height="0" width="0" style="display:none;visibility:hidden">
Try our
new research platform
with insights from 80,000+ expert users
Research Reports
Categories
Cybersecurity
Endpoint Detection and Response (EDR)
Cloud Security Posture Management (CSPM)
Extended Detection and Response (XDR)
Endpoint Protection Platform (EPP)
Vulnerability Management
Security Information and Event Management (SIEM)
Firewalls
Container Security
Cloud-Native Application Protection Platforms (CNAPP)
Advanced Threat Protection (ATP)
Cloud Workload Protection Platforms (CWPP)
Identity Management (IM)
Attack Surface Management (ASM)
Threat Intelligence Platforms
Identity Threat Detection and Response (ITDR)
Anti-Malware Tools
Cloud and Data Center Security
Ransomware Protection
ZTNA as a Service
Data Security Posture Management (DSPM)
IT Management
Log Management
IT Infrastructure Monitoring
Remote Access
Configuration Management
Server Monitoring
Server Virtualization Software
Managed DNS
Container Monitoring
Operating Systems (OS) for Business
Virtual Desktop Infrastructure (VDI)
Virtualization Management Tools
Workload Automation
Container Management
IT Asset Management
IT Service Management (ITSM)
Managed File Transfer (MFT)
User Provisioning Software
IT Financial Management
IT Alerting and Incident Management
Container Registry
Cloud Computing
Microsoft Security Suite
Cloud Monitoring Software
Cloud Backup
Cisco Security Portfolio
PaaS Clouds
Cloud Management
Infrastructure as a Service Clouds (IaaS)
Cloud Migration
AWS Marketplace
Hybrid Cloud Computing Platforms
Cloud Storage
MSP Backup
Cloud Cost Management
Public Cloud Storage Services
Cloud Analytics
Software Defined Data Center (SDDC)
OpenStack
Compute Service
Cloud Storage Gateways
In-Memory Data Store Services
Data Management
Data Integration
Compliance Management
Cloud Data Integration
Data Governance
Cloud Data Warehouse
Data Warehouse
Relational Databases Tools
Open Source Databases
Vector Databases
Deduplication Software
Metadata Management
Data Quality
Data Masking
Cloud Master Data Management (MDM) Solutions
NoSQL Databases
Data Observability
Embedded Database
Database Development and Management
Product Information Management (PIM)
Database as a Service (DBaaS)
Application Development Software
Application Performance Monitoring (APM) and Observability
Application Security Tools
Static Application Security Testing (SAST)
Rapid Application Development Software
IT Operations Analytics
DevSecOps
Software Development Analytics
API Testing Tools
Test Automation Tools
Functional Testing Tools
Application Security Posture Management (ASPM)
Application Lifecycle Management (ALM) Suites
Mobile APM
Enterprise Agile Planning Tools
Regression Testing Tools
Release Automation
Patch Management
Build Automation
Software Supply Chain Security
Mobile App Testing Tools
Data Protection and Storage
Backup and Recovery
Disaster Recovery (DR) Software
All-Flash Storage
Software Defined Storage (SDS)
NVMe All-Flash Storage Arrays
NAS
HCI
File and Object Storage
SaaS Backup
Enterprise SAN
Rack Servers
File Archiving
Modular SAN (Storage Area Network)
Blade Servers
Container Backup Software
Disk Based Backup Systems
Converged Infrastructure
Data Replication
Application Server
File System Software
Enterprise Communications and Networking
Network Monitoring Software
WAN Edge
Software Defined WAN (SD-WAN) Solutions
AIOps
Secure Web Gateways (SWG)
CDN
Ethernet Switches
Wireless LAN
Network Traffic Analysis (NTA)
Network Automation
Network Management Applications
Application Delivery Controllers (ADC)
Network Troubleshooting
Virtual Routers
LAN Switching
Routers
AV Over IP Switching
Wireless WAN
WAN Optimization
IP Address Management (IPAM) Tools
Enterprise Architecture and Integration
API Management
Integration Platform as a Service (iPaaS)
Streaming Analytics
Business-to-Business Middleware
Event Monitoring
Application Infrastructure
Message Queue (MQ) Software
Enterprise Service Bus (ESB)
Data Migration Appliances
Message Oriented Middleware (MOM)
SOA Application Gateways
Migration Tools
General Purpose HSM
SOA Governance
Payment HSM
Web Access Management
CEP
Code Signing Management
Enterprise Applications
AI-Powered Cybersecurity Platforms
Business Process Management (BPM)
Email Security
Process Automation
BI (Business Intelligence) Tools
Business Process Design
Data Science Platforms
Reporting
Low-Code Development Platforms
Robotic Process Automation (RPA)
Secure Email Gateway (SEG)
Data Visualization
Process Mining
ERP
Email Archiving
No-Code Development Platforms
AI Development Platforms
Project Management Software
Talent Management
Agentic Automation
Customer Care
Help Desk Software
CRM
AI-Powered Chatbots
Data Management Platforms (DMP)
Digital Experience Monitoring (DEM)
Customer Experience Management
CRM Customer Engagement Centers
Contact Center as a Service (CCaaS)
Field Service Management
Contact Center Platforms
Workforce Engagement Management
Digital Experience Platforms (DXP)
Social CRM
Social Media Management Solutions
Customer Communications Management (CCM)
Contact Center Infrastructure
Live Chat
IVR Systems
Customer Data Analysis
Partner Relationship Management (PRM)
Wireless and Mobile Technology
Mobile Development Platforms
Mobile Device Management (MDM)
Mobile App Platforms
Mobile Marketing and Advertising
Mobile Application Management
Instant Communications Security and Compliance
Mobile Measurement Partner (MMP)
Mobile Communication Gateways
Managed Mobility Services
Text Messaging
Mobile Platforms
Mobile Video Optimization
Data Center and Facilities Management
Data Center Networking
Enterprise Asset Management (EAM)
Data Center Infrastructure Management
Data Center Power Solutions
Data Center Cooling Systems
Workplace Management Software
Computerized Maintenance Management Software (CMMS)
Facility Maintenance Management Software
Data Center Monitoring
Workplace Analytics Software
Wiring and Cabling Solutions
All categories
Comparisons
Top comparisons
Netgate pfSense vs. OPNsense
Cloudflare vs. Quad9
Fortinet FortiGate vs. Sophos XG
Figma vs. Miro
Amazon API Gateway vs. Microsoft Azure API Management
Checkmarx One vs. SonarQube Server (formerly SonarQube)
GitLab vs. Microsoft Azure DevOps
Hyper-V vs. VMware vSphere
MinIO vs. Red Hat Ceph Storage
AWS Secrets Manager vs. Azure Key Vault
Amazon Web Services (AWS)
Amazon API Gateway vs. Microsoft Azure API Management
AWS Secrets Manager vs. Azure Key Vault
Akamai Connected Cloud (Linode) vs. Amazon AWS
Amazon Route 53 vs. Azure DNS
AWS GuardDuty vs. Microsoft Defender for Cloud
Amazon EFS (Elastic File System) vs. Microsoft Azure File Storage
Amazon QuickSight vs. Microsoft Power BI
Amazon EKS vs. Red Hat OpenShift Container Platform
AWS Security Hub vs. Microsoft Sentinel
AWS Database Migration Service vs. AWS Glue
Cisco
Cisco Secure Firewall vs. Fortinet FortiGate
Aruba Wireless vs. Cisco Wireless
Aruba ClearPass vs. Cisco Identity Services Engine (ISE)
Aruba Switches vs. Cisco Ethernet Switches
Cisco Umbrella vs. Zscaler Internet Access
Arista Networks Platform vs. Cisco Catalyst Switches
Cisco Meraki Wireless LAN vs. Juniper Mist Wireless Access Points
Cisco Linksys Ethernet Switches vs. NETGEAR Switches
Cisco Enterprise Routers vs. MikroTik Routers and Switches
Meraki MX vs. Palo Alto Networks NG Firewalls
Dell Technologies
Dell PowerEdge Rack Servers vs. HPE ProLiant DL Servers
Dell PowerFlex vs. VxRail
Dell PowerStore vs. Dell Unity XT
Dell PowerProtect DD (Data Domain) vs. HPE StoreOnce
Dell PowerEdge T vs. HPE Proliant ML
Dell Avamar vs. Dell PowerProtect Data Manager
Dell PowerScale (Isilon) vs. NetApp FAS Series
Amazon AWS vs. Dell ECS
Dell RecoverPoint for Virtual Machines vs. VMware Live Recovery
Cisco Catalyst Switches vs. Dell PowerConnect Switches [EOL]
Fortinet
Fortinet FortiGate vs. Sophos XG
