SecureAnywhere Business
Endpoint Protection

Self-Remediation

Empowering Customers With Unprecedented Control

With the option of automatic threat remediation and Agent Commands run at the System level, regardless of location, IT professionals have unprecedented control for their compliance-regulated environments. This translates into more time solving problems, and less time waiting on assistance from a legacy security vendor.

Free Trial » Buy Now »
Product Details » View Demo » Contact Us »

Select Endpoints and Years

# of PCs to protect (5-999)

Need more than 999 seats?
Please call: ' . $orderPhoneNumber . '

Subscription Length (yrs)


Total Cost:

 


REAL-TIME DETERMINATION CHANGES

With Webroot SecureAnywhere, you simply install it, set it, and forget it!

Webroot SecureAnywhere’s cloud architecture allows administrators to make their own real-time determination changes, without relying upon support, using the web-based management console.

Unlike most legacy endpoint security solutions, there is no need for an administrator to submit a Support ticket to override a determination made by Webroot SecureAnywhere. The administrator has complete control over which files are allowed to run on endpoints. They have the ability to classify files as Good or Bad, and apply overrides globally, or to individual policies.

For example, if an administrator decided that their users should not be allowed to use a specific program, such as torrent software, the administrator can use an MD5 override to flag the file as ‘Bad’ during scans and quarantine it. This allows administrators to stop endpoints from running undesirable applications. Alternatively, if corporate policies change or a blocked application needs to be restored, administrators have the ability to reverse any overrides and restore the files from quarantine.

Webroot SecureAnywhere frees administrators from a forced dependency upon vendor customer support, and allows administrators to control how their environment responds to threats. It provides automated and robust endpoint security, but enables administrators to make the final decision regarding what programs are truly acceptable for individuals or groups to be using in their environment.


AGENT VISIBILITY AND CONTROL

The console is very easy to navigate and is very quick to browse giving visibility of all systems quickly with a lot of customized features.

Overrides empower Administrators by giving them the control to override automated file determinations made by the Webroot® Intelligence Network. Overrides can be applied to the entire organization or to an individual policy that only affects a subset of users.

For example, if an administrator decided that their users should not be allowed to use a specific program, such as torrent software, the administrator can use an override to flag the file as ‘Bad’ during scans and quarantine it. This allows administrators to stop endpoints from running undesirable applications.

Watch Video
Video: Overrides

Alternatively, if corporate policies change or a blocked application needs to be restored, administrators also have the ability to reverse any overrides and restore the files from quarantine.

Overrides may be applied from several locations within Webroot SecureAnywhere®:

As stated above, overrides may be applied globally or applied to individual policies. For example, an MD5 file might be treated as ‘Bad’ at the global level and ‘Good’ at the individual policy level. A real world example of this would be a keylogger program that is used legitimately by the IT department to have audits for financial compliance in a trading room, but would be considered malicious if active on any other department’s endpoints.

Overrides are also a powerful way of blocking attacks as an administrator is immediately in a position to stop applications that have compromised or are causing the spread of an infection.

Next: Prevent Breaches & Infections »