Webroot SecureAnywhere Endpoint review
Webroot’s latest anti-virus software is hosted in the cloud and is fast, efficient and can be combined with other products to bolster protection.
Webroot SecureAnywhere Endpoint is security software which uses the cloud to provide up-to-date protection for users.
The advantage of using the cloud means that the virus definitions are always up to date. You can't get caught out by a new virus on Monday because your systems are set to update on Tuesdays.
A light touch
Webroot installs scanning and system-cleaning software on PCs, along with a firewall. However, as the firm provides the bulk of the service through the cloud, the client software is tiny. You only need to install a 650kb file compared to 54MB for programs such as F-Secure Internet Security and a whopping 106MB for Symantec Antivirus.
SecureAnywhere also uses fewer system resources than its competitors. When it's running in the background the software uses 5MB of RAM, rising to between 14-20MB when it's running a scan. The software is quick too. It took only 1 minute 38 seconds to scan our 40GB test PC. By comparison, Symantec Antivirus used 21MB of memory when it was at rest and 130MB of RAM when performing a scan. It took over ten minutes to perform the same scan. Kaspersky and F-Secure's results were comparable.
SecureAnywhere's scan engine is incredibly lightweight, hardly using any system resources, and scans are super-quick
Virus and malware detection
To test the program's effectiveness we installed it on six test PCs and then spent several hours, over the course of a few days, carrying out activities such as surfing high-risk sites and downloading cracked software.
We then checked the test PC with F-Secure, Symantec Antivirus and Webroot SecureAnywhere.
After this assault on our test system SecureAnywhere found it had been infected one piece of adware, three Trojans and unidentified malware. However, it didn't spot three instances of spyware caught by F-Secure or 17 tracking cookies found by Symantec Antivirus.
In This Article
Digitally perfecting the supply chain
How new technologies are being leveraged to transform the manufacturing supply chainDownload now
Three keys to maximise application migration and modernisation success
Harness the benefits that modernised applications can offerDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
The 3 approaches of Breach and Attack Simulation technologies
A guide to the nuances of BAS, helping you stay one step ahead of cyber criminalsDownload now