Webroot Business Endpoint Protection is one of the solutions my solution provider recommends using with my RMM tool since the product offers better integration capabilities and pricing models. I use Webroot Business Endpoint Protection in my company for endpoint security, virus protection, and web security.
Sys Admin at a tech services company with 11-50 employees
Real User
Top 5
2022-11-08T14:55:18Z
Nov 8, 2022
I use it on some workstations, but we're in the process of moving away from it. At one point, we had it on all our workstations, but we started having some issues with it, and we've been migrating to Microsoft Defender, which is integrated with the Microsoft 365 environment.
Learn what your peers think about Webroot Business Endpoint Protection. Get advice and tips from experienced pros sharing their opinions. Updated: October 2024.
Snr. Cyber Security Analyst at a tech services company with 51-200 employees
Real User
2022-04-01T19:22:02Z
Apr 1, 2022
Webroot Endpoint Protection secures threat mitigation. Then, of course, there are elements for continual data monitoring to get to the areas that are affected. The ASA is frontline as far as the next-generation firewall goes. We incorporated a whole bunch of elements for identification, classification of threats, grouping, and integration with it; as well as logging application data from endpoints on the network into a log server for further processing. There are a lot of features in ASA. Over time, it has remained the model for NG USM like Webroot.
Administrator at a financial services firm with 10,001+ employees
Real User
2021-12-13T19:46:45Z
Dec 13, 2021
My primary use cases were protecting against computer infections like viruses or malware files, applying policies to the end-user, and blocking websites or applications from running through the admin console.
Manager-IT at a financial services firm with 11-50 employees
Real User
2021-07-13T15:11:01Z
Jul 13, 2021
We have been using a two-prong security system for our network. We had a combination of Kaspersky along with Webroot Business Endpoint Protection. This gave us two layers of defense and it has been working really well for us. With the current increased world threat scenarios, we are looking for other protection possibilities.
We are a small managed-service provider. One of the services we are providing to our clients is the endpoint protection for mobiles. We are also offering cybersecurity for computers and of course backup plus technical support. So mobile endpoint protection is just one of the various services we are providing. We install Webroot Endpoint Protection for mobiles for our clients so that we can keep mobiles secured. In case the mobile is stolen or lost, we can wipe everything from the device from our end. We can also locate the mobile and lock the mobile if it is connected to the internet.
We use Webroot with other components that can be added to endpoint protection. This gives us a better, more capable solution. We use Webroot Endpoint Protection as a multi-layered security solution.
Webroot Business Endpoint Protection provides comprehensive endpoint protection, antivirus, and security features across devices like mobiles, computers, and servers to prevent malware and other threats.
Webroot Business Endpoint Protection helps businesses manage endpoint security through its robust cloud application and integrates with RMM tools for improved management and pricing. It offers EMS service, automatic updates, and a lightweight agent, ensuring ease of use and minimal...
Webroot Business Endpoint Protection is one of the solutions my solution provider recommends using with my RMM tool since the product offers better integration capabilities and pricing models. I use Webroot Business Endpoint Protection in my company for endpoint security, virus protection, and web security.
I use Webroot Business Endpoint Protection for my company's smaller customers who cannot buy EDRs.
We use Webroot Business Endpoint Protection as a security solution. It helps us protect end users' machines.
We use it as a security tool for all our production services. So we have Webroot via a client on every production server.
I use it on some workstations, but we're in the process of moving away from it. At one point, we had it on all our workstations, but we started having some issues with it, and we've been migrating to Microsoft Defender, which is integrated with the Microsoft 365 environment.
It is just an antivirus. We have it on the machines to help mitigate anything before it takes hold of the network.
We've got it on a few hundred workstations on the solution. We use it as an antivirus.
Webroot Endpoint Protection secures threat mitigation. Then, of course, there are elements for continual data monitoring to get to the areas that are affected. The ASA is frontline as far as the next-generation firewall goes. We incorporated a whole bunch of elements for identification, classification of threats, grouping, and integration with it; as well as logging application data from endpoints on the network into a log server for further processing. There are a lot of features in ASA. Over time, it has remained the model for NG USM like Webroot.
My primary use cases were protecting against computer infections like viruses or malware files, applying policies to the end-user, and blocking websites or applications from running through the admin console.
We have servers on the cloud and we have different use cases for Webroot Business Endpoint Protection.
We have been using a two-prong security system for our network. We had a combination of Kaspersky along with Webroot Business Endpoint Protection. This gave us two layers of defense and it has been working really well for us. With the current increased world threat scenarios, we are looking for other protection possibilities.
Our customers use it for protection. It is deployed on most user machines, and the servers are in the cloud.
We primarily use the solution for its endpoint protection. We used it as a firewall and antivirus.
All of our machines have Webroot installed on it and actively engage in endpoint protection.
We are a small managed-service provider. One of the services we are providing to our clients is the endpoint protection for mobiles. We are also offering cybersecurity for computers and of course backup plus technical support. So mobile endpoint protection is just one of the various services we are providing. We install Webroot Endpoint Protection for mobiles for our clients so that we can keep mobiles secured. In case the mobile is stolen or lost, we can wipe everything from the device from our end. We can also locate the mobile and lock the mobile if it is connected to the internet.
We use Webroot with other components that can be added to endpoint protection. This gives us a better, more capable solution. We use Webroot Endpoint Protection as a multi-layered security solution.