Webroot SecureAnywhere Endpoint review
Webroot’s latest anti-virus software is hosted in the cloud and is fast, efficient and can be combined with other products to bolster protection.
Webroot SecureAnywhere Endpoint is security software which uses the cloud to provide up-to-date protection for users.
The advantage of using the cloud means that the virus definitions are always up to date. You can't get caught out by a new virus on Monday because your systems are set to update on Tuesdays.
A light touch
Webroot installs scanning and system-cleaning software on PCs, along with a firewall. However, as the firm provides the bulk of the service through the cloud, the client software is tiny. You only need to install a 650kb file compared to 54MB for programs such as F-Secure Internet Security and a whopping 106MB for Symantec Antivirus.
SecureAnywhere also uses fewer system resources than its competitors. When it's running in the background the software uses 5MB of RAM, rising to between 14-20MB when it's running a scan. The software is quick too. It took only 1 minute 38 seconds to scan our 40GB test PC. By comparison, Symantec Antivirus used 21MB of memory when it was at rest and 130MB of RAM when performing a scan. It took over ten minutes to perform the same scan. Kaspersky and F-Secure's results were comparable.
SecureAnywhere's scan engine is incredibly lightweight, hardly using any system resources, and scans are super-quick
Virus and malware detection
To test the program's effectiveness we installed it on six test PCs and then spent several hours, over the course of a few days, carrying out activities such as surfing high-risk sites and downloading cracked software.
We then checked the test PC with F-Secure, Symantec Antivirus and Webroot SecureAnywhere.
After this assault on our test system SecureAnywhere found it had been infected one piece of adware, three Trojans and unidentified malware. However, it didn't spot three instances of spyware caught by F-Secure or 17 tracking cookies found by Symantec Antivirus.
In This Article
The ultimate law enforcement agency guide to going mobile
Best practices for implementing a mobile device programFree download
The business value of Red Hat OpenShift
Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShiftFree download
Managing security and risk across the IT supply chain: A practical approach
Best practices for IT supply chain securityFree download
Digital remote monitoring and dispatch services’ impact on edge computing and data centres
Seven trends redefining remote monitoring and field service dispatch service requirementsFree download