OpenText Core Endpoint Protection Primary Use Case
We use Webroot Business Endpoint Protection as a NextGen antivirus solution for our clients. It's included in the contract we have with our clients as a cost-effective option for antivirus protection.
View full review »Webroot Business Endpoint Protection is one of the solutions my solution provider recommends using with my RMM tool since the product offers better integration capabilities and pricing models.
I use Webroot Business Endpoint Protection in my company for endpoint security, virus protection, and web security.
I use Webroot Business Endpoint Protection for my company's smaller customers who cannot buy EDRs.
Buyer's Guide
OpenText Core Endpoint Protection
June 2025

Learn what your peers think about OpenText Core Endpoint Protection. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
859,579 professionals have used our research since 2012.
Webroot provides endpoint protection for 20 PCs in our office and our server. It also provides DNS protection.
View full review »We've got it on a few hundred workstations on the solution. We use it as an antivirus.
View full review »It is just an antivirus. We have it on the machines to help mitigate anything before it takes hold of the network.
View full review »We use it as a security tool for all our production services. So we have Webroot via a client on every production server.
View full review »LO
Laken Oyedokun
Snr. Cyber Security Analyst at a tech services company with 51-200 employees
Webroot Endpoint Protection secures threat mitigation. Then, of course, there are elements for continual data monitoring to get to the areas that are affected.
The ASA is frontline as far as the next-generation firewall goes. We incorporated a whole bunch of elements for identification, classification of threats, grouping, and integration with it; as well as logging application data from endpoints on the network into a log server for further processing. There are a lot of features in ASA. Over time, it has remained the model for NG USM like Webroot.
We have been using a two-prong security system for our network. We had a combination of Kaspersky along with Webroot Business Endpoint Protection. This gave us two layers of defense and it has been working really well for us.
With the current increased world threat scenarios, we are looking for other protection possibilities.
View full review »Our customers use it for protection. It is deployed on most user machines, and the servers are in the cloud.
View full review »OW
Orlando Williams
President at National Payroll
I used the Webroot cloud application to install it on my computers. It has to be installed on each computer, but it's managed through the Webroot cloud application.
I use this solution to keep malware out of my system.
I have five servers on it, and four employees with additional laptops — we process payrolls here. We do all kinds of different things, including accounting.
View full review »All of our machines have Webroot installed on it and actively engage in endpoint protection.
View full review »We use Webroot with other components that can be added to endpoint protection. This gives us a better, more capable solution.
We use Webroot Endpoint Protection as a multi-layered security solution.
MK
Mike Kelly
IT Consultant at ITGenie
We use Webroot Business Endpoint Protection as a security solution. It helps us protect end users' machines.
View full review »I use it on some workstations, but we're in the process of moving away from it. At one point, we had it on all our workstations, but we started having some issues with it, and we've been migrating to Microsoft Defender, which is integrated with the Microsoft 365 environment.
View full review »KG
Kamal Gulati
Managing Director at ITS Technology Solution Pvt. Ltd.
We have servers on the cloud and we have different use cases for Webroot Business Endpoint Protection.
View full review »We are using Webroot Business Endpoint Protection as an antivirus.
View full review »We primarily use the solution for its endpoint protection. We used it as a firewall and antivirus.
View full review »RE
Ramy Elsayed
Administrator at zuuTech
We are a small managed-service provider. One of the services we are providing to our clients is the endpoint protection for mobiles. We are also offering cybersecurity for computers and of course backup plus technical support. So mobile endpoint protection is just one of the various services we are providing.
We install Webroot Endpoint Protection for mobiles for our clients so that we can keep mobiles secured. In case the mobile is stolen or lost, we can wipe everything from the device from our end. We can also locate the mobile and lock the mobile if it is connected to the internet.
Monitoring of supported customer sites for issues and remediation. A number of Doctors offices, and a scattering of other professionals like Lawyers and Training organizations. Most of these sites are controlled through Active Directory policies and Webroot fits nicely as a one-stop console solution for monitoring of infections.
View full review »Webroot is used as the defacto standard for all servers and workstations that we manage security on.
View full review »My primary use cases were protecting against computer infections like viruses or malware files, applying policies to the end-user, and blocking websites or applications from running through the admin console.
View full review »Buyer's Guide
OpenText Core Endpoint Protection
June 2025

Learn what your peers think about OpenText Core Endpoint Protection. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
859,579 professionals have used our research since 2012.