Fortinet FortiClient vs. OpenVPN Access Server
Cisco Identity Services Engine (ISE) vs. Fortinet FortiNAC
Cisco Ethernet Switches vs. Fortinet FortiSwitch - Secure Access
Fortinet FortiGate Cloud vs. Fortinet FortiManager
Azure Firewall vs. Fortinet FortiGate-VM
F5 Advanced WAF vs. Fortinet FortiWeb
CrowdStrike Falcon vs. Fortinet FortiEDR
Fortinet FortiGate SWG vs. Fortinet FortiProxy
F5 BIG-IP Local Traffic Manager (LTM) vs. Fortinet FortiADC
Hewlett Packard Enterprise
Aruba Wireless vs. Cisco Wireless
Dell PowerEdge Rack Servers vs. HPE ProLiant DL Servers
Aruba ClearPass vs. Cisco Identity Services Engine (ISE)
Aruba Switches vs. Cisco Ethernet Switches
HPE SimpliVity vs. VxRail
Dell PowerProtect DD (Data Domain) vs. HPE StoreOnce
Dell PowerEdge T vs. HPE Proliant ML
Dell PowerStore vs. HPE Alletra Storage
HPE 3PAR StoreServ vs. HPE Primera
HPE BladeSystem vs. HPE Synergy
IBM
ActiveMQ vs. IBM MQ
Open Liberty vs. Spring Boot
IBM API Connect vs. IBM DataPower Gateway
IBM Security QRadar vs. Splunk Enterprise Security
Dell PowerStore vs. IBM FlashSystem
IBM Db2 Database vs. SQL Server
IBM MaaS360 vs. Microsoft Intune
IBM Security Guardium Data Protection vs. Imperva SecureSphere Database Security
IBM DOORS vs. Polarion Requirements
IBM Power Systems vs. Intel Server System
Microsoft
Amazon API Gateway vs. Microsoft Azure API Management
GitLab vs. Microsoft Azure DevOps
Hyper-V vs. VMware vSphere
AWS Secrets Manager vs. Azure Key Vault
Jamf Pro vs. Microsoft Intune
Microsoft Power Automate vs. UiPath
Microsoft Power BI vs. Tableau
Amazon Route 53 vs. Azure DNS
AWS GuardDuty vs. Microsoft Defender for Cloud
Amazon EFS (Elastic File System) vs. Microsoft Azure File Storage
Oracle
Oracle Linux vs. Ubuntu Linux
Oracle VM VirtualBox vs. Proxmox VE
Oracle VM vs. VMware vSphere
Firebird SQL vs. MySQL
Oracle Database vs. SAP HANA
Microsoft Azure vs. Oracle Cloud Infrastructure (OCI)
Microsoft Power Apps vs. Oracle Application Express (APEX)
Oracle HCM Cloud vs. SAP SuccessFactors
Oracle Data Integrator (ODI) vs. Oracle Integration Cloud Service
NetSuite ERP vs. Oracle Fusion Cloud ERP
SAP
SAP ERP vs. SAP S/4HANA
Oracle Database vs. SAP HANA
Amazon AWS vs. SAP Cloud Platform
SAP HCM vs. SAP SuccessFactors
Celonis vs. SAP Signavio Process Manager
SAP Analytics Cloud vs. SAP BusinessObjects Business Intelligence Platform
Microsoft Dynamics CRM vs. SAP CRM
Oracle WMS vs. SAP Warehouse Management
Kinaxis vs. SAP Integrated Business Planning for Supply Chain
SAP PowerDesigner vs. erwin Data Modeler by Quest
VMware
Hyper-V vs. VMware vSphere
Jakarta EE vs. Spring Boot
VMware Fusion Pro vs. VMware Workstation
VMware vSAN vs. VxRail
Microsoft Azure vs. Pivotal Cloud Foundry
VMware Live Recovery vs. Veeam Data Platform
Rancher Labs vs. VMware Tanzu Platform
Azure Stack vs. VMware Cloud Foundation
Red Hat Ansible Automation Platform vs. VMware Aria Automation
CrowdStrike Falcon vs. VMware Carbon Black Endpoint
More comparisons
For Vendors
For Vendors
Learn More
Get Listed
Sign In
Home
Domain Name System (DNS) Security
Webroot DNS Protection
Pros & Cons
Webroot DNS Protection pros and cons
Vendor:
OpenText
4.3
out of 5
5 reviews
100% willing to recommend
Follow
Start review
Overview
Reviews
Pros & Cons
Pricing
Alternatives
Pros & Cons summary
Pros:
Efficient web filtering capabilities that block access to malicious or inappropriate websites.
Easy to set up and manage, with a user-friendly interface.
Provides real-time threat intelligence, ensuring up-to-date protection against emerging threats.
Offers customizable policies, allowing organizations to tailor the protection to their specific needs.
Provides detailed reporting and analytics, enabling better visibility into web usage and potential threats.
Cons:
Some users have reported occasional false positives, blocking legitimate websites.
Limited customization options for advanced users who require more granular control.
