Webroot is light and quick, just needs real multi-factor authentication
James Buchholz | TrustRadius Reviewer
November 12, 2019

Webroot is light and quick, just needs real multi-factor authentication

Score 8 out of 10
Vetted Review
Reseller
Review Source

Overall Satisfaction with Webroot Business Endpoint Protection

It is used as our primary endpoint protection for all of the computers we manage for our SLA customers.
  • It's easy to deploy.
  • It's very quick to install.
  • It's easy to uninstall.
  • You can make many different configurations to fit different customers.
  • You can make global exceptions for common programs that all your customers may use.
  • 2FA is absolutely atrocious.
  • Bad actors have recently used webroot as a means to execute scripts. It has since been patched, but it didn't leave me with a great feeling.
  • On Mac computers, it seems to always throw false positives.
  • It has had a positive impact. We're getting a great deal on it through Connectwise.
  • It has kept viruses out of our systems very reliably so that saves us a lot of headaches and time wasted and loss of customer trust.
Webroot is extremely light on the system resources and incredibly quick to install. From what I've seen it's just as good for malware as Kaspersky and ESET.
We've only had to contact them once and they were responsive and helpful.

Do you think Webroot Business Endpoint Protection delivers good value for the price?

Yes

Are you happy with Webroot Business Endpoint Protection's feature set?

Yes

Did Webroot Business Endpoint Protection live up to sales and marketing promises?

Yes

Did implementation of Webroot Business Endpoint Protection go as expected?

Yes

Would you buy Webroot Business Endpoint Protection again?

Yes

Great for very quick deployment, and it has kept Emotet viruses at bay VERY reliably.
Less appropriate for any environment where EDR or machine learning is needed.

Webroot Business Endpoint Protection Feature Ratings

Anti-Exploit Technology
8
Centralized Management
10
Infection Remediation
10
Vulnerability Management
10
Malware Detection
10