IT Central Station is now PeerSpot: Here's why

Webroot Business Endpoint Protection Questions

Miriam Tover - PeerSpot reviewer
Miriam Tover
Senior Delivery Ops Manager
PeerSpot (formerly IT Central Station)

Hi,

We all know it's really hard to get good pricing and cost information.

Please share what you can so you can help your peers.

Miriam Tover - PeerSpot reviewer
Miriam Tover
Senior Delivery Ops Manager
PeerSpot (formerly IT Central Station)
Apr 01 2022

Hi Everyone,

What do you like most about Webroot Business Endpoint Protection?

Thanks for sharing your thoughts with the community!

Julia Frohwein - PeerSpot reviewer
Julia Frohwein
Content and Social Media Manager
PeerSpot (formerly IT Central Station)
Apr 01 2022

Please share with the community what you think needs improvement with Webroot Business Endpoint Protection.

What are its weaknesses? What would you like to see changed in a future version?

Julia Frohwein - PeerSpot reviewer
Julia Frohwein
Content and Social Media Manager
PeerSpot (formerly IT Central Station)
Apr 01 2022

How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

Julia Frohwein - PeerSpot reviewer
Julia Frohwein
Content and Social Media Manager
PeerSpot (formerly IT Central Station)
Apr 01 2022

If you were talking to someone whose organization is considering Webroot Business Endpoint Protection, what would you say?

How would you rate it and why? Any other tips or advice?

Endpoint Protection for Business (EPP) Questions
ΔΗΜΗΤΡΙΟΣ ΠΑΓΩΝΗΣ - PeerSpot reviewer
ΔΗΜΗΤΡΙΟΣ ΠΑΓΩΝΗΣ
User at Remedy
Apr 28 2022
Hi community professionals, I am looking for your advice on whether it makes sense to use both an endpoint antivirus and an EDR solution simultaneously? What are the pros and cons of using each one or both simultaneously? *In terms of products, I've been looking at CrowdStrike Falcon, Microsoft...
Read More »
Alex S - PeerSpot reviewer
Alex SThe “Antivirus” protection technology is replaced by EDR which does include a… more »
ChandanMunshi - PeerSpot reviewer
ChandanMunshiEDR (or XDR) is the new coinage for endpoint security technology.  Although… more »
5 Answers
reviewer1799568 - PeerSpot reviewer
CIO & Information manager at a leisure / travel company with 501-1,000 employees
Apr 26 2022
Hi peers,   I work as the CIO & Information Manager in the gaming and gambling industry. The company has 650 employees and >30.000 customers. I'm not able to find a study where Darktrace is compared against Crowdstrike Falcon (or other solutions for endpoint security, e.g. Sentinel One)....
Read More »
reviewer1405356 - PeerSpot reviewer
reviewer1405356Hi @reviewer1799568, Most of these comparisons are opinions and some tests are… more »
3 Answers
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Feb 23 2022

Hi,

What are the top trends that you predict about the Endpoint Protection Platform (EPP) solutions for this year?

ITSecuri7cfd - PeerSpot reviewer
ITSecuri7cfdMore regular a/v collapsed into endpoint protection, move from console to cloud… more »
3 Answers
Shibu Babuchandran - PeerSpot reviewer
Shibu Babuchandran
Regional Manager/ Service Delivery at ASPL Info Services
Jan 28 2022

Hi community,

What is EDR? How different is it from Endpoint protection solutions?

Thanks in advance!

Giusel - PeerSpot reviewer
Giusel
IT Engineer at UTMStack
Jan 20 2022

Hi, community!

Usually, when professionals administer the network, they use an Active Directory tool and a cybersecurity solution (e.g., EPP, anti-virus, or SIEM) separately.

Are you aware of SIEM platforms that integrate these tools?

Avraham Sonenthal - PeerSpot reviewer
Avraham SonenthalI agree with the users who mentioned Splunk. Splunk is a log message management… more »
Norman Freitag - PeerSpot reviewer
Norman FreitagHi @Giusel, I agree with Shibu Splunk it's probably the best fit (or single… more »
Robert Cheruiyot - PeerSpot reviewer
Robert CheruiyotHi @Giusel, With the rise in insider threats, the idea of UEBA is becoming a… more »
6 Answers
Edwin Omondi Ambogo - PeerSpot reviewer
Edwin Omondi Ambogo
Senior Technologist at LAIKIPIA UNIVERSITY
Hello dear community, My organization (a university with 500+ employees and ~5000 students) is looking for an endpoint security solution. Currently, we have Seqrite Endpoint Security, Comodo Advanced Endpoint Protection and Kaspersky Endpoint Security on the table for our consideration.  Which ...
Read More »
Satish Singh - PeerSpot reviewer
Satish Singh
Cloud Security Architect at Kyndryl
Hi dear professionals, I'm working as the Cloud Security Architect at a Tech Sevices company with 10,000+ employees and I'm looking for suggestions about on-premise endpoint security solutions.  Please recommend the best product/solution that fits the requirements below (salient features and ex...
Read More »
Eric Rise - PeerSpot reviewer
Eric RiseSatish, Thank you for your well-thought-out and detailed question on this… more »
6 Answers
reviewer1603851 - PeerSpot reviewer
User at TUBITAK
Hello peers, I am working as an IT member at a research company with 200 employees (at most). I am looking at the pros and cons of SCCM and BigFix software.  At the moment, we are using BigFix just for updating and I think if we switch to SCCM that would be a more complicated and costly soluti...
Read More »
Kumar Mahadevan - PeerSpot reviewer
Kumar MahadevanSCCM is very robust but you need more time and people to manage it.  For a… more »
Kirk Stephen - PeerSpot reviewer
Kirk StephenWe have 1500 users and even with a reasonable sized support team we find SCCM… more »
Muhammad Waseem - PeerSpot reviewer
Muhammad WaseemHi Ihsan,  Hope you are doing well, As per my experience to deploy SCCM for… more »
5 Answers
Rony_Sklar - PeerSpot reviewer
Rony_Sklar
PeerSpot (formerly IT Central Station)

Hi peers,

What is the difference between a compromise assessment and threat hunting? 

How do each contribute to Endpoint Protection?

Geoffrey Poer - PeerSpot reviewer
Geoffrey PoerA Compromise Assessment (CA) is an active and generally scheduled engagement… more »
Nikki Webb - PeerSpot reviewer
Nikki WebbThreat hunting typically comes before a compromise assessment. Threat Hunting… more »
5 Answers
Nurit Sherman - PeerSpot reviewer
Nurit Sherman
Content Specialist
PeerSpot (formerly IT Central Station)
Hi community,  We all know that it's important to conduct a trial and/or proof-of-concept as part of the buying process.  Do you have any advice for your peers about the best way to conduct a trial/POC?  How do you conduct a trial effectively? Are there any mistakes to avoid?
Read More »
James Kiely - PeerSpot reviewer
James KielyEnsure you have a defined set of outcomes. Communicate these expectations to the… more »
Jairo Willian Pereira - PeerSpot reviewer
Jairo Willian PereiraMistakes: 1. Choosing only using a Gartner magic quadrant. 2. Don't consider… more »
ITSecuri7cfd - PeerSpot reviewer
ITSecuri7cfdOnce you have narrowed down the top 5 picks for a capability/solution, we… more »
18 Answers
Mostafa  - PeerSpot reviewer
Mostafa
System Administrator at Suez Canal Insurance

What is the best for ransomware infection? 

Alex Vakulov - PeerSpot reviewer
Alex VakulovInstall all security updates, create an incident response plan, use whitelisting… more »
Siddharth Narayanan - PeerSpot reviewer
Siddharth NarayananIPS & Blocking unwanted extensions at gateway level.
Nadeem Syed - PeerSpot reviewer
Nadeem Syedthere are different solutions for ransomware these days. Best i have found is… more »
7 Answers
Ariel Lindenfeld - PeerSpot reviewer
Ariel Lindenfeld
Sr. Director of Community
PeerSpot (formerly IT Central Station)
Feb 17 2022

Let the community know what you think. Share your opinions now!

it_user400131 - PeerSpot reviewer
it_user400131evaluation of endpoint protection should look at what the product offers for… more »
it_user762459 - PeerSpot reviewer
it_user762459Key points for me are speed, scale & reporting, and I generally classify my… more »
J Rice - PeerSpot reviewer
J RiceBeing more advanced than a signature-based system. Its ability to detect lateral… more »
16 Answers