Webroot Business Endpoint is a winner in all aspects
December 18, 2019

Webroot Business Endpoint is a winner in all aspects

chuck rogers | TrustRadius Reviewer
Score 10 out of 10
Vetted Review

Overall Satisfaction with Webroot Business Endpoint Protection

We implemented Webroot Business Endpoint Protection in 2015 to our end-user residential clients, small businesses, and internal use in our office and test environment. Our expectations of the level of protection were far surpassed and continually keep top spot in our eyes for internet security. The type of protection, the ability to monitor endpoints, and the small footprint are what make it the best. Keep up the good work Webroot...1150 endpoints protected!
  • Leaves a small footprint.
  • Easy deployment.
  • REMOVAL OF ENDPOINT, UNINSTALL, REMOVAL TOOL.
  • Customizable Alert notifications.
  • Monthly recurring revenue.
  • Stability for our business in off-season months.
I can tell you that the Webroot Business Endpoint Protection is much better than the competition in three primary areas. Number one; they are the smallest footprint so as not to decrease the performance of the endpoint. Number two; Webroot Business Endpoint Protection is very effective at blocking threats and keeping clients safe. And number three; the billing model is a no brainer.

Do you think Webroot Endpoint Protection delivers good value for the price?

Yes

Are you happy with Webroot Endpoint Protection's feature set?

Yes

Did Webroot Endpoint Protection live up to sales and marketing promises?

Yes

Did implementation of Webroot Endpoint Protection go as expected?

Yes

Would you buy Webroot Endpoint Protection again?

Yes

The payment methods allow for a monthly subscription deployment for recurring revenue which is a great business model with a great product.

As far as where it is less appropriate; devices that have closed operating system environments such as chrome books, embedded operating systems, and I don't like the cell phone version.

Webroot Endpoint Protection Feature Ratings

Anti-Exploit Technology
8
Endpoint Detection and Response (EDR)
10
Centralized Management
8
Hybrid Deployment Support
10
Infection Remediation
10
Vulnerability Management
8
Malware Detection
7

Webroot Business Endpoint Protection Support

This is very hard to explain without more words than are needed. Simply put, they are there when you need them.