Endpoint protection redefined
Traditional security relies on outdated signatures and can't keep up with zero-day attacks.
Discover a smarter solution.
Use these tabs to view our endpoint and network solutions.
Traditional security relies on outdated signatures and can't keep up with zero-day attacks.
Discover a smarter solution.
Pricing - 1 Year
Pricing - More Years
Additional discounts are available through our reseller and MSP partners.
$0.00
Discounts available through our partners.
Discounts available through our partners.
For 1,000+, please contact our enterprise sales team.
This product is sold with a 5 endpoint minimum.
endpoints
endpoints
$0.00
Contact Us
Discounts available through our partners.
Contact Us
Discounts available through our partners.
Contact Us
For 1,000+, please contact our enterprise sales team.
This product is sold with a 5 endpoint minimum.
Webroot's Internet Security Complete product is perfect for home offices or small companies.
Pricing - 1 Year
Pricing - More Years
Additional discounts are available through our reseller and MSP partners.
$0.00
Discounts available through our partners.
Discounts available through our partners.
For 1,000+, please contact our enterprise sales team.
This product is sold with a 5 endpoint minimum.
endpoints
endpoints
$0.00
Contact Us
Discounts available through our partners.
Contact Us
Discounts available through our partners.
Contact Us
For 1,000+, please contact our enterprise sales team.
This product is sold with a 5 endpoint minimum.
Webroot's Internet Security Complete product is perfect for home offices or small companies.
Why Webroot
Free up your devices and network. No bulky signature updates or definition files.
Free up your devices and network. No bulky signature updates or definition files.
Journaling and rollback remediation restore files to their uninfected state, so you don't have to reimage.
Journaling and rollback remediation restore files to their uninfected state, so you don't have to reimage.
Endpoint Protection deploys and is fully operational in less time than it takes to refill your coffee.
Endpoint Protection deploys and is fully operational in less time than it takes to refill your coffee.
Manage endpoints anywhere, anytime, online with a standard or global site manager console.
Manage endpoints anywhere, anytime, online with a standard or global site manager console.
Utilizes a <1MB client which installs, scans, and protects in seconds.
Utilizes a <1MB client which installs, scans, and protects in seconds.
Threat data is delivered to Webroot-protected devices from the cloud in real time, all over the globe.
Threat data is delivered to Webroot-protected devices from the cloud in real time, all over the globe.
The Webroot® Threat Intelligence Platform continuously collects, analyzes, and correlates data, ensuring complete protection.
The Webroot® Threat Intelligence Platform continuously collects, analyzes, and correlates data, ensuring complete protection.
Online endpoint demos
Interactive in-browser demos, no registration required. Click to launch.
Shows how to use the standard Endpoint Protection console to manage agent deployment, groups, policies, and more.
Shows how enterprises with numerous locations and MSPs with multiple clients can manage complex, multi-site and multi-administered deployments with ease.
Shows how an agent can be deployed silently, typically via MSI or command line.
Shows the process of running the installer on the endpoint and entering a keycode.
Competitive comparison
*Webroot SecureAnywhere® Business Endpoint Protection vs. Seven Competitors, August 2015
*Webroot SecureAnywhere® Business Endpoint Protection vs. Seven Competitors, August 2015
*Webroot SecureAnywhere® Business Endpoint Protection vs. Seven Competitors, August 2015
*Webroot SecureAnywhere® Business Endpoint Protection vs. Seven Competitors, August 2015
*Webroot SecureAnywhere® Business Endpoint Protection vs. Seven Competitors, August 2015
*Webroot SecureAnywhere® Business Endpoint Protection vs. Seven Competitors, August 2015
*Webroot SecureAnywhere® Business Endpoint Protection vs. Seven Competitors, August 2015
Pricing
Buy and license by the endpoint as a standalone or in combination with other Webroot business products. 1 year licensing up to 249 endpoints can be purchased online. Additional discounts for greater quantities or years are available through our channel partners or by contacting Webroot business sales.
5-9 endpoints | 10-99 endpoints | 100-249 endpoints | 250+ endpoints | |
---|---|---|---|---|
1 Year Pricing | Add to Cart | Add to Cart | Add to Cart | Additional Discounts. Contact Us Online, Contact Us to find a channel partner or call 1-800-870-8102 |
Multi Year Pricing | Additional Discounts. Contact Us Online, Contact Us to find a channel partner or call 1-800-870-8102 |
"Webroot SecureAnywhere Business Endpoint Protection is the best Software-as-a-Service (SaaS) endpoint protection software available to businesses today."
A trademark of Ziff Davis, Inc. Used under license. Reprinted with permission. © 2015 Ziff Davis, Inc. All Rights Reserved
Customer reviews
Datasheets & more
Business Endpoint Protection
SecureAnywhere® Business Endpoint Protection offers next-generation malware detection, prevention, and remediation.
