Use these tabs to view our endpoint and network solutions.

  • Endpoint protection redefined

    Traditional security relies on outdated signatures and can't keep up with zero-day attacks.

    Discover a smarter solution.

    Pricing - 1 Year

    Additional Years

    Pricing - More Years

    Additional discounts are available through our reseller and MSP partners.

    Back to 1 Year Pricing

    Pricing

    $0.00

    Discounts available through our partners.

    Discounts available through our partners.

    For 1,000+, please contact our enterprise sales team.

    This product is sold with a 5 endpoint minimum.

    endpoints

    endpoints

    $0.00

    Contact Us

    Discounts available through our partners.

    Contact Us

    Discounts available through our partners.

    Contact Us

    For 1,000+, please contact our enterprise sales team.

    This product is sold with a 5 endpoint minimum.

    0% Savings

    $0.00 per endpoint

    Add to Cart

    $0.00 per endpoint

    0% Savings

    Add to Cart

    Webroot's Internet Security Complete product is perfect for home offices or small companies.

    Shop Consumer Products

    Pricing - 1 Year

    Additional Years

    Pricing - More Years

    Additional discounts are available through our reseller and MSP partners.

    Back to 1 Year Pricing

    Pricing

    $0.00

    Discounts available through our partners.

    Discounts available through our partners.

    For 1,000+, please contact our enterprise sales team.

    This product is sold with a 5 endpoint minimum.

    endpoints

    endpoints

    $0.00

    Contact Us

    Discounts available through our partners.

    Contact Us

    Discounts available through our partners.

    Contact Us

    For 1,000+, please contact our enterprise sales team.

    This product is sold with a 5 endpoint minimum.

    0% Savings

    $0.00 per endpoint

    Add to Cart

    $0.00 per endpoint

    0% Savings

    Add to Cart

    Webroot's Internet Security Complete product is perfect for home offices or small companies.

    Shop Consumer Products

    Why Webroot

    No conflicts

    Runs alongside other security software. No need to uninstall existing protection just to give us a try.

    No conflicts

    Runs alongside other security software. No need to uninstall existing protection just to give us a try.

    No more bloat

    Free up your devices and network. No bulky signature updates or definition files.

    No more bloat

    Free up your devices and network. No bulky signature updates or definition files.

    No reimaging

    Journaling and rollback remediation restore files to their uninfected state, so you don't have to reimage.

    No reimaging

    Journaling and rollback remediation restore files to their uninfected state, so you don't have to reimage.

    Deploys in seconds

    Endpoint Protection deploys and is fully operational in less time than it takes to refill your coffee.

    Deploys in seconds

    Endpoint Protection deploys and is fully operational in less time than it takes to refill your coffee.

    Online management

    Manage endpoints anywhere, anytime, online with a standard or global site manager console.

    Online management

    Manage endpoints anywhere, anytime, online with a standard or global site manager console.

    Lightweight client

    Utilizes a <1MB client which installs, scans, and protects in seconds.

    Lightweight client

    Utilizes a <1MB client which installs, scans, and protects in seconds.

    Always up to date

    Threat data is delivered to Webroot-protected devices from the cloud in real time, all over the globe.

    Always up to date

    Threat data is delivered to Webroot-protected devices from the cloud in real time, all over the globe.

    Deep intelligence

    The Webroot® Threat Intelligence Platform continuously collects, analyzes, and correlates data, ensuring complete protection.

    Deep intelligence

    The Webroot® Threat Intelligence Platform continuously collects, analyzes, and correlates data, ensuring complete protection.

    Online endpoint demos

    Interactive in-browser demos, no registration required. Click to launch.

    Shows how to use the standard Endpoint Protection console to manage agent deployment, groups, policies, and more.

    Shows how enterprises with numerous locations and MSPs with multiple clients can manage complex, multi-site and multi-administered deployments with ease.

    Shows how an agent can be deployed silently, typically via MSI or command line.

    Shows the process of running the installer on the endpoint and entering a keycode.

