Skip to main content
TrustRadius
Webroot Endpoint Protection

Webroot Endpoint Protection

Overview

What is Webroot Endpoint Protection?

Webroot Endpoint Protection is the OpenText company's business class multi-vector endpoint protection application, providing centralized endpoint management, deep learning intelligence, and advanced behavioral analytics. For SMBs, Webroot Smarter Cybersecurity solutions were designed from the ground up to stop advanced threats…

Read more
Recent Reviews

Webroot works

7 out of 10
September 14, 2023
Incentivized
We deploy the antivirus app to all of our client workstations and servers at various locations. We handle billing our clients for the …
Continue reading
Read all reviews

Popular Features

View all 7 features
  • Anti-Exploit Technology (16)
    8.9
    89%
  • Centralized Management (18)
    7.0
    70%
  • Malware Detection (18)
    7.0
    70%
  • Infection Remediation (18)
    7.0
    70%

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing

Business Endpoint Protection

$150.00

On Premise
per 5 seats

Business Endpoint Protection

$690.00

On Premise
per 25 seats

Business Endpoint Protection

Contact sales team

On Premise
per 50+ seats

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Features

Endpoint Security

Endpoint security software protects enterprise connected devices from malware and cyber attacks.

7.6
Avg 8.5
Return to navigation

Product Details

Webroot Endpoint Protection Technical Details

Deployment TypesOn-premise
Operating SystemsWindows, Mac
Mobile ApplicationNo

Frequently Asked Questions

Webroot Endpoint Protection is the OpenText company's business class multi-vector endpoint protection application, providing centralized endpoint management, deep learning intelligence, and advanced behavioral analytics. For SMBs, Webroot Smarter Cybersecurity solutions were designed from the ground up to stop advanced threats like ransomware and phishing. For MSPs, the company offers the Webroot® Business Endpoint Protection + MDR security solution.

Reviewers rate Endpoint Detection and Response (EDR) highest, with a score of 9.

The most common users of Webroot Endpoint Protection are from Small Businesses (1-50 employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(70)