DownloadWebroot® Threat Intelligence Platform
Webroot delivers real-time protection from our cloud-based threat intelligence platform to stop threats before the competition sees them coming.
DownloadPassMark® Performance Benchmark
Webroot SecureAnywhere® Business Endpoint Protection vs. Seven Competitors (August 2015).
DownloadSupported systems and browsers
Desktops
Windows® 10 32 and 64-bit
Windows 8, 8.1, 32 and 64-bit
Windows 7, 32 and 64-bit
Windows Vista®, 32 and 64-bit
Windows XP®** 3, 32 and 64-bit
Windows XP** Embedded
Mac OS X 10.7 (Lion®)
Mac OS X 10.8 (Mountain Lion®)
OS X 10.9 (Mavericks®)
OS X 10.10 (Yosemite®)
OS X 10.11 (El Capitan®)
macOS 10.12 (Sierra®)
macOS 10.13 (High Sierra®)
macOS 10.14 (Mojave®)
**must support SHA-2
Servers
Windows Server® 2012 R2 Standard, R2 Essentials
Windows Server 2008 R2 Foundation, Standard, Enterprise
Windows Server 2003** Standard, Enterprise, 32 and 64-bit (must support SHA-2)
Windows Small Business Server 2008, 2011, 2012
Windows Server 2003** R2 for Embedded Systems
Windows Embedded Standard 2009 SP2
Windows XP Embedded SP1, Embedded Standard 2009 SP3
Windows Embedded for POS Version 1.0
Windows Server® 2016 Standard, Enterprise and Datacentre
Windows Server® 2019 Standard Server with Desktop Experience
Windows Server® 2019 Datacenter Server with Desktop Experience
**must support SHA-2
VM Platforms
VMware® vSphere® 5.5 and older (ESX®/ESXi 5.5 and older), Workstation 9.0 and older, Server 2.0 and older
Citrix® XenDesktop® 5, XenServer® 5.6 and older, XenApp® 6.5 and older
Microsoft® Hyper-V® Server 2016
Microsoft® Hyper-V® Server 2012, 2012 R2
Microsoft® Hyper-V® Server 2008, 2008 R2
Virtual Box
Browsers
Google Chrome® 11 and newer
Internet Explorer® version 11 and newer (Windows XP IE8)
Microsoft Edge® (partial support)
Mozilla Firefox® version 3.6 and newer
Safari 5 and newer
Opera 11 and newer
Desktops
Windows® 10 32 and 64-bit
Windows 8, 8.1, 32 and 64-bit
Windows 7, 32 and 64-bit
Windows Vista®, 32 and 64-bit
Windows XP®** 3, 32 and 64-bit
Windows XP** Embedded
Mac OS X 10.7 (Lion®)
Mac OS X 10.8 (Mountain Lion®)
OS X 10.9 (Mavericks®)
OS X 10.10 (Yosemite®)
OS X 10.11 (El Capitan®)
macOS 10.12 (Sierra®)
macOS 10.13 (High Sierra®)
macOS 10.14 (Mojave®)
**must support SHA-2
Servers
Windows Server® 2012 R2 Standard, R2 Essentials
Windows Server 2008 R2 Foundation, Standard, Enterprise
Windows Server 2003** Standard, Enterprise, 32 and 64-bit (must support SHA-2)
Windows Small Business Server 2008, 2011, 2012
Windows Server 2003** R2 for Embedded Systems
Windows Embedded Standard 2009 SP2
Windows XP Embedded SP1, Embedded Standard 2009 SP3
Windows Embedded for POS Version 1.0
Windows Server® 2016 Standard, Enterprise and Datacentre
Windows Server® 2019 Standard Server with Desktop Experience
Windows Server® 2019 Datacenter Server with Desktop Experience
**must support SHA-2
VM Platforms
VMware® vSphere® 5.5 and older (ESX®/ESXi 5.5 and older), Workstation 9.0 and older, Server 2.0 and older
Citrix® XenDesktop® 5, XenServer® 5.6 and older, XenApp® 6.5 and older
Microsoft® Hyper-V® Server 2016
Microsoft® Hyper-V® Server 2012, 2012 R2
Microsoft® Hyper-V® Server 2008, 2008 R2
Virtual Box
Browsers
Google Chrome® 11 and newer
Internet Explorer® version 11 and newer (Windows XP IE8)
Microsoft Edge® (partial support)
Mozilla Firefox® version 3.6 and newer
Safari 5 and newer
Opera 11 and newer
Find the right product
Answer three simple questions with our Help Me Choose recommendation tool or compare our business products.
What type of company are you?
How many people or devices do you need to protect?
What are you looking to protect? (Select up to 3)
Do you need to protect remote employees or deploy group policies?