    Competitive comparison

    • Protects endpoints over 150x faster than Symantec®
      Protects endpoints over 150x faster than Symantec®
      The minimum installation time for Webroot SecureAnywhere® Business Endpoint Protection to be fully functional for an end user is only 5 seconds!* That’s over 150 times faster than Symantec Endpoint Protection Small Business Edition 2013 (Symantec.cloud) and over 80 times faster than the competitor average.
      Download the Report
    • Uses over 780 times less hard disk install space than Kaspersky®
      Uses over 780 times less hard disk install space than Kaspersky®
      Webroot SecureAnywhere® Business Endpoint Protection uses only 2 MB of hard disk space. This chart shows the total size of files added during the installation of endpoint security products. Webroot uses at least 118 times less hard disk space than any competitor measured.*
      Download the Report
    • Uses 11 times less memory than Trend Micro®
      Uses 11 times less memory than Trend Micro®
      Webroot SecureAnywhere® Business Endpoint Protection uses only 5.5 MB of memory during system idle and this is 24 times less than the average. The average amount of RAM used during a period of system idle by the endpoint security products tested is 137 MB. This number is from a sample of ten memory snapshots taken at roughly 60 seconds apart after reboot.*
      Download the Report
    • Scheduled scans run 18x faster than ESET
      Scheduled scans run 18x faster than ESET
      Webroot takes only 91 seconds to perform a scheduled scan. This chart shows the average time taken to run a scheduled scan on a system is over 29 minutes for each of the security products tested.* Webroot SecureAnywhere® Business Endpoint Protection is almost 20 times faster than the average.
      Download the Report
    • Uses <1/3 of the CPU resources consumed by Kaspersky® during scans
      Uses <1/3 of the CPU resources consumed by Kaspersky® during scans
      Webroot uses an average of only 10% of CPU resources during a malware scan. This chart shows the average CPU usage during a scan of media files, system files, and Microsoft Office documents that totaled 5.42 GB.*
      Download the Report
    • Uses almost 20x less memory during an initial scan than McAfee®
      Uses almost 20x less memory during an initial scan than McAfee®
      Webroot SecureAnywhere® Business Endpoint Protection uses only 13 MB of RAM, the smallest memory usage footprint among the products tested. Usage was measured by the average amount of memory (RAM) used by the product during an initial security scan of the primary drive. The average is 210 MB.*
      Download the Report
    • Writes, Opens, and Closes Files 16x faster than Microsoft®
      Writes, Opens, and Closes Files 16x faster than Microsoft®
      This metric compares the average time it takes for a file to be written to the hard drive, then opened and closed 180,000 times. Webroot has the fastest time of any of the products tested.*
      Download the Report

    Pricing

    Endpoint Protection Pricing

    Buy and license by the endpoint as a standalone or in combination with other Webroot business products. 1 year licensing up to 249 endpoints can be purchased online. Additional discounts for greater quantities or years are available through our channel partners or by contacting Webroot business sales.


      5-9 endpoints 10-99 endpoints 100-249 endpoints
    1 Year Pricing   Add to Cart   Add to Cart   Add to Cart
    Multi Year Pricing Additional Discounts. Contact Us Online, Contact Us to find a channel partner or call 1-800-870-8102
    Additional discounts for education, not-for-profit, and government organizations

    Highly rated
    on Amazon and Spiceworks

    Check out our product reviews and ratings

    Background

    "Webroot SecureAnywhere Business Endpoint Protection is the best Software-as-a-Service (SaaS) endpoint protection software available to businesses today."

    A trademark of Ziff Davis, Inc. Used under license. Reprinted with permission. © 2015 Ziff Davis, Inc. All Rights Reserved

    Customer reviews

    Average Score

    Customer Support based in the USA

    Datasheets & more

    Datasheet

    Business Endpoint Protection

    SecureAnywhere® Business Endpoint Protection offers next-generation malware detection, prevention, and remediation.

    Download
    Datasheet

    Webroot® Threat Intelligence Platform

    Webroot delivers real-time protection from our cloud-based threat intelligence platform to stop threats before the competition sees them coming.

    Download
    Report

    PassMark® Performance Benchmark

    Webroot SecureAnywhere® Business Endpoint Protection vs. Seven Competitors (August 2015).