The initial setup process may require some technical knowledge.
Some users have experienced occasional performance issues, such as slow response times.
The pricing structure may be considered expensive for small businesses with limited budgets.
Buyer's Guide
Get pricing advice, tips, use cases and valuable features from real users of this product.
Get the category report
Prominent pros & cons
PROS
Enhanced threat detection and prevention capabilities keep networks secure from malicious attacks.
Offers robust filtering options that prevent access to harmful websites and inappropriate content.
Fast and reliable DNS resolution that ensures minimal latency and high performance.
Integrates seamlessly with existing security infrastructure providing an additional layer of protection.
Customizable policy settings that allow for tailored protection based on specific organizational needs.
CONS
Lack of advanced threat detection
Occasional false positives
Limited reporting features
Needs better customer support
Occasional performance slowdown
Webroot DNS Protection Pros review quotes
James Selby
Manager Security Division at Virtual-IT
Dec 14, 2023
Webroot excels in DNS protection, particularly in blocking malicious sites and phishing.
Read full review
JA
Jamshed Alam
Team Lead NOC (HelpDesk Manager) at Top Rated Plus Freelancer on UpWork
Dec 1, 2020
Almost everyone who uses it is happy about the product. I don't get any types of complaints from my clients.
Read full review
RE
Ramy Elsayed
Administrator at zuuTech
Apr 6, 2020
The installation is easy and doesn't take long. The program speedy and doesn't crash. It doesn't consume computer hardware or software.
Read full review
Buyer's Guide
Domain Name System (DNS) Security
March 2025
Download Free Report
Find out what your peers are saying about OpenText, Cisco, TitanHQ and others in Domain Name System (DNS) Security.
Updated: March 2025.
DOWNLOAD NOW
848,207 professionals have used our research since 2012.
KS
KPSingh
Assistant Technical Consultant at Digiswitch Infotech Pvt. Ltd.
Jul 15, 2021
When compared with other products, Webroot DNS Protection is the best to secure the end users.
Read full review
MichaelDixon
Bod at NetMonkeys Ltd
Jan 2, 2024
DNS protection is valuable.
Read full review
Webroot DNS Protection Cons review quotes
James Selby
Manager Security Division at Virtual-IT
Dec 14, 2023
It addresses a specific risk related to malicious sites but doesn't cover broader security aspects.
Read full review
JA
Jamshed Alam
Team Lead NOC (HelpDesk Manager) at Top Rated Plus Freelancer on UpWork
Dec 1, 2020
It needs to be more secure for production environments.
Read full review
RE
Ramy Elsayed
Administrator at zuuTech
Apr 6, 2020
The reporting system needs improvement. They should make is that we can customize it so we can add, remove or change its interface but they use a template. The reports cannot be changed.
Read full review
Buyer's Guide
Domain Name System (DNS) Security
March 2025
Download Free Report
Find out what your peers are saying about OpenText, Cisco, TitanHQ and others in Domain Name System (DNS) Security.
Updated: March 2025.
DOWNLOAD NOW
848,207 professionals have used our research since 2012.
KS
KPSingh
Assistant Technical Consultant at Digiswitch Infotech Pvt. Ltd.
Jul 15, 2021
Reporting is not done in real-time. Rather, it is done in 15-minute intervales. This is something that should be configurable by the admin.
Read full review
MichaelDixon
Bod at NetMonkeys Ltd
Jan 2, 2024
The price could be improved.
Read full review
Product Categories
Product Categories
Domain Name System (DNS) Security
Popular Comparisons
Popular Comparisons
Cisco Umbrella
vs Webroot DNS Protection
TitanHQ WebTitan
vs Webroot DNS Protection
See all alternatives
Product Categories
Product Categories
Domain Name System (DNS) Security
Popular Comparisons
Popular Comparisons
Cisco Umbrella
vs Webroot DNS Protection
TitanHQ WebTitan
vs Webroot DNS Protection
See all alternatives
Related questions
13
When evaluating DNS Security, what aspect do you think is the most important to look for?
10
Why is Domain Name System (DNS) Security important for companies?
20
What DNS security tool do you recommend?
6
Why is domain name system security important?
27
How does Infoblox stand out when compared to other solutions like Cisco Umbrella and Palo Alto Networks Prisma Cloud?
64
How can I connect MEGA HOPEX to a domain using an active director?
28
Which Linux OS solution is better for running DNS software for a telecom company?
Overview
Reviews
Pros & Cons
Pricing
Alternatives
© 2025 PeerSpot, All Rights Reserved.
Twitter
Facebook
LinkedIn
YouTube