Webroot SecureAnywhere® Business Endpoint Protection secures PC or Mac desktops, laptops, and VMs and offers management via our online business console.
Webroot offers effective, cloud-based protection with hierarchical administration, automation, flexible billing, RMM and PSA integration, and the resources MSPs need to increase profitability. Fill out the form to get a quote.
SecureAnywhere™ Business Endpoint Protection is offered for 5 or more endpoints.
For less than 5 endpoints, click here to learn more about products for home and home office.
Webroot SecureAnywhere® Business Endpoint Protection secures PC or Mac desktops, laptops, and VMs and offers management via our online business console.
Webroot offers effective, cloud-based protection with hierarchical administration, automation, flexible billing, RMM and PSA integration, and the resources MSPs need to increase profitability. Fill out the form to get a quote.
SecureAnywhere™ Business Endpoint Protection is offered for 5 or more endpoints.
For less than 5 endpoints, click here to learn more about products for home and home office.
Webroot SecureAnywhere® Internet Security Complete protects PCs, Macs, smartphones, and tablets. It also proactively blocks malicious web content and fake websites, and includes password management and automatic secure backup.
Secure your DNS connection against cyberattacks, get total visibility into web usage, and enforce acceptable web usage policies to reduce risk.
Request a custom DNS Protection quote to get competitive pricing and discuss specific business benefits.
Educate end users about the risks they face online to enhance your business' and clients' overall security posture and comply with regulations.
Contact us to discuss how Security Awareness Training can benefit your business, or to set up a free trial.
Stop threats at the network's edge, enforce internet usage policies, and prevent phishing and other web-borne threats.
Pay-as-you-go per user/per year subscription model
Features
Prevent users from bypassing security controls. The tamper-proof agent provides seamless user authentication and detects anonymizing proxies to enforce policies.
Prevent users from bypassing security controls. The tamper-proof agent provides seamless user authentication and detects anonymizing proxies to enforce policies.
Block malware and data theft over SSL/HTTPS encrypted traffic. Decrypts and scans traffic to ensure content filtering policies are applied and the network stays secure.
Block malware and data theft over SSL/HTTPS encrypted traffic. Decrypts and scans traffic to ensure content filtering policies are applied and the network stays secure.
Reduce hassle and total cost of ownership (TCO). The Webroot management portal is available from any browser, so you don’t need on-premise management hardware or software.
Reduce hassle and total cost of ownership (TCO). The Webroot management portal is available from any browser, so you don’t need on-premise management hardware or software.
Recognizes when machines become "zombies" that communicate with botnets and command and control servers, then blocks contact and alerts admins.
Recognizes when machines become "zombies" that communicate with botnets and command and control servers, then blocks contact and alerts admins.
Apply a persistent cookie approach, so the guest’s browser is managed by the guest network policy even without an installed agent.
Apply a persistent cookie approach, so the guest’s browser is managed by the guest network policy even without an installed agent.
Provides detailed reports ad-hoc or on a scheduled basis for timely and accurate internet usage monitoring.
Provides detailed reports ad-hoc or on a scheduled basis for timely and accurate internet usage monitoring.
Enforces policies on remote, off-network users, ensuring they are fully provisioned to receive automatic and uninterrupted protection.
Enforces policies on remote, off-network users, ensuring they are fully provisioned to receive automatic and uninterrupted protection.
Resources
SecureAnywhere™ Web Security Service
Web gateway security doesn't have to involve costly hardware or complex management.
DownloadCorporate Web Security Market Quadrant 2014
According to the 2014 Radicati Group report, corporate cloud-based security solutions like Webroot are in demand.
DownloadMassachusetts Association of Insurance Agents
Massachusetts Association of Insurance Agents improves bandwidth and productivity with Webroot.