    Download

    Supported systems and browsers

    Windows® 10 32 and 64-bit

    Windows 8, 8.1, 32 and 64-bit

    Windows 7, 32 and 64-bit

    Windows Vista®, 32 and 64-bit

    Windows XP®** 3, 32 and 64-bit

    Windows XP** Embedded

    Mac OS X 10.7 (Lion®)

    Mac OS X 10.8 (Mountain Lion®)

    Mac OS X 10.9 (Mavericks®)

    Mac OS X 10.10 (Yosemite®)

    Mac OS X 10.11 (El Capitan®)

    Mac OS X 10.12 (Sierra®)

    Mac OS X 10.13 (High Sierra®)

    **must support SHA-2

    Windows Server® 2012 R2 Standard, R2 Essentials

    Windows Server 2008 R2 Foundation, Standard, Enterprise

    Windows Server 2003** Standard, Enterprise, 32 and 64-bit (must support SHA-2)

    Windows Small Business Server 2008, 2011, 2012

    Windows Server Core 2003**, 2008, 2012

    Windows Server 2003** R2 for Embedded Systems

    Windows Embedded Standard 2009 SP2

    Windows XP Embedded SP1, Embedded Standard 2009 SP3

    Windows Embedded for POS Version 1.0

    Windows Server® 2016 Standard, Enterprise and Datacentre

    **must support SHA-2

    VMware® vSphere® 5.5 and older (ESX®/ESXi 5.5 and older), Workstation 9.0 and older, Server 2.0 and older

    Citrix® XenDesktop® 5, XenServer® 5.6 and older, XenApp® 6.5 and older

    Microsoft® Hyper-V® Server 2016

    Microsoft® Hyper-V® Server 2012, 2012 R2

    Microsoft® Hyper-V® Server 2008, 2008 R2

    Virtual Box

    Google Chrome® 11 and newer

    Internet Explorer® version 11 and newer (Windows XP IE8)

    Microsoft Edge® (partial support)

    Mozilla® Firefox® version 3.6 and newer

    Safari 5 and newer

    Opera 11 and newer

    Find the right product

    Answer three simple questions with our Help Me Choose recommendation tool or compare our business products.

    1/4

    What type of company are you?

    2/4

    How many people or devices do you need to protect?

    3/4

    What are you looking to protect? (Select up to 3)

     
    DID YOU KNOW       |       A layered defense against multi-vector threats is critical when choosing a cyber security vendor.

    4/4

    Do you need to protect remote employees or deploy group policies?

  • Secure web gateway

    Stop threats at the network's edge, enforce internet usage policies, and prevent phishing and other web-borne threats.

    Pay-as-you-go per user/per year subscription model

    Smarter benefits, smarter business

    Reduced Total Cost of Ownership

    » No hardware or software to install or manage

    » Low ongoing administration overheads

    » No switching fees or other upfront costs

    » Pay-as-you-go per user/per year model

    » Comprehensive 24x7x365 support included

    Proactive Web Security

    » Stops threats before they reach networks or users

    » Heuristic filters protect against unknown threats

    » URL filtering and content blocking

    » Real-time anti-phishing protection

    » Automatically detects anonymizing proxies

    Simplified Management

    » Intuitive web-based management console

    » Set policies at account, group, or user level

    » Active Directory and LDAP integration

    » Detailed ad-hoc and scheduled reporting

    » Auto-updating Desktop Web Proxy agent

    Features

    Web gateway protection

    Stop threats at the network’s edge, enforce internet usage policies, and prevent phishing and other web-borne threats.

    Web gateway protection

    Stop threats at the network’s edge, enforce internet usage policies, and prevent phishing and other web-borne threats.

    Complete policy controls & protection

    Prevent users from bypassing security controls. The tamper-proof agent provides seamless user authentication and detects anonymizing proxies to enforce policies.

    Complete policy controls & protection

    Prevent users from bypassing security controls. The tamper-proof agent provides seamless user authentication and detects anonymizing proxies to enforce policies.

    Encrypted traffic scanning

    Block malware and data theft over SSL/HTTPS encrypted traffic. Decrypts and scans traffic to ensure content filtering policies are applied and the network stays secure.

    Encrypted traffic scanning

    Block malware and data theft over SSL/HTTPS encrypted traffic. Decrypts and scans traffic to ensure content filtering policies are applied and the network stays secure.

    Online management

    Reduce hassle and total cost of ownership (TCO). The Webroot management portal is available from any browser, so you don’t need on-premise management hardware or software.

    Online management

    Reduce hassle and total cost of ownership (TCO). The Webroot management portal is available from any browser, so you don’t need on-premise management hardware or software.

