The future of cybersecurity for SMBs
Recently active
One of our core commitments when we began developing Webroot® Security Awareness Training was to remain relevant. We pledged to continuously develop content that reflected the latest threats faced by businesses and users as they arose. One of the most significant challenges we’ve seen since the launch of our user training tool has been the shift to remote workforces forced by the novel coronavirus outbreak. It’s dealt a serious blow to the cyber resilience of many organizations and is something, we felt, needed to be addressed. We’re happy to announce that a course designed to do just that is now available. It’s a guide for organizations and their users to maintain their cyber resilience with dispersed workforces, and we hope you’ll enroll. Why bother developing a Cyber Resilience while Working from Home Course? Cybercriminals know many remote workforces are no longer always under the watchful eyes of IT teams. They know some are even working from their own devices, often outsid
In today’s digital-first world, small and medium-sized businesses (SMBs) face cybersecurity challenges that grow more complex by the day. SMBs are prime targets for attackers hoping to gain a foothold inside any organization that doesn’t have extensive security measures. As threats increase, so does the need for comprehensive, reliable, and accessible protection.This is where managed detection and response (MDR) services come in. MDR combines threat detection, investigation, and response, offering businesses the support from a team of security experts who monitor the environment 24/7 to identify and respond to threats. For many SMBs, MDR is an ideal solution because it provides a level of protection and expertise that would otherwise require building an in-house security operations center (SOC).With OpenText MDR, SMBs get exactly this level of protection, backed by a trusted name in cybersecurity. Delivered through our extensive network of leading MSPs, OpenText MDR offers the power of
Hi there,We’ve been exploring some of the newer features with Webroot and I am curious if the Isolate function can be triggered automatically by the endpoint agent.The documentation seems to indicate that it is only a manual process, but that seems ineffective. By the time we have someone in the portal clicking the isolate button, it’s probably too late to do much good.Thanks for your help!Matt
Our WR SAT point of contact clients are wanting an interim report during a campaign to see the users yet to action or complete and therefore require follow up prompting. A report showing up to date progress is a common request. I understand this feature is not yet available.
📢 What’s New? Coming at the end of this month, isolation will now available for your Mac endpoints! With this update, Mac systems will need new permissions.🖥️ What’s Changing? Starting with version 9.6.4, you will need to grant System Extension and Network Filter permissions on Mac endpoints. This is required for full functionality of the device isolation feature.⚙️ Prepare Now:System Extension Approval: Users will be prompted to allow system extensions during the installation or upgrade process as described in this link:https://answers.webroot.com/Webroot/ukp.aspx?pid=12&app=vw&vw=1&solutionid=3466 MDM Software: Avoid manual approval prompts by pre-authorizing these extensions with your MDM software as described in this link:https://answers.webroot.com/Webroot/ukp.aspx?pid=12&app=vw&vw=1&login=1&json=1&solutionid=3917
When Win11 is offline with Webroot fully installed and updated, how much less powerful is it? Webroot is a thin AV client that needs constant internet access when it finds a virus, to scan and be told what to do next. All modern AVs are affected by being offline, and are less powerful, but Webroot is more affected. How much more affected is it? Is it almost worthless when it is offline?
Hello CommunityCurrently testing Webroot endpoint for to my company, so we have a list of servers without internet access I would like to know if is possible to have a local repository, The idea is that these servers will update and communicate with the new one through this local repository. Is this possible or all servers must have internet access?Best Regards
The feedback we received from the previous beta was foundational to its success – to the extent that we did not receive one bug complaint or call to Support indicating a problem!! This community is truly awesome! – Thank you!Further feedback mentioned that the previous beta was challenging to participate in as you needed either a trial of DNS Protection or an active Webroot Management Console. We hear you! With this next beta, this time, no Keycode will be required! Simply download and use the Beta Runner! However, if you prefer to use a Keycode you already have, it can be specified.Why a second beta?No software should ever stand still, it must evolve and progress! The second release of DNS Leak Prevention has some awesome new features that further augment Leak Prevention; namely, we have added the ability to dynamically detect DoH servers! Whereas previously we leveraged BrightCloud to provide an up-to-date list, now that is just the foundation to build on - now new DoH servers are de
We are very pleased to announce the launch of the DNS Leak Prevention Beta. This is an opportunity for us to share with you the feature we are about to release, as well as to solicit feedback, both from a technical and functionality perspective. Download the Beta Runner (link removed)Documentation available (link removed) What is DNS Leak Prevention? This is a new patent pending feature of the Webroot DNS Protection product. It is designed to provide control of DNS by blocking all alternate DNS resources aside from those configured in Webroot DNS Protection. This is done by locking down port 53 TCP and UDP (DNS), port 853 TCP (DNS over TLS), and port 443 TCP to known DoH providers. Why are we creating DNS Leak Prevention? As Webroot DNS Protection is a DNS filtering product, if we are not filtering every DNS request, it means that things are being missed. For example, if a web browser were to be configured to get DNS resolution directly from its own server, and disregard what was confi
Just wanted to confirm: Webroot Endpoint Protection only runs on Windows or Mac. There is no business product for mobile devices: phones and tablets? If I want to use Webroot, will I need to purchase separate Webroot Mobile Security home-user licenses for each device?