhere integrates a completely new outbound firewall helper that offers additional capabilities to protect and analyze all outbound connections and manage all outbound application traffic.

Changes To Your System Can Be Reversed
View larger JOURNALING, MONITORING AND ROLLBACK

If a brand new program is introduced to an endpoint protected by Webroot SecureAnywhere, and it has no existing relationship to anything else on that machine, then local heuristics and other defenses are automatically applied to make a good or bad determination. Webroot SecureAnywhere’s rollback process ensures every change made to that particular machine by a piece of malware is reversed, getting the endpoint back to its previously uninfected state.

Access The Web Console From Any PC
View larger WEB-BASED MANAGEMENT CONSOLE

The Webroot SecureAnywhere web-based management console can be accessed via any web browser by entering a user name and password, plus an individual security code that ensures only legitimate Administrators will gain access. This completely cloud based Management Console never needs to be managed, updated, powered or cooled. Additional administrators can be added and granted granular permissions to ensure the appropriate levels of control over policies, reporting, alerting and management of endpoints. The ‘Home’ page of the management console provides one pane of glass to access Endpoint Security, Mobile Security and the Webroot Community.

Product Features

  • Cloud-driven advanced protection against viruses and malware offering full protection against all of todays sophisticated malware threats including Trojans, keyloggers, phishing, spyware, back-doors, rootkits, zero-day and advanced persistent threats
  • Built in Identity & Privacy Shield stops data being stolen or captured when using the Internet and the outbound firewall also stops malware stealing data by sending it out over the Internet
  • No need to worry about or run updates. Cloud-driven security intelligence means your endpoints are always up to date and protected when on or offline
  • Built in automatic remediation means infected endpoints are repaired automatically reducing the need to ever re-image a machine or lose user productivity. Superfast installation means your fully protected in seconds
  • Simple to use web console lets you manage user endpoints anytime, from any browser and FREE web and telephone Support is included in the price
If you enjoyed this post, make sure you subscribe to my RSS feed!

Comments

Michael says:

Great AV/AM Tool for Decentralized IT Management 0

Marcus says:

Great and easy security software 0

Steve says:

Using it at home and work – simply the best We switched over to Webroot a little over a year ago. We had been using another vendor for years and had just accepted re-imaging infected PCs or having to run 3 other malware removal programs to clear threats as a part of IT life. I had been using ESET at home and was really impressed for the first few years using that product but I started researching A/V solutions when Webroot’s name kept popping up. I dug deeper and decided to give it a spin at home first and see how it fared against my…

Write a comment

*

This blog is kept spam free by WP-SpamFree.