Attribute Ratings

Reviews

(1-23 of 23)
Companies can't remove reviews or game the system. Here's why
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • It blocks/prevents users from clicking through on phishing email.
  • It protects the integrity and availability of company data.
  • It allows end users to feel more secure as they go about their daily business.
  • Unless I just haven't found it, I'd like more automated reporting.
  • Email reports on a periodic basis summarizing activities during that period would be nice.
  • I would also like remote controls/access to endpoint's protection.
Score 6 out of 10
Vetted Review
Verified User
Incentivized
  • It is easy to deploy, which especially since it was integrated with the RMM solution we were using.
  • It was easy to manage/administer.
  • The administration interface provided a useful pie chart to show the different endpoint agent versions that were being used across the endpoints.
  • It was missing detections. We found a better product that detects more malware.
  • Deploying the endpoint agents was easy, but deploying Web Threat Shield was not and users could disable that functionality.
  • When you deactivated old endpoints, they were put in an "inactive" category. You could not then delete the "inactive" endpoints. For someone who likes to keep things clean, this was annoying.
  • I found the rollout of endpoint agent updates to be rather slow.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Stays active without consuming heavy resources like memory and CPU.
  • Stays updated without intervention and crashes.
  • Stops threats before they enter.
  • Management console can be slow to load when using from mobile devices.
  • Mobile app would help with management.
  • Deployment was challenging for some remote workers.
Patrick Doutre | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Runs silently in the background
  • Installs/updates silently
  • Provides detailed information about any threats found
  • It is a little resource intensive, and as a non profit, our computer hardware is not top of the line, so it can cause some slowdown during day to day usage
  • The backend management UI could use some work.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Protects end-point desktop and laptop devices
  • Good reporting of protection status and incidents
  • Easy to maintain end-point inventory
  • There are several configuration options for both end-point and DNS protection. Would like a more simple way to understand and validate settings.
  • Support is heavily video or FAQ based although you can submit a Support Ticket. Would like more availability to an actual support engineer.
  • Overtime you can forget how to change setting - a refresher course would be nice, especially as new features are added to the solution.
Score 9 out of 10
Vetted Review
ResellerIncentivized
  • Low to no impact on device performance.
  • Installs in less than a minute; install can be scripted and pushed out.
  • Centralized management console for all endpoints.
  • Removal does not always go smoothly and sometimes requires registry changes.
  • Billing does not always match up with console endpoints in active status.
  • Support is prompt to respond, but resolution is not always as fast.
Yvonne Graber | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
ResellerIncentivized
  • Web filtering
  • Blocking malware
  • Firewall protection
  • Installation and configuration
  • Not so easy to add exclusion or exception.
  • Not easy to turn off a managed workstation to install software that it thinks is an issue.
  • A bit more user friendly.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Screens incoming e-mails for threats
  • Blocks potentially dangerous websites
  • Removes infected files from downloaded materials
  • Can't screen for the newest threats on the web
  • Sometimes misses threats in documents
  • Overly aggressive at times, blocking legitimate websites by mistake
Adam Friedli | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
ResellerIncentivized
  • Its footprint is very small. We have not seen performance impacts on the machine, and scans are very fast. The only time there have been issues is when testing for needed exclusions. Once everything is configured, you can't notice it's there unless it alerts for a threat.
  • The installation is quick and doesn't require a reboot. This is very useful, as we don't need to worry about rebooting machines before protection is active. It also installs within 5 minutes at the most. That is not an exaggeration, and it's usually even faster than that.
  • I would like to see an option for automatic cleanup of duplicate Agents. Occasionally, a machine will show up twice and one of the Agents will show as disconnected. I'm not entirely sure if this is from updates or something weird in Windows. We stay on top of cleaning this up on a regular basis, but for instances where the names are similar enough to detect duplicates, it would be nice to automate this and then have a report sent showing what was cleaned up in case there was a mistake.
Paul Li | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
  • Webroot Endpoint Protection is easy to deploy. Staff just needs to receive a link to run the installation along with an input key.
  • Webroot Endpoint Protection provides a very simple method to monitor all computer status via a web sign-in portal. From this portal, the admin can temporarily disable Webroot in case it's preventing certain programs from being installed.
  • We experienced problems with getting Webroot Endpoint Protection to be deployed to protect web browsers. Unfortunately, users when opening a web browser will have to for the first time accept the Webroot extension/add-in protection. If staff chooses to not allow the extension/add-in to run, then there would be no web browser protection.
  • Webroot Endpoint Protection seems to take a bit of time to uninstall. The documentation shows a possibility of waiting for up to 24 hours. The uninstallation response time should be immediate when this agent operation/command is selected on the web portal.
Hunter Bonner | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Detecting infections
  • Resolving them without user or administrator interaction
  • I do not like that the web console has you "deactivate" but not delete. It's cosmetic, but it's annoying.
  • There is an ongoing issue where the license key for one organization gets confused with endpoints with another, and it will never rectify itself.
James Buchholz | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
ResellerIncentivized
  • It's easy to deploy.
  • It's very quick to install.
  • It's easy to uninstall.
  • You can make many different configurations to fit different customers.
  • You can make global exceptions for common programs that all your customers may use.
  • 2FA is absolutely atrocious.
  • Bad actors have recently used webroot as a means to execute scripts. It has since been patched, but it didn't leave me with a great feeling.
  • On Mac computers, it seems to always throw false positives.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • Implementation - super easy and seamless.
  • Security - constant monitoring and automatic updates.
  • Low memory use - the application takes almost no memory running in the background and does not distract from any other activities.
  • In my opinion, it's a perfect system. I have no complaints - truly.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • The minimal amount of resources used to both install and run the program in the background for our end users is very efficient.
  • The amount of time in between when an infection is found on a user's computer and when we in the IT department are notified is very fast and enables us to react to these issues in a very timely fashion.
  • Having all of the virus and malware definitions in the cloud proactively checking for not just files but behaviors of how files act is a very cool feature to have as well.
  • I don't like how from the admin console, I am not able to scan an individual file on an end user's computer. I can only do either a full system scan or a scan of a user's folder. It would be nice if it could get a little more granular.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
  • It is very light weight and does not tax the computers resources
  • Has a quick scan and does not take forevere when scanning
  • It's central management on the web makes it easy to use and gives tons of control for Admins
  • Sometimes when programs are being blocked it can be time consuming to unblock
  • There are steps on removing webroot from a computer if it is locked down by policy and removing will take knwoing how.
  • Never really have had too many issues with Webroot honestly
Ron Fenili | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
  • Cloud-based client updates, client computers are always up-to-date
  • Single pane administration, provides quick client remediation when malware or a virus is detected.
  • Cloud-based defense provides a much better defense for zero-day exploits than traditional A/V solutions.
  • more notification when a client is not updating or connecting to the console
  • Manual remediation is required after being notified of malware or virus.
Return to navigation