Coming October 25: PeerSpot Awards will be announced! Learn more
2019-07-02T11:47:00Z
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
  • 0
  • 10

What do you like most about Webroot Business Endpoint Protection?

Hi Everyone,

What do you like most about Webroot Business Endpoint Protection?

Thanks for sharing your thoughts with the community!

15
PeerSpot user
15 Answers
ShaneHaggerty - PeerSpot reviewer
Level III Technician at a tech services company with 201-500 employees
MSP
Top 5
2022-07-12T22:42:55Z
12 July 22

It is pretty unintrusive. It doesn't take over the system like McAfee or Norton. It doesn't use a whole lot of resources. McAfee and Norton use a lot of resources.

Rick Cassel - PeerSpot reviewer
Owner at R. A. Cassel & Associates
Reseller
Top 20
2022-07-06T21:12:48Z
06 July 22

Probably, compared to other antivirus programs, what we like about it is it is lightweight.

OW
President at National Payroll
Real User
Top 10
2022-06-08T20:29:00Z
08 June 22

Webroot's tech support is pretty good; they've given me some pointers.

LO
Snr. Cyber Security Analyst at a tech services company with 51-200 employees
Real User
2022-04-01T19:22:02Z
01 April 22

They have a lot of features integrated from way back, which shows that the product developers know exactly what they're doing.

RE
Administrator at a financial services firm with 10,001+ employees
Real User
Top 10
2021-12-13T19:46:45Z
13 December 21

Doesn't consume resources or affect the computer performance at all.

KG
Managing Director at ITS Technology Solution Pvt. Ltd.
Real User
Top 5
2021-10-29T13:52:58Z
29 October 21

The solution is very simple and straightforward to use.

Learn what your peers think about Webroot Business Endpoint Protection. Get advice and tips from experienced pros sharing their opinions. Updated: September 2022.
633,184 professionals have used our research since 2012.
TS
Network Manager, Enterprise at a tech services company with 11-50 employees
MSP
Top 10
2021-09-08T15:00:16Z
08 September 21

I like that Webroot is very lightweight. It didn't bog down the machine, and more importantly, it had heuristics artificial intelligence to some degree. It wasn't like full-blown artificial intelligence, but something where you have one endpoint recognizing issues because it maintains a cloud database.

If one client recognizes a threat, it would add it to the database, and almost immediately, every agent in the world would also know about that threat. That was very appealing to us. However, now it's becoming commonplace, whereas ventures like Symantec and McAfee were based more on the traditional model of definition and updates, and we were always falling behind. Webroot also has pretty good technical support.

NV
Manager-IT at a financial services firm with 11-50 employees
Real User
2021-07-13T15:11:01Z
13 July 21

The solution has many features. It is very easy to define and set the policies based on the user groups, it does not take up a lot of resources in operation, and has provided us with a good track record of protection.

FB
Managing Partner at a tech services company with 11-50 employees
Real User
Top 20
2021-04-12T14:14:17Z
12 April 21

It is very light. It is the only solution that can be installed on a machine that already has an antivirus. It is a pretty complete solution.

MS
Resp. Sistemi Informativi/ IT Manager at a consumer goods company with 51-200 employees
Real User
Top 10
2020-11-24T13:12:47Z
24 November 20

The initial setup is not complex at all. It's very straightforward.

JS
Senior Network Engineer at Computer Consultants
Real User
2020-07-16T06:21:08Z
16 July 20

Their policy management, their cloud-based dashboard and user interface are very easy to navigate.

Larry Mackey - PeerSpot reviewer
Sr Project Manager at a tech services company with 11-50 employees
Real User
2020-06-28T08:51:00Z
28 June 20

We've not had any issues with scalability. If an organization needs to expand, they can do so quite easily.

Ramy Elsayed - PeerSpot reviewer
Administrator at zuuTech
Real User
2020-02-13T07:51:00Z
13 February 20

It is excellent endpoint protection for mobiles that does everything it says it will.

JR
Chief Technology Officer at a tech services company with 51-200 employees
Real User
2019-12-02T09:27:00Z
02 December 19

The most valuable features of the solution include the endpoint navigation protection, the protection related to the EMS service, as well as the control and the cloud integration capabilities.

it_user1011267 - PeerSpot reviewer
Senior IT Consultant at Jeneri IT
Real User
2019-07-02T11:47:00Z
02 July 19

The feature we found most valuable is the AI functionality for maintaining endpoint security. This is very powerful.

Related Questions
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
Jul 12, 2022
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
2 out of 8 answers
Larry Mackey - PeerSpot reviewer
Sr Project Manager at a tech services company with 11-50 employees
28 June 20
I can't recall the exact pricing, but I believe there is a monthly fee of $20-30 per user.
JS
Senior Network Engineer at Computer Consultants
16 July 20
The solution is pretty cheap, actually. At our level, which is at 2,500 endpoints, we're paying 87 cents an agent per month.
Nurit Sherman - PeerSpot reviewer
Content Operations Manager at PeerSpot (formerly IT Central Station)
Aug 25, 2021
Hi community,  We all know that it's important to conduct a trial and/or proof-of-concept as part of the buying process.  Do you have any advice for your peers about the best way to conduct a trial/POC?  How do you conduct a trial effectively? Are there any mistakes to avoid?
2 out of 18 answers
JC
consultant
30 July 18
You might want to start out with business cases ... ensuring that your endpoint solution begins to address those. some ideas might include: * antivirus * antivirus updates via automation * antivirus updates via cloud or on premise automation * antivirus reporting to central on premise management server * do you want to rely upon static signatures? * do you want to find the zero days? * what about polymorphic / variants of previously known malware? * will your antivirus mechanism share with other machines / computer their discoveries? * do you want to share your information with the manufacturer (via cloud) or keep your discoveries in house / on premise? * DLP -data loss protection * DLP reporting to central management server * DLP - how easily configurable? * DLP -what type of additional work will this entail for analyses, etc * Host Intrusion Prevention (HIP) * HIP - will it report to a central management server? * How will all the central management servers communicate with each other / other computers? * Do you have to tier the solution due to network segmentation / geographic considerations / size of deployment? * Will the endpoint product talk to or receive from other security devices (email, web filters, etc at the perimeter?) * has Gartner developed some frameworks that are used for testing endpoint solutions? * has Gartner at least testing the solution you are looking at? * potentially check firecompass.com for endpoint solution comparisons? * does endpoint protection support all operating systems you are using? * does endpoint protection interface with other security products on the endpoint? * logging ... is it detailed enough? * do you want to automatically quarantine computer if malware is found? * go through vendors data sheet and ensure you check all capabilities and test them * what things did the vendor promise? test those. * talk to a couple of their customers (same size organization if possible using similar if not same endpoint protection capabilities). discuss roll out, problems faced, vendor assistance, etc. A couple of ideas - certainly not exhaustive. ___________________
JC
consultant
30 July 18
adding: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-46r2.pdf Guide to Enterprise Telework, Remote Access, and Bring ... nvlpubs.nist.gov NIST Special Publication 800-46 . Revision 2. Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security . Murugiah Souppaya Guide to storage encryption technologies for end user devices nvlpubs.nist.gov Guide to Storage Encryption Technologies for End User Devices Recommendations of the National Institute of Standards and Technology Karen Scarfone ________________________________
Download Free Report
Download our free Webroot Business Endpoint Protection Report and get advice and tips from experienced pros sharing their opinions. Updated: September 2022.
DOWNLOAD NOW
633,184 professionals have used our research since 2012.