IBM Security QRadar EDR vs. Webroot Antivirus + Internet Security Complete (SecureAnywhere)

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
IBM Security QRadar EDR
Score 7.6 out of 10
N/A
IBM Security QRadar EDR (formerly ReaQta) combines automation and dashboards to minimize analyst workloads, detect anomalous endpoint behavior and remediate threats in near real time. With visibility across endpoints, it combines expected features, like MITRE ATT&CK mapping and attack visualizations, with dual-engine AI and automation. For teams that need extended support, managed detection and response (MDR) services offers 24/7 monitoring and response to help keep users…N/A
Webroot Antivirus + Internet Security Complete (SecureAnywhere)
Score 9.3 out of 10
N/A
Webroot Security Complete (formerly under the brand name SecureAnywhere) is a suite of antivirus, multi-endpoint security and Internet security solutions available for home offices, and possibly small businesses with limited security needs.
$30
per seat/per year
Pricing
IBM Security QRadar EDRWebroot Antivirus + Internet Security Complete (SecureAnywhere)
Editions & Modules
No answers on this topic
Webroot Business Endpoint Protection
$30
per seat/per year
Offerings
Pricing Offerings
IBM Security QRadar EDRWebroot Antivirus + Internet Security Complete (SecureAnywhere)
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeOptionalNo setup fee
Additional Details
More Pricing Information
Community Pulse
IBM Security QRadar EDRWebroot Antivirus + Internet Security Complete (SecureAnywhere)
Features
IBM Security QRadar EDRWebroot Antivirus + Internet Security Complete (SecureAnywhere)
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
IBM Security QRadar EDR
7.7
10 Ratings
10% below category average
Webroot Antivirus + Internet Security Complete (SecureAnywhere)
-
Ratings
Anti-Exploit Technology7.79 Ratings00 Ratings
Endpoint Detection and Response (EDR)7.910 Ratings00 Ratings
Centralized Management7.710 Ratings00 Ratings
Hybrid Deployment Support7.39 Ratings00 Ratings
Infection Remediation7.610 Ratings00 Ratings
Malware Detection8.010 Ratings00 Ratings
Best Alternatives
IBM Security QRadar EDRWebroot Antivirus + Internet Security Complete (SecureAnywhere)
Small Businesses
ThreatLocker
ThreatLocker
Score 9.4 out of 10
Malwarebytes
Malwarebytes
Score 8.8 out of 10
Medium-sized Companies
BlackBerry Protect (CylancePROTECT)
BlackBerry Protect (CylancePROTECT)
Score 9.1 out of 10
BlackBerry Protect (CylancePROTECT)
BlackBerry Protect (CylancePROTECT)
Score 9.1 out of 10
Enterprises
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 9.9 out of 10
BlackBerry Protect (CylancePROTECT)
BlackBerry Protect (CylancePROTECT)
Score 9.1 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
IBM Security QRadar EDRWebroot Antivirus + Internet Security Complete (SecureAnywhere)
Likelihood to Recommend
7.2
(11 ratings)
9.3
(27 ratings)
Likelihood to Renew
-
(0 ratings)
10.0
(5 ratings)
Usability
-
(0 ratings)
9.0
(3 ratings)
Availability
-
(0 ratings)
10.0
(1 ratings)
Performance
-
(0 ratings)
10.0
(2 ratings)
Support Rating
-
(0 ratings)
8.0
(2 ratings)
Product Scalability
-
(0 ratings)
10.0
(1 ratings)
User Testimonials
IBM Security QRadar EDRWebroot Antivirus + Internet Security Complete (SecureAnywhere)
Likelihood to Recommend
IBM
IBM Security QRadaar EDR provides all the security features at one place with a reasonable price. Though for smaller organizations, the price may be quite high. Plus since it can detect threats and malwares in real time, every business should try them out.
Read full review
Webroot, an OpenText company
Webroot SecureAnywhere is a good solution for those wanting to protect their endpoints from viruses and malware. It also works great for MSPS as you can manage all clients in a single portal. You have the option for DNS protection and web browser filtering as well. This would also work well in any small business.
Read full review
Pros
IBM
  • Detect known and unknown endpoint security threats
  • Remediate these threats near real time
  • Automation in threat detection
  • Threat attack attack visualization storyboards
  • Alert management authomation
Read full review
Webroot, an OpenText company
  • Webroot checks all search result links and delivers warnings or approvals to users. This means Webroot is thorough and assists to keep users familiar with any potential problem sites.
  • Webroot is easily activated as a Chrome or browser extension to ensure ease of access.
  • Webroot monitors activity and will send updates to the IT department to keep them privy of any potential problems.
Read full review
Cons
IBM
  • use AI to review previous false negatives that contributed wrongly in the AI suggestion on the follow alerts
  • easily run a script based on values from an hash, ips, path inside the boxes on the behavioral tree
  • apply the remediation to a range of endpoint instead to only the endpoint of the current alert
  • use ajax for example to update the alert page automatically while actions are happening
  • for api have profiles that allow only get actions, or just post on some actions
  • create users in bulk
Read full review
Webroot, an OpenText company
  • Webroot could do a better job of working on their integration partnerships with companies like LabTech (now known as Automate). Many times we make it through 2 or 3 levels of support before one of the parties says "oh well you need to talk to LabTech about this" or vice versa. That can be frustrating for partners when trying to understand and resolve issues between the two applications.
  • Cryptolocker/ransomware is a hot topic and I will say that Webroot has provided us with adequate protection when we first started using in 2014. I understand the complexities and challenges AV companies face with new threats being created everyday. I do want to point out that there have been instances where Webroot has not been able to stop one of those types of attacks. After talking with support - it was clear that they had no good answer as to why that particular threat was not stopped and quarantined.
  • Support for the enterprise side of Webroot can be daunting at times. Response times are hit or miss depending on the severity of the issue. Sometimes you get a great support engineer who will go above and beyond - sometimes I ask myself how this person is even employed with the lack of communication skills or actual interest in helping resolve partner issues.
Read full review
Likelihood to Renew
IBM
No answers on this topic
Webroot, an OpenText company
It's easy to renew with Webroot, their support is very attentive and highly available. However if you do choose to change products, they even provide means of removing the software from your endpoints via the admin portal which is very convenient.
Read full review
Usability
IBM
No answers on this topic
Webroot, an OpenText company
There is nothing perfect in this world, but Webroot Antivirus + Internet Security Complete (SecureAnywhere) is easy to use in comparison to others. Also Webroot tech support is only a phone call away. There have been several times I ran into an issue, but tech support as there to help resolve the issue.
Read full review
Support Rating
IBM
No answers on this topic
Webroot, an OpenText company
We have not had to use Webroot support much over the years. The one or two times we did we were referred to online documentation and in a somewhat condescending manner in one case and in another case, the support person did not demonstrate much knowledge of their product and referred us to the user community for support.
Read full review
Alternatives Considered
IBM
Bitdefender GravityZone combines multiple security services into a single platform to reduce the cost of building a trusted environment for endpoints. bit the IBM provides a vast support and always there to guide when in need With the majority of our users working in hybrid mode we needed a strong security control that could provide top-class protection with the minimum amount of False Positives (and, of course, of True Positives).
Read full review
Webroot, an OpenText company
While we consider alternatives from time to time when putting together our budget, we haven't felt the need to thoroughly test a competitor since webroot has been working well for us and we are comfortable with the pricing.
Read full review
Scalability
IBM
No answers on this topic
Webroot, an OpenText company
Ease of implementation across various devices is easy and efficient regardless of scale. Whether it is 5 devices or 500 the product continually proves its the best in its class.
Read full review
Return on Investment
IBM
  • NOCs and SOCs heavily use IBM Security QRadar EDR and IBM Security QRadar EDR reduced labor costs to identify endpoint security threats and the treat remediation
  • IBM Security QRadar EDR offers a consistent approach to endpoint threat identification and resolution, reduces enterprise security operations support costs
  • In general, IBM Security QRadar EDR enhances enterprise security posture
Read full review
Webroot, an OpenText company
  • It has had a mostly positive impact as we have not had any breaches.
  • The only negative impact has been when Webroot Antivirus + Internet Security Complete (SecureAnywhere) changed something on their end that caused one of our business applications to not be usable by end-users. That cost our business a fair amount as it took 4 days before it could be used again.
Read full review
ScreenShots

IBM Security QRadar EDR Screenshots

Screenshot of Behavioral tree: 
A behavioral tree provides full alert and attack visibility.Screenshot of Behavioral tree storyline: 
A visual storyline is automatically created as an attack unfolds, including mapping to MITRE ATT&CK, for full visibility.Screenshot of Cyber Assistant alerts: 
The Cyber Assistant, an AI-powered alert management system, can autonomously handle alerts, reducing analysts’ workloads.Screenshot of Cyber Assistant recommends:
The Cyber Assistant learns from analyst decisions, then retains the intellectual capital and learned behaviors to make recommendations and help reduce false positives.Screenshot of Custom detection strategies: 
Detection Strategy (DeStra) scripting allows users to build custom detection strategies — beyond preconfigured models — to address compliance or company-specific requirements without the need to reboot the endpoint.