    Real-time zombie detection & alerting

    Recognizes when machines become "zombies" that communicate with botnets and command and control servers, then blocks contact and alerts admins.

    Real-time zombie detection & alerting

    Recognizes when machines become "zombies" that communicate with botnets and command and control servers, then blocks contact and alerts admins.

    Network support for guests

    Apply a persistent cookie approach, so the guest’s browser is managed by the guest network policy even without an installed agent.

    Network support for guests

    Apply a persistent cookie approach, so the guest’s browser is managed by the guest network policy even without an installed agent.

    Comprehensive logging & reporting

    Provides detailed reports ad-hoc or on a scheduled basis for timely and accurate internet usage monitoring.

    Comprehensive logging & reporting

    Provides detailed reports ad-hoc or on a scheduled basis for timely and accurate internet usage monitoring.

    Roaming control

    Enforces policies on remote, off-network users, ensuring they are fully provisioned to receive automatic and uninterrupted protection.

    Roaming control

    Enforces policies on remote, off-network users, ensuring they are fully provisioned to receive automatic and uninterrupted protection.

    true
    A great addition to our layered security approach. The fact that we are able to stop malware before it makes its way to the system makes system administration much easier and makes sense. One of the best parts about the service is once you set it up there is very little overhead, no infrastructure or servers to maintain, that saves time and maintenance costs.

    Resources

    Datasheet

    SecureAnywhere™ Web Security Service

    Web gateway security doesn't have to involve costly hardware or complex management.

    Download
    White Paper

    Corporate Web Security Market Quadrant 2014

    According to the 2014 Radicati Group report, corporate cloud-based security solutions like Webroot are in demand.

    Download
    Case Study

    Massachusetts Association of Insurance Agents

    Massachusetts Association of Insurance Agents improves bandwidth and productivity with Webroot.

    Download

    Supported systems and browsers

    Windows® 10 32 and 64-bit

    Windows 8, 8.1, 32 and 64-bit

    Windows 7, 32 and 64-bit

    Windows Vista®, 32 and 64-bit

    Windows XP®** 3, 32 and 64-bit

    Windows XP** Embedded

    Mac OS X 10.7 (Lion®)

    Mac OS X 10.8 (Mountain Lion®)

    Mac OS X 10.9 (Mavericks®)

    Mac OS X 10.10 (Yosemite®)

    Mac OS X 10.11 (El Capitan®)

    Mac OS X 10.12 (Sierra®)

    Mac OS X 10.13 (High Sierra®)

    **must support SHA-2

    Windows Server® 2012 R2 Standard, R2 Essentials

    Windows Server 2008 R2 Foundation, Standard, Enterprise

    Windows Server 2003** Standard, Enterprise, 32 and 64-bit (must support SHA-2)

    Windows Small Business Server 2008, 2011, 2012

    Windows Server Core 2003**, 2008, 2012

    Windows Server 2003** R2 for Embedded Systems

    Windows Embedded Standard 2009 SP2

    Windows XP Embedded SP1, Embedded Standard 2009 SP3

    Windows Embedded for POS Version 1.0

    Windows Server® 2016 Standard, Enterprise and Datacentre

    **must support SHA-2

    VMware® vSphere® 5.5 and older (ESX®/ESXi 5.5 and older), Workstation 9.0 and older, Server 2.0 and older

    Citrix® XenDesktop® 5, XenServer® 5.6 and older, XenApp® 6.5 and older

    Microsoft® Hyper-V® Server 2016

    Microsoft® Hyper-V® Server 2012, 2012 R2

    Microsoft® Hyper-V® Server 2008, 2008 R2

    Virtual Box

    Google Chrome® 11 and newer

    Internet Explorer® version 11 and newer (Windows XP IE8)

    Microsoft Edge® (partial support)

    Mozilla® Firefox® version 3.6 and newer

    Safari 5 and newer

    Opera 11 and newer

    Full web security service trial

    Find the right product

    Answer three simple questions with our Help Me Choose recommendation tool or compare our business products.

    1/4

    What type of company are you?

    2/4

    How many people or devices do you need to protect?

    3/4

    What are you looking to protect? (Select up to 3)

     
    DID YOU KNOW       |       A layered defense against multi-vector threats is critical when choosing a cyber security vendor.

    4/4

    Do you need to protect remote employees or deploy group policies?