Web Security Service
FAQ
INTRODUCTION
Secure web gateway technology has traditionally been offered as on-site software and appliance solutions and has required users to
be on the corporate network for web policy management.
The Webroot SecureAnywhere® Web Security Service is a cloud-based software as a service (SaaS) secure web gateway, making it
highly suitable for enforcing web security policies regardless of an employee’s location.
What follows are answers to some of the common questions about the Webroot SecureAnywhere® Web Security Service and how it
works to protect personnel from malware.
MALWARE EFFECTIVENESS
Q: Do you need web security if you already have endpoint security installed?
A: YES. The Webroot SecureAnywhere® Web Security Service is an additional and necessary layer of defense that is designed to stop
malware before it reaches your network and end users. Endpoint antivirus should be considered the last line of defense. When the
physical endpoint system is compromised, the potential for network infiltration, data exfiltration, identity theft, financial loss and other
malicious activities increases.
Q: What type of antimalware defense does the Webroot SecureAnywhere Web Security Service provide?
A: The Webroot SecureAnywhere Web Security Service scans all browser traffic over HTTP, FTP over HTTP and HTTPS*. All requests
are intercepted in the cloud. Webroot protects users against both known and unknown malware using dedicated antivirus, antispyware
and multiple zero-hour heuristic filter defenses, countering script-based as well as file-based malware.
Q: Does the Web Security Service protect against phishing attacks?
A: YES. Webroot provides industry-leading anti-phishing defenses. In near real time, Webroot services can determine whether a site
contains phishing threats with 99%+ accuracy, even if the site is only a few minutes old. Webroot performs over 200 checks and uses
all the threat data available via the Webroot® Intelligence Network (WIN) to identify and block phishing attacks as they occur. This early
warning breakthrough is vital, since phishing sites are transient by nature and only exist for short periods of time to evade detection.
Q: Does the Web Security Service protect against anonymizing proxies?
A: YES. Anonymizing proxies are websites that hide users’ browsing history from their organization. The proprietary Webroot Desktop Web
Proxy (DWP) agent is designed to counter such web misuse by ensuring that all web traffic is checked by the Web Security Service.
Q: Does Webroot protect against known bad IP addresses and IPs with bad reputation?
A: YES. Webroot leverages Webroot BrightCloud® services and the Webroot® Intelligence Network to provide the latest malicious web
and IP reputation data.
Q: Does Webroot provide scan ahead and proactive Safe Search capabilities?
A: YES. Webroot provides secure scan ahead technology that examines all search queries and returns color-coded search results based
on individual users’ internet access policy. This helps administrators enforce sensible internet usage policies and mitigate the threats from
harmful content on unsafe sites. It also protects users from exposure to inappropriate content, including thumbnail images.
Copyright © Webroot Inc. » INTERNAL & PARTNER USE ONLY
Q: Does Webroot protect off-network and remote users?
A: YES. The Webroot Desktop Web Proxy protects users regardless of location because the agent is installed directly on each user’s
computer. This ensures that they remain connected to the internet via the Webroot service.
INTERNET ACCESS CONTROL
Q: Does Webroot provide accurate URL filtering?
A: YES. Unlike many other web security solutions Webroot offers its own third generation URL categorization and filtering engine, widely
recognized as one of the security industry’s ‘best-in-class’ URL filtering solutions. Its breadth and accuracy is independently verified,
and it allows web security Administrators to enforce acceptable web site access policies, while minimizing any site re-categorization
help desk calls. URLs are grouped into over 83+ categories and subcategories and are continuously updated to ensure accurate and
advanced user web site access control.
Q: Does Webroot provide any web content filtering?
A: YES. The web security service allows you to filter content by file type, including graphic files, executable files, streaming media files,
archives, documents, and applications.
Q: Does Webroot support any form of user web usage quota controls?
A: YES. The Web Security Service allows you to restrict usage by controlling bandwidth, time spent surfing, and number of sites that
can be accessed within a 24-hour period. URL categories can also be either selectively blocked or open according to time of day.
MANAGEMENT/FUNCTIONALITY
Q: Does the Web Security Service need any on premise management?
A: NO. Administrators can manage the Webroot SecureAnywhere® Web Security Service from any location via an online management console.
Q: How do you deploy the Desktop Web Proxy agent?
A: The agent is easily deployed using our packaged MSI installation file, via group policy objects (GPO), or any existing deployment tool.
Due to the small file size—under 2.5MB—installation typically takes seconds.
Q: Does Webroot offer an Active Directory (AD) integration?
A: YES. Webroot supports LDAP for Microsoft Active Directory.
Q: Does the management console have granular policy capabilities, e.g., setting up a different policy by group or individual endpoint?
A: YES. The management console offers a customized group structure, which you can then use to group computers together based on
your own criteria. Specifically configured policies can then be applied to those computers as needed.
Q: Since this solution is cloud-based, what information does it capture and how does it protect my data?
A: Webroot solutions operate on a highly distributed datacenter infrastructure architecture that uses Amazon Web Services globally
to connect with the Webroot® Intelligence Network. These secure datacenters have highly restrictive access controls and are
accredited under security standards such as SAS70 II and ISO27001. Within the management console, you’ll find user web log
information, policy information, administrator details, and auditing log files. Webroot administrators must have specific permission
to access any data.
Copyright © Webroot Inc. » INTERNAL & PARTNER USE ONLY
Q: Does the Web Security Service provide up-to-date logs for reporting and other management tasks?
A: YES. Logs are available for up to 365 days for historical information and generating reports. Webroot log files are also always at hand, so
administrators can run detailed reports ad-hoc or at scheduled times, allowing both timely and accurate internet usage monitoring.
Q: Does the Web Security Service offer custom reporting?
A: YES. All reports have different levels of customization, allowing reports for targeted datasets. These are currently available in .PDF
and .CSV formats, as well as direct print from browser. All reports are available for scheduled delivery. Reporting graphs include web
traffic trend, top blocked URLs, blocked malware, bandwidth usage, and many more. Reporting schedules are easy to set up and
distribute automatically via email. Administrators can combine up to 100 separate charts for maximum visibility into overall and
individual internet usage.
Q: Can I manage all web users through one management console?
A: YES. Our centralized online management console offers full management over all web users from a single console as well as
different administration access permissions.
Q: Does Webroot offer high performance web browsing?
A: YES. Our distributed service architecture minimizes any web access latency from using the web security service. Our global,
multi-tenant, fully redundant datacenters are served by Global Server Load Balancing (GSLB), which automatically routes web
traffic through the nearest datacenter to ensure rapid response times. Our propriety and unique web content download acceleration
technology, combined with high-performance proxies, further improves the user experience and ensures policy compliance.
INFRASTRUCTURE IMPACT
Q: Does the Web Security Service use up more bandwidth?
A: NO. In fact, the Webroot SecureAnywhere® Web Security Service will save bandwidth. The service automatically compresses user
web page requests for optimum performance and minimal latency. Additionally, administrators can block pictures from web pages to
reduce bandwidth even further, while Webroot automatically reformats the web page to remove resulting whitespace.
Q: Does the Web Security Service require any network or firewall changes?
A: SOMETIMES. Typically, no changes are needed. However, if your firewall is locked down, minor changes are necessary.
Q: Does the Web Security Service require any changes to endpoint systems?
A: YES. If you force users to always connect via your network, then no changes are required; however, this introduces latency and
severely degrades web browsing performance. For most deployments, we recommend administrators install the Webroot DWP agent,
which optimizes performance regardless of location and ensures that web policies enforcement.
Q: Does the Web Security Service require any authentication?
A: NO. Our DWP agent enforces seamless authentication and is automatically updated to the latest version, minimizing operational
administration. Users may be asked for their Windows credentials if the agent is not installed.
COMPATIBILITY
Q: Will the Webroot SecureAnywhere Web Security Service work on Citrix or Terminal Server machines?
A: YES. Webroot is one of the few cloud-based web security services to provide support for both Citrix and Terminal Services. All Citrix
or Terminal Services users are individually authenticated. Unique policies may then be applied to separate users on a single Citrix or
Terminal Services server and user activity logged individually.
Q: Will the Webroot SecureAnywhere Web Security Service work on Mac® or Linux-based machines?
A: NO. We currently don’t support the Mac or Linux operating systems.
Copyright © Webroot Inc. » INTERNAL & PARTNER USE ONLY
SYSTEM REQUIREMENTS
Management Console Access
» Internet Explorer version 8, 9, and 10, 32- & 64-bit
» Mozilla Firefox, the latest five versions
» Google Chrome, the latest five versions
» Safari, versions 5.0 and above
» Opera, the latest five versions
Search Engines
Query strings typed in to these search engines are shown on the
Dashboard’s Top Search Engine String chart:
» Google
»Yahoo
»Bing
»Monster
»Wikipedia
LDAP Servers
» MS Active Directory
Operating systems for Desktop Web Proxy users
» Windows XP Service Pack 2, 32-bit
» Windows XP Service Pack 3, 32-bit
» Windows 2003, 32-bit
» Windows Vista, 32- and 64-bit
» Windows 7, 32- and 64-bit
» Windows 2008 Enterprise, 32- and 64-bit
» Citrix Presentation Server 4.5, 32-bit
» Citrix XenApp 5.0, Windows 2008 Enterprise, 32-bit
» Citrix XenApp 6.0, Windows 2008 R2 Enterprise, 64-bit
About Webroot
Webroot® is the market leader in cloud delivered security software as a service (SaaS) solutions for consumers, businesses and enterprises. We have revolutionized Internet security to protect all the ways you connect
online. Webroot delivers real-time advanced internet threat protection to customers through its BrightCloud® security intelligence platform, and its SecureAnywhere™ suite of security products for endpoints, mobile
devices and corporate networks. Over 7 million consumers, 1.5 million business users and 1.3 million mobile users are protected by Webroot. Founded in 1997 and headquartered in Colorado, Webroot is the largest
privately held internet security company in the United States – operating globally across North America, Europe and the Asia Pacific region. For more information on our products and services, visit www.webroot.com
World Headquarters
Webroot EMEA
Webroot APAC
385 Interlocken Crescent
Suite 800
Broomfield, Colorado 80021 USA
800 772 9383
6th floor, Block A,
1 George’s Quay Plaza
George’s Quay, Dublin 2, Ireland
+44 (0)870 1417 070
Suite 1402, Level 14, Tower A
821 Pacific Highway
Chatswood, NSW 2067, Australia
+61 (0) 2 8071 1900
1 Webroot SecureAnywhere® Business Endpoint Protection vs. Seven Endpoint Security Products PassMark Software Performance Benchmark Testing – February 2014
© 2014 Webroot Inc. All rights reserved. Webroot, SecureAnywhere, and Webroot SecureAnywhere are trademarks or registered trademarks of Webroot Inc. in the United States and/or other countries. Microsoft, Windows, Windows Vista, and Internet Explorer are trademarks or
registered trademarks of Microsoft Corporation in the United States and/or other countries. Mozilla and Firefox are registered trademarks of the Mozilla Foundation. All other trademarks are properties of their respective owners.
Copyright © Webroot Inc. » INTERNAL & PARTNER USE ONLY
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement