Webroot SecureAnywhere® Business Endpoint Protection

Webroot SecureAnywhere® Business Endpoint Protection
DATASHEET | Endpoint Protection
Webroot SecureAnywhere
Business Endpoint Protection
®
Next-gen security with advanced machine
learning that solves the challenges of
traditional solutions
Overview
Visibile Efficacy
Confidence has never been so low in a key threat prevention technology: endpoint
security. Conventional antivirus protection is struggling to keep up with today’s
threats and attacks. It slows down machines and users and is complex and system
resource-intensive.
A feature-rich endpoint protection solution amounts to nothing if it
can’t deliver its key feature: malware prevention. SecureAnywhere
Business Endpoint Protection is the first malware prevention
technology to report on its own efficacy at detecting infections and
stopping malware. Dwell time reporting gives you visibility into any
infection on any endpoint within your network, showing you when the
infection began and how long it was contained by Webroot before
being automatically remediated.
Now, by combining innovative SecureAnywhere file pattern and predictive behavior
recognition technology with 5th generation machine learning and the almost limitless
processing power of cloud computing, Webroot effectively stops malware and zeroday threats at the moment of attack. The smarter, Webroot® approach to malware
prevention is more effective and accountable than any conventional antivirus. You
no longer need to rely on an outmoded detection model that is easily overwhelmed
by today’s malware—a model that yields unknown dwell times and doesn’t alert on
attacks until long after the infiltration has occured.
A major factor contributing to the efficacy of SecureAnywhere
Business Endpoint Protection is its continuous infection monitoring,
journaling, and auto-remediation. If it cannot immediately categorize
new or changed files and processes as ‘known’ good or ‘known’
bad, then the agent begins monitoring and journaling all events. If
an observed process is categorized as malicious, then any system
changes are reversed and the endpoint is auto-remediated to its last
known good state. This extra layer ensures minimal false positives.
On the rare occasion that a false positive does occur, admins can
easily white list files as needed within their management console.
Nearly every antivirus still presents the hassle of ensuring every endpoint has the latest
update. SecureAnywhere Business Endpoint Protection communicates with the cloud,
which means there are no definition or signature updates to deploy and manage. As
malware detection occurs continuously in real time, performance issues fade away.
Scheduled systems scans are normally around 30 seconds1 and never impact device
performance. Virtual desktop and server environments, plus many embedded operating
systems, also see improved performance.
Flexible Cloud-Based Management
Webroot SecureAnywhere solutions use cloud-based management,
which means no on-premise hardware or software is needed and the
console is always up to date. Webroot offers a standard console or
our Global Site Manager console, so you can choose the management
features appropriate to your organization’s needs. The standard
console is perfect for managing anything up to 1,000 endpoints with
less complex user groupings and only a few different policy types.
The Global Site Manager makes it straightforward to manage up to
The world’s smallest and fastest endpoint security client makes deployment fast and
easy. The SecureAnywhere antimalware agent happily coexists with other antivirus
solutions, with no need to immediately rip and replace.
SecureAnywhere Business Endpoint Protection is a smarter way to solve malware
prevention, endpoint security performance, management. It provides the protection
you need without the demanding overhead of conventional antivirus.
The world’s smallest, fastest endpoint security client makes deployment quick and easy.
1
“Webroot SecureAnywhere® Business Endpoint Protection vs. Seven Competitors” PassMark Software. August 2015.
Webroot
Customers
Webroot
Data Center
Files
Webroot®
Threat Intelligence
Platform
Corporate
Workstations
& Remote Users
Uncovering zero-day malware
100,000 endpoints, and, through its hierarchical management architecture,
you can easily control multiple sites and locations. The Global Site Manager
also supports policies at the global and individual site level, plus local site
administration access rights and permissions that are easily managed
alongside central administration of all sites.
This makes Global Site Manager ideal for global and or multi-location
organizations, as well as Managed Services Providers (MSPs) administering
numerous customer sites. Cloud-based management with full remote
endpoint administration also makes the delivery of global management
extraordinarily cost-effective compared to conventional antivirus.
Powering Predictive Prevention
All Webroot SecureAnywhere solutions are powered by the Webroot®
Threat Intelligence Platform. Leveraging big data analytics, 5th generation
machine learning, and collective threat intelligence from customers and
technology partners worldwide, the Webroot Threat Intelligence Platform
identifies infections as they occur. This big data architecture continuously
processes, analyzes, correlates and contextualizes vast amounts of disparate
information while also applying a patented, fifth-generation machine learning
and malicious code identification system to create predictive behavioral
determinations on malware instantly – with incredibly high accuracy.
Big data processing allows SecureAnywhere Business Endpoint Protection
to uncover malware as it attempts to infect an individual user’s endpoint,
while simultaneously protecting all other SecureAnywhere endpoints against
the same attacks. This collective approach to threat intelligence creates
a massive real-time malware detection net that has intimate knowledge
of more than 300 million executables, including their runtime behavioral
characteristics and interactions. This, coupled with hundreds of terabytes of
threat data, ensures that Webroot customers are continuously protected from
both existing and new threats.
