Webroot SecureAnywhere Endpoint review
Webroot’s latest anti-virus software is hosted in the cloud and is fast, efficient and can be combined with other products to bolster protection.
Webroot SecureAnywhere Endpoint is security software which uses the cloud to provide up-to-date protection for users.
The advantage of using the cloud means that the virus definitions are always up to date. You can't get caught out by a new virus on Monday because your systems are set to update on Tuesdays.
A light touch
Webroot installs scanning and system-cleaning software on PCs, along with a firewall. However, as the firm provides the bulk of the service through the cloud, the client software is tiny. You only need to install a 650kb file compared to 54MB for programs such as F-Secure Internet Security and a whopping 106MB for Symantec Antivirus.
SecureAnywhere also uses fewer system resources than its competitors. When it's running in the background the software uses 5MB of RAM, rising to between 14-20MB when it's running a scan. The software is quick too. It took only 1 minute 38 seconds to scan our 40GB test PC. By comparison, Symantec Antivirus used 21MB of memory when it was at rest and 130MB of RAM when performing a scan. It took over ten minutes to perform the same scan. Kaspersky and F-Secure's results were comparable.
SecureAnywhere's scan engine is incredibly lightweight, hardly using any system resources, and scans are super-quick
Virus and malware detection
To test the program's effectiveness we installed it on six test PCs and then spent several hours, over the course of a few days, carrying out activities such as surfing high-risk sites and downloading cracked software.
We then checked the test PC with F-Secure, Symantec Antivirus and Webroot SecureAnywhere.
After this assault on our test system SecureAnywhere found it had been infected one piece of adware, three Trojans and unidentified malware. However, it didn't spot three instances of spyware caught by F-Secure or 17 tracking cookies found by Symantec Antivirus.
In This Article
The IT Pro guide to Windows 10 migration
Everything you need to know for a successful transitionDownload now
Managing security risk and compliance in a challenging landscape
How key technology partners grow with your organisationDownload now
Software-defined storage for dummies
Control storage costs, eliminate storage bottlenecks and solve storage management challengesDownload now
6 best practices for escaping ransomware
A complete guide to tackling ransomware attacksDownload now