The Webroot® Web Security Service uses proprietary Webroot IP Threat Protection to identify IP addresses associated with malicious activity. In addition to offering an effective way to prevent unknown web threats, this technology gives administrators better visibility into malicious inbound and outbound network traffic.
IP Threat Protection uses the Webroot global threat sensor network—a key component of the Webroot® Intelligence Network™ (WIN)—to identify threats from multiple sources across the Internet. It dynamically creates lists of IP addresses to be blocked while also providing real-time website reputation scores and IP threat analysis for all high-risk websites.
Cost was definitely one of the deciding factors but it wasn’t the only reason we chose Webroot,” Jerome says. “Security SaaS is also great because it protects all of the employees regardless of where they are—plus it’s hosted and I liked the idea of a managed service.
- Jerome Jasmin, Director of the Information Department, Toshiba France
The Webroot Web Security delivers enhanced visibility into malware present in inbound and outbound network traffic. In addition, it provides a robust layer of continuously updated protection against known and unknown threats on the Internet. The broad range of threats and malicious IP addresses it detects includes:
The Webroot SecureAnywhere Web Security Service not only maintains the most up to date lists of known malicious websites but also dynamically generates a reputation score for every website visited by users within the service. As a result, administrators can restrict access to sites that are known to host malware or spyware as well new sites with characteristics that could indicate a threat.
Webroot also enables more granular security management. For example, web filtering policies commonly allow access to “financial” websites. Enterprise end users need to visit these sites for legitimate business reasons such as conducting online banking. Dynamic website reputation checks enable users to access reputable financial sites while preventing access to low-reputation financial sites, which are likely to host malware or phishing attacks.