Webroot delivers endpoint protection
Posted on 21 February 2012.
The security landscape has changed and traditional signature-based software can’t keep up. A recent study of IT decision makers found an overwhelming 95 per cent experienced an endpoint-based attack last year. Frustrated by traditional security solutions that consistently fail to protect them and require too much time and resources to adequately maintain, many IT managers have resorted to allocating budget for cleaning up the aftermath of attacks.

Webroot introduced SecureAnywhere – Endpoint Protection that delivers the full spectrum of security, including detection of all types of known malware and advanced persistent threats, identity and privacy protection, firewall, and system cleanup. IT administrators no longer need spend time and resources managing these functions disparately. They can now holistically and effectively protect their entire organisation at less cost.

The solution never requires security updates or signature database downloads which eat network bandwidth and leave users exposed. Webroot analyses every file that tries to run on a computer in the cloud. When a new threat is identified, every Webroot customer is protected within seconds.

Key security features:
  • Behavior-based threat analysis: Eliminates the need for signatures, minimises the window of vulnerability.
  • Webroot Intelligence Network A cloud-based infrastructure that delivers a faster response to new threats than ever before. Once a threat is detected, every endpoint on the network is protected.
  • Offline protection: Includes protection for machines when they’re offline, whether inside or outside the corporate firewall.
  • Journaling and roll-back: Proactively monitors any change made to an endpoint by a malicious file and rolls the system back to the safe state, eliminating the need for re-imaging machines.
  • Cloud-based firewall: Augments the Microsoft Windows firewall; protects against “phone home” attacks and ensures only policy-approved applications communicate with the network.
  • Identity and Privacy Shield: Hardens the OS and browser to prevent loss of intellectual property through hijacks, key-loggers, and screen-scrapers.
Key management features:
  • Centralized endpoint management console: Ideal for dispersed organisations. Administrators can remotely execute commands such as scanning, killing un-trusted processes, rebooting, or running a script, on any endpoint.
  • Centralized policy control: Remotely set application and Web usage policies at the individual, group or companywide level.
  • System cleaner: Gives IT an alternative to reimaging as a first response.
  • Remote deployment tool: Installs the product across every endpoint on the network. Typical installation time is less than 6 seconds.
  • Won’t conflict with other security solutions: No need to uninstall existing security products to trial or deploy it. Can be used standalone or as a second layer of protection.





Spotlight

How to talk infosec with kids

Posted on 17 September 2014.  |  It's never too early to talk infosec with kids: you simply need the right story. In fact, as cyber professionals it’s our duty to teach ALL the kids in our life about technology. If we are to make an impact, we must remember that children needed to be taught about technology on their terms.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Sep 19th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //