0.13% average CPU usage and 5.8% average memory usage while idle. Self updating agents eliminates everyday management of database and agent versioning.īetter Performance: Lightest agent in the market - 4mb fully installed enables fast deployment and reduced CPU usage requirements on the endpoint. Any time a threat is encountered by one customer, all other customers are protected from that threat in real time.Įase of Management: Fully remote cloud based management, granular Global Site Management console offers ability to manage multiple sites and locations from a single-pane of glass with more than 40+ remote agent commands available. Multi-vectored protection model provides protection against differing forms of attack including phishing, zero-day and polymorphic threats. Industry leading efficacy – 99.7%+ classification rates. One of its kind, cloud-based, 5th Generation Machine Learning powered predictive protection. Real Time Protection: Behavior-based, not signature-based. Trusted TI supplier to over 90 network and security vendors. Webroot Platform threat intelligence powered by latest 6th generation machine learning.First advanced next gen, cloud-based, real-time, multi-threat vector protection.Multi OS, virtualization, terminal server, and Citrix support – Supports MacOS® devices, Windows® computers and servers, virtualization, terminal server, and Citrix environments.īrightCloud® Threat Intelligence Services are available through and for more than 70 leading network and security provider solutions.įeature Set, Webroot Endpoint Protection:.Full offline protection – Stops attacks even when offline and enables admins to create separate file execution policies for local disk, USB, CD, and DVD drives.Powerful heuristics – Lets admins adjust heuristic detection based on risk tolerance for file execution.Infrared dynamic risk prevention – Analyzes individual user behavior to dynamically tailor malware prevention heuristics.Intelligent firewall – The system-monitoring and application-aware outbound firewall augments the built in Windows firewall to protect users both on and off corporate networks.White and blacklisting – Offers direct control over application execution.User identity and privacy protection – The Identity Shield (browser and application isolation) is trusted by the world’s leading banks to stop attacks like DNS poisoning, keylogging, screen grabbing, cookie scraping, clipboard grabbing, and browser and session hijacking by malicious software.Malicious script protection – Patented Webroot® Evasion Shield technology detects, blocks, and remediates (quarantines) evasive script attacks, whether they are filebased, fileless, obfuscated, or encrypted, and prevents malicious behaviors from executing in PowerShell, JavaScript, and VBScript.Multi-shield protection – Webroot’s multi-shield protection includes Real-Time, Behavior, Core System, Web Threat, Identity, Phishing, Evasion, and Offline shields for detection, prevention and protection from complex attacks.Layered user and device defenses – Stops attacks that take advantage of poor user awareness, not just those that target device vulnerabilities.Secure and resilient distributed cloud architecture – Uses multiple secure data centers globally to support customers and roaming users with full-service resilience and redundancy.Webroot® Business Endpoint Protection - Blocks viruses, malware, Trojans, phishing, ransomware, spyware, browser-based attacks, cryptojacking, credential-stealing malware, script-based, and fileless attacks, and a wide range of other threats.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |