Webroot Web Security

Smarter benefits, smarter business

REDUCED TOTAL COST OF OWNERSHIP

» No hardware or software to install or manage

» Low ongoing administration overheads

» No switching fees or other upfront costs

» Pay-as-you-go per user/per year model

» Comprehensive 24x7x365 support included

PROACTIVE WEB SECURITY

» Stops threats before they reach networks or users

» Heuristic filters protect against unknown threats

» URL filtering and content blocking

» Real-time anti-phishing protection

» Automatically detects anonymizing proxies

SIMPLIFIED MANAGEMENT

» Intuitive web-based management console

» Set policies at account, group, or user level

» Active Directory and LDAP integration

» Detailed ad-hoc and scheduled reporting

» Auto-updating Desktop Web Proxy agent

web-gateway-protection.png

Web gateway protection

Stop threats at the network’s edge, enforce internet usage policies, and prevent phishing and other web-borne threats.

complete-policy-controls-protection.png

Complete policy controls & protection

Prevent users from bypassing security controls. The tamper-proof agent provides seamless user authentication and detects anonymizing proxies to enforce policies.

encrypted-traffic-scanning.png

Encrypted traffic scanning

Block malware and data theft over SSL/HTTPS encrypted traffic. Decrypts and scans traffic to ensure content filtering policies are applied and the network stays secure.

online-management.png

Online management

Reduce hassle and total cost of ownership (TCO). The Webroot management portal is available from any browser, so you don’t need on-premise management hardware or software.

real-time-zombie-detectionalerting.png

Real-time zombie detection & alerting

Recognizes when machines become "zombies" that communicate with botnets and command and control servers, then blocks contact and alerts admins.

network-support-for-guests.png

Network support for guests

Apply a persistent cookie approach, so the guest’s browser is managed by the guest network policy even without an installed agent.

comprehensive-logging-reporting.png

Comprehensive logging & reporting

Provides detailed reports ad-hoc or on a scheduled basis for timely and accurate internet usage monitoring.

roaming-control.png

Roaming control

Enforces policies on remote, off-network users, ensuring they are fully provisioned to receive automatic and uninterrupted protection.

Supported systems & browsers

Desktops

  • Windows® 10 32- and 64-bit, Microsoft Edge® browser not currently supported
  • Windows 8, 8.1, 32 and 64-bit
  • Windows 7, 32 and 64-bit
  • Windows Vista®, 32 and 64-bit
  • Windows XP® SP 2 & 3, 32 and 64-bit
  • Windows XP Embedded
  • Mac OS® X v.10.11 (OS X “El Capitan®")
  • Mac OS X v.10.10 (OS X “Yosemite®")
  • Mac OS X v.10.9 (OS X “Mavericks®")
  • Mac OS X v.10.8 (OS X “Mountain Lion®”)

Search engines

  • Monitor search queries using any of the search engines below via the Web Security Service dashboard.
  • Google®
  • Yahoo!®
  • bing!®
  • Monster Crawler™
  • Wikipedia®
  • YouTube®

Browsers and LDAP servers

  • Browsers
  • Internet Explorer® version 8 and newer
  • Mozilla® Firefox®, the latest 5 versions
  • Google Chrome®, the latest 5 versions
  • Safari® 5.0 and newer
  • Opera 11 and newer
  • LDAP servers
  • MS® Active Directory

Get Webroot Web Security NOW!