Skip to main content
Hopefully, the Identity Shield & Application Protection modules could protect the imagined malware from exfiltrating sensitive corporate data into its executable file (albeit with the capricious slowing down of keyboard input, when using that application, that that can entail for the end-user) and therefore being uploaded to the Webroot Cloud sandbox (if, indeed, Webroot uses an internet-connected Cloud sandbox)??

 

For the uninitiated, see this video, particularly from 2m15secs.
In think that the answer is most likley 'Yes' but I doubt that this will ever be revealed officially as Webroot are rightly coy about revealiing what 'magic' they use to protection users so well. 
Well,   FWIW.

I'll imagine Webroot does employ an Internet-connected sandbox in it's cloud. 

I'll imagine cloud sandboxes could be exploited by malware to send out data undetected across the Internet.  

Caveat: I have a vivid imagination. 

Thanks

 

Lets hear from the Community. 
Hey everyone, 

 

Webroot does not use "sandboxes in the cloud". Any information that is sent is topical metadata NOT customer identifiable. Plus, the information is obfuscated and sent through secure protocols. 
Just heard back from Support

Webroot Support (Aug 1, 2017 22:30) RE: Does Webroot employ an Internet-connected sandbox in its cloud

Hello,



Webroot does not use cloud sandboxing, instead sandboxing occurs locally. We appreciate you bringing this issue to our attention.



Regards,

The Webroot Advanced Malware Removal Team

Reply