Buy now and install on all your devices from one easy email. X

SecureAnywhere Business
Endpoint Protection

Reducing Outbound Data Risks

Preventing Phone-Home Information Leaks

Webroot SecureAnywhere® provides proactive protection by continuously monitoring file behaviors. While Journaling, Montioring and Roll-back provide capabilities to remediate infections, they do not by themselves prevent malicious payloads from leaving a machine. That is why Webroot SecureAnywhere also contains an active outbound firewall. If network activities initiated by any running file match known ‘bad’ behavior patterns, like a non-file transfer program suddenly attempting to FTP data to a remote site, the file is immediately blocked from network access and execution, and is quarantined. Our data loss prevention solution ensures security for the user regardless of whether the threat is known or unknown.

Free Trial » Buy Now »
Product Details » View Demo » Contact Us »

Select Endpoints and Years

# of PCs to protect (5-999)

Need more than 999 seats?
Please call: ' . $orderPhoneNumber . '

Subscription Length (yrs)

Total Cost:



We are saving users from being infected, which is a boost in productivity for everyone.  It simply works and does what it says it does.  You can't ask for more than that!

Watch Video
Video: Unique Outbound Firewall

Conventional endpoint firewalls require the user or administrator to decide whether a program may access the Internet - Webroot SecureAnywhere® does it differently.

Webroot SecureAnywhere integrates a completely new outbound firewall helper that offers additional capabilities to protect and analyze all outbound connections and manage all outbound application traffic. This intelligent outbound firewall functionality considerably enhances the existing inbound protection offered by the Windows Firewall. It automatically monitors all outbound traffic and blocks illegitimate call home and other types of malware communication - thus immediately stopping them from successfully extracting and stealing data.

This intelligent firewall functionality is managed via the local Agent and by using the Webroot Intelligence Network to validate the legitimacy of outbound traffic communications. It taps into this real-time automated decision making to avoid errors or pestering users with requests for online access from applications that they know nothing about.

By taking firewall decisions about outbound application communication away from the users, we minimize firewall request popups, and prevent user judgment errors that lead to endpoint infections. This approach to firewall management is another unique way that we leverage the benefits of the Webroot Intelligence Network in a very practical, time-saving, yet secure way. And by having the combined capabilities of the Webroot and Windows Firewalls, your endpoint data has reliable inbound and outbound data loss prevention.

business firewall
The Intelligent Outbound Firewall offers additional security by protecting and analyzing outbound connections and managing application traffic.


Webroot allows us to protect people from themselves by blocking access to websites that are likely to give them a virus, nipping it in the bud.  Now, we are not getting the virus in the first place.

Webroot SecureAnywhere®s' real- time protection is enhanced by a series of security shields. These add additional layers to the default security provided within Webroot SecureAnywhere. Upon installation every endpoint is protected by 6 default shields:

  1. Self-Protection Shield
  2. Real-Time Shield
  3. Behavior Shield
  4. Core System Shield
  5. Web Threat Shield
  6. Identity Shield

Watch Video
Video: ID & Privacy Shield

Integrated Shields can be individually tuned to meet 
protection needs
Integrated Shields can be individually tuned to meet protection needs

Self-Protection Shield

The Self-Protection Shield prevents malware from modifying Webroot SecureAnywheres' program settings and processes. This lets Webroot SecureAnywhere defend itself if ever under attack. When combined with its small footprint and the agent/cloud architecture, it makes it more difficult for hackers to disable Webroot SecureAnywhere compared to larger footprint AV defenses.

Real-Time Shield

The Real-time Shield blocks known threats by using the Webroot Intelligence Network. This shield leverages the collective protection offered by the cloud. If a new threat is identified and blocked for one user, all users globally are instantly and automatically protected. This shield also ensures that when a file’s processes are changed or modified it is re-checked for malicious intent.

Behavior Shield

The Behavior Shield analyzes all applications and processes running on an endpoint.  The behavioral shield is also used for checking untrusted programs and blocking any attempts to modify system settings while an endpoint is offline. This shield uses the Webroot Intelligence Network’s extensive behavioral rule sets to check for known malware behaviors.  It works alongside the default monitoring and journaling of unknown or suspicious processes so Webroot SecureAnywhere is able to fully rollback and remediate any endpoint to its pre-infected state.

Core System Shield

The Core System shield continually monitors the system structures to ensure malware has not tampered with them. It assesses all system modifications before they are allowed to execute, and intercepts any activities that attempt to make system changes, such as a new service installation. It will also detect and repair broken system components by locating corrupted components such as broken Layered Service Provider (LSP) chains, or a virus-infected file, and then will restore the component or file to its original state.

Web Threat Shield

The Web Threat shield protects users as they browse the Internet. It also runs all URLs through its own malware-identification engine, and if a site is associated with malware it will automatically block it from loading in the user’s browser.

Identity Shield

The Identity Shield protects user information and transactional data that could be exposed during online transactions. This shield uses kernel-level lockdown of the operating system and browser to neutralize phishing, DNS poisoning, keystroke logging, screen grabbing, cookie scraping, clipboard grabbing, and browser and session hijacking by malicious software.

The Identity Shield may also be extended to cover other endpoint applications if they are added by an Administrator to the Identity Shield protection list.

The Identity Shield automatically:

Protected Websites

A component of the Identity Shield, Protected Websites, allows tailoring and customization of the rules protecting specific websites and protocols.  This feature is particularly useful when an organization has web-based applications like Outlook Web Access, or any web-based applications or services regularly accessed by users.

Next: Fine-tuning Threat Detection »