Supported systems and browsers
Desktops
Windows® 10 32 and 64-bit
Windows 8, 8.1, 32 and 64-bit
Windows 7, 32 and 64-bit
Windows Vista®, 32 and 64-bit
Windows XP®** 3, 32 and 64-bit
Windows XP** Embedded
Mac OS X 10.7 (Lion®)
Mac OS X 10.8 (Mountain Lion®)
OS X 10.9 (Mavericks®)
OS X 10.10 (Yosemite®)
OS X 10.11 (El Capitan®)
macOS 10.12 (Sierra®)
macOS 10.13 (High Sierra®)
macOS 10.14 (Mojave®)
**must support SHA-2
Servers
Windows Server® 2012 R2 Standard, R2 Essentials
Windows Server 2008 R2 Foundation, Standard, Enterprise
Windows Server 2003** Standard, Enterprise, 32 and 64-bit (must support SHA-2)
Windows Small Business Server 2008, 2011, 2012
Windows Server 2003** R2 for Embedded Systems
Windows Embedded Standard 2009 SP2
Windows XP Embedded SP1, Embedded Standard 2009 SP3
Windows Embedded for POS Version 1.0
Windows Server® 2016 Standard, Enterprise and Datacentre
Windows Server® 2019 Standard Server with Desktop Experience
Windows Server® 2019 Datacenter Server with Desktop Experience
**must support SHA-2
VM Platforms
VMware® vSphere® 5.5 and older (ESX®/ESXi 5.5 and older), Workstation 9.0 and older, Server 2.0 and older
Citrix® XenDesktop® 5, XenServer® 5.6 and older, XenApp® 6.5 and older
Microsoft® Hyper-V® Server 2016
Microsoft® Hyper-V® Server 2012, 2012 R2
Microsoft® Hyper-V® Server 2008, 2008 R2
Virtual Box
Browsers
Google Chrome® 11 and newer
Internet Explorer® version 11 and newer (Windows XP IE8)
Microsoft Edge® (partial support)
Mozilla Firefox® version 3.6 and newer
Safari 5 and newer
Opera 11 and newer
Desktops
Windows® 10 32 and 64-bit
Windows 8, 8.1, 32 and 64-bit
Windows 7, 32 and 64-bit
Windows Vista®, 32 and 64-bit
Windows XP®** 3, 32 and 64-bit
Windows XP** Embedded
Mac OS X 10.7 (Lion®)
Mac OS X 10.8 (Mountain Lion®)
OS X 10.9 (Mavericks®)
OS X 10.10 (Yosemite®)
OS X 10.11 (El Capitan®)
macOS 10.12 (Sierra®)
macOS 10.13 (High Sierra®)
macOS 10.14 (Mojave®)
**must support SHA-2
Servers
Windows Server® 2012 R2 Standard, R2 Essentials
Windows Server 2008 R2 Foundation, Standard, Enterprise
Windows Server 2003** Standard, Enterprise, 32 and 64-bit (must support SHA-2)
Windows Small Business Server 2008, 2011, 2012
Windows Server 2003** R2 for Embedded Systems
Windows Embedded Standard 2009 SP2
Windows XP Embedded SP1, Embedded Standard 2009 SP3
Windows Embedded for POS Version 1.0
Windows Server® 2016 Standard, Enterprise and Datacentre
Windows Server® 2019 Standard Server with Desktop Experience
Windows Server® 2019 Datacenter Server with Desktop Experience
**must support SHA-2
VM Platforms
VMware® vSphere® 5.5 and older (ESX®/ESXi 5.5 and older), Workstation 9.0 and older, Server 2.0 and older
Citrix® XenDesktop® 5, XenServer® 5.6 and older, XenApp® 6.5 and older
Microsoft® Hyper-V® Server 2016
Microsoft® Hyper-V® Server 2012, 2012 R2
Microsoft® Hyper-V® Server 2008, 2008 R2
Virtual Box
Browsers
Google Chrome® 11 and newer
Internet Explorer® version 11 and newer (Windows XP IE8)
Microsoft Edge® (partial support)
Mozilla Firefox® version 3.6 and newer
Safari 5 and newer
Opera 11 and newer
Find the right product
Answer three simple questions with our Help Me Choose recommendation tool or compare our business products.
What type of company are you?
How many people or devices do you need to protect?
What are you looking to protect? (Select up to 3)
Do you need to protect remote employees or deploy group policies?
Webroot SecureAnywhere® Business Endpoint Protection secures PC or Mac desktops, laptops, and VMs and offers management via our online business console.
Webroot offers effective, cloud-based protection with hierarchical administration, automation, flexible billing, RMM and PSA integration, and the resources MSPs need to increase profitability. Fill out the form to get a quote.
SecureAnywhere™ Business Endpoint Protection is offered for 5 or more endpoints.
For less than 5 endpoints, click here to learn more about products for home and home office.
Webroot SecureAnywhere® Business Endpoint Protection secures PC or Mac desktops, laptops, and VMs and offers management via our online business console.
Webroot offers effective, cloud-based protection with hierarchical administration, automation, flexible billing, RMM and PSA integration, and the resources MSPs need to increase profitability. Fill out the form to get a quote.
SecureAnywhere™ Business Endpoint Protection is offered for 5 or more endpoints.
For less than 5 endpoints, click here to learn more about products for home and home office.
Webroot SecureAnywhere® Internet Security Complete protects PCs, Macs, smartphones, and tablets. It also proactively blocks malicious web content and fake websites, and includes password management and automatic secure backup.
Secure your DNS connection against cyberattacks, get total visibility into web usage, and enforce acceptable web usage policies to reduce risk.
Request a custom DNS Protection quote to get competitive pricing and discuss specific business benefits.
Educate end users about the risks they face online to enhance your business' and clients' overall security posture and comply with regulations.
Contact us to discuss how Security Awareness Training can benefit your business, or to set up a free trial.