Infection Dwell Time: Visibility into Containment and Remediation
First seen globally
First date determined malicious
First/last seen on this endpoint
First/last seen in your network
Interactive drill down
malware information
Any other endpoint(s) infected
with this unique therat
Dwell time calculation
Key Security Features
Webroot SecureAnywhere Business Endpoint Protection focuses on delivering
a high-performance endpoint malware prevention and management solution.
It offers highly accurate and effective endpoint malware prevention with a
range of additional security shield capabilities that keep both the user and the
device safe.
Identity & Privacy Shield
These shields protect users by assuming the endpoint is already infected
by some completely undetectable malware. They protect user information
and transactional data that could be exposed during online transactions
from specific types of threats, including phishing, DNS poisoning, keystroke
logging, screen grabbing, cookie scraping, clipboard grabbing, and browser
and session hijacking by malicious software mounting man-in-the-browser
or man-in-the-middle attacks. The Sheilds lock down the OS and browser to
protect all user information and credentials – even shared passwords. Aside
from securing browser activities, the Identity Shield may be extended under
user policy to cover other endpoint applications by adding them to the Identity
Shield protection list, securing those applications.
Infrared
Infrared is a multi-layer defense incorporating several aspects of Webroot
Threat Intelligence to help thwart threats early on in their lifecycle – often
before a threat researcher sees a single sample. It looks at the reputation
of the websites an individual visits and uses Webroot Threat Intelligence
to determine their risk level. If the user commonly visits low-reputation
websites, then the endpoint goes into a state of heightened awareness and
closely interrogates any new files or processes that are introduced into their
system. Infrared also interprets user behaviors and the overall safety level of
the user. So, if a user is classified as “high risk”, Webroot then dynamically
tunes malware prevention to that user, while preventing false positives for
less risky users.
Web Threat Shield
The Web Threat Shield leverages Webroot anti-phishing technology to offer
unique real-time protection against polymorphic phishing URLs, as well as
malicious and high-risk websites and domains.
Intelligent Outbound Firewall
In addition to its Shields, Webroot SecureAnywhere Business Endpoint
Protection has its own intelligent system-monitoring and application-aware
outbound firewall. This sophisticated firewall protects users both within and
outside the corporate gateway, augmenting the Microsoft Windows® firewall
to offer full control of outbound and inbound connections without adding
an unnecessary drain on endpoint resources. It manages and monitors all
outbound traffic to protect against “phone-home” threats and ensures that
only policy-approved applications communicate with the network. It also
automatically recognizes known good and bad programs, so users aren’t
pestered with pop-ups or forced to make uninformed judgments.
The Webroot® Threat Intelligence Platform – the most powerful real-time threat analysis engine in the world
Powerful Heuristics
Heuristic settings can be adjusted based on risk tolerance for file execution.
Heuristic settings include:
Offline Protection
Stops attacks when an endpoint is offline with separate file execution policies
applicable to local disk, USB, CD, and DVD drives.
»» Advanced
Analyzes new programs for suspicious actions that are typical of malware
Virtualization, Terminal Server & Citrix Support
In addition to supporting Windows PC environments, SecureAnywhere
Business Endpoint Protection also supports Windows Server, Virtualization,
Terminal Server and Citrix environments.
»» Age
Analyzes new programs based on the time a similar file has existed within
Webroot Threat Intelligence
»» Popularity
Analyzes new programs based on how often a file is used or changed within
Webroot Threat Intelligence
Mobile Smartphone and Tablet Support
Webroot SecureAnywhere® Business Mobile Protection is available for
Android® and iOS® smartphones and tablets.
Resilient Distributed Cloud Architecture
Consists of multiple secure global data centers to support local offices
and roaming users through their nearest data center, providing full service
resilience and redundancy.
About Webroot
Webroot delivers next-generation network and endpoint security and threat intelligence services to protect businesses and individuals around the globe. Our smarter approach harnesses the power of cloudbased collective threat intelligence derived from millions of real-world devices to stop threats in real time and help secure the connected world. Our award-winning SecureAnywhere® endpoint solutions and
BrightCloud® Threat Intelligence Services protect millions of devices across businesses, home users, and the Internet of Things. Trusted and integrated by market-leading companies, including Cisco, Citrix,
F5 Networks, Aruba, Palo Alto Networks, A10 Networks, and more, Webroot is headquartered in Colorado and operates globally across North America, Europe, and Asia. Discover Smarter Cybersecurity™
solutions at webroot.com.
World Headquarters
385 Interlocken Crescent
Suite 800
Broomfield, Colorado 80021 USA
+1 800 772 9383
Webroot EMEA
6th floor, Block A
1 George’s Quay Plaza
George’s Quay, Dublin 2, Ireland
+44 (0) 870 1417 070
Webroot APAC
Suite 1402, Level 14, Tower A
821 Pacific Highway
Chatswood, NSW 2067, Australia
+61 (0) 2 8071 1900
©2017 Webroot Inc. All rights reserved. Webroot, Webroot BrightCloud and BrightCloud are trademarks or registered trademarks of Webroot Inc. in the United States and/or other countries. All other trademarks are properties of their respective owners.
DS _ 011917 _ US
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement