SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Webroot SecureAnywhere Business



Webroot® Intelligence Network
Real-Time Protection From Every Malware Infection


Malware is at such high levels (more than 60 million                                                        Recent global research by Webroot* revealed that 83
unique samples per year) that protecting an endpoint with                                                   percent of enterprises were infected with some form of
traditional antivirus software has become futile. More than                                                 malware in the past 12 months, and other independent
100,000 new types of malware are now released every                                                         surveys show similar and even higher infection levels.
day, and antivirus vendors are racing to add new protection
features to try to keep their protection levels up.                                                        A new malware protection approach is desperately needed.
                                                                                                           The Webroot Intelligence Network (WIN) is the key
But new features need even more CPU and RAM resources,                                                     component of a revolutionary approach to next-generation
which reduces performance and usability to even more                                                       malware protection. When WIN is combined with
unacceptable levels. The torrent of new malware is also                                                    Webroot’s ultra-efficient endpoint agent—Webroot
forcing antivirus vendors to continually update their                                                      SecureAnywhere™ – Endpoint Protection—the resulting
signature/protection files, with more than 5MB of updates                                                  solution ensures that both known and unknown infections
per day being commonplace.                                                                                 are removed before they do harm.

The underlying problem is that even with all these “advances,”
not all new malware exploits are detected, and machines
are becoming infected. Simply put, protection using traditional
malware detection techniques is no longer adequate.
So many unknown infections are being distributed by cyber-
criminals that everyone is at risk.




                                                           How the Webroot Intelligence Network (WIN) Works




* Research in January 2011 by Research Now—IT decision-makers in firms 100 to 5,000 seats in the USA, UK, and Australia
Webroot Intelligence Network



The Webroot Intelligence Network (WIN)                                 The Good, The Bad, And The Unknown
The Webroot Intelligence Network integrates billions of                WIN uses the Internet to connect with Webroot
pieces of information from multiple sources—including data             SecureAnywhere – Endpoint Protection through a
from customers, test laboratories, and intelligence shared             secure firewall connection. It identifies and learns about
between security vendors—to create the world’s largest                 everything installed on a user’s endpoint, and then
malware detection net.                                                 classifies the files as Good, Bad, or Unknown. During
                                                                       the short “learning” phase, Webroot inventories
WIN incorporates Webroot’s patented fourth-generation                  everything on the user’s machine, while automatically
Phileas® malicious code identification system, as well as              stopping bad activities and removing malware.
ENZO, our threat-processing system for categorizing
every software file with intimate knowledge of more                    From the point when Webroot SecureAnywhere – Endpoint
than 125 million executables, including their behavioral               Protection is installed, all suspicious processes are closely
characteristics. WIN also uses systems that let us instantly           monitored, analyzed, and resolved in real time through WIN.
categorize files and their interactions with other files. It           Its vast intelligence net keeps Webroot users safe from both
uses our Webroot IP Reputation Service to track every                  known and completely new and unknown infections. Even
malicious IP address on the Internet and provide accurate              when Webroot SecureAnywhere – Endpoint Protection is
content classification, threat reputation, and threat vector           not connected to the Internet, it is able to function, detect
data. These systems, along with another 50+ terabytes                  malware, and take the appropriate steps to stop infections.
of threat data, ensure that the Webroot Intelligence
Network is always up to date and ready to detect any                   No approach to stopping and protecting machines from
new malware infections.                                                infection is perfect, however, and false positive mistakes
                                                                       are possible. Webroot SecureAnywhere – Endpoint
                                                                       Protection and WIN minimize these inaccuracies, even
                                                                       allowing a change to be reversed should files be
                                                                       incorrectly categorized.




                                                                                                Webroot Customer Data Feeds

                                                                                      External Threat Data Feeds



                    Remote Laptop Users (client app<1MB)




                                                                                           Known File
                                                           REAL-TIME                      Hash Database
    Admin Console                                          FILE DATA
      (browser)


                                                                              Behaviors
                                                                                                 Other
                                                                              Database
                                                                                            Threat Databases



           Corporate Workstations (client app<1MB)
                                                                                 Webroot Intelligence Network


                                                     How Webroot SecureAnywhere Works
Webroot Intelligence Network



Protection From Infection,
Not Protection Through Detection
By combining the hugely powerful cloud interrogation                         With its advanced heuristics and behavior-based
of WIN with a completely new endpoint, Webroot                               interception analyzing all files and potential threats in real
SecureAnywhere – Endpoint Protection is able to stop                         time, WIN ensures that every user’s window of vulnerability—
infections without requiring lots of signature updates.                      the time between when a threat emerges and when users
WIN harnesses the collective community of Webroot                            are protected —is minimized. And most important, it is this
customers to continuously refine file categorizations,                       high level of protection against “unknown” malware that
even for low-level and unique malware that normally                          makes Webroot SecureAnywhere – Endpoint Protection and
remains undetected by traditional AV methods.                                WIN so powerful when compared with every other solution.

This capability ensures that all Webroot endpoints are
always protected against malware, including viruses,
worms, Trojans, spyware, adware, bots, rootkits, and
unique zero-day threats.




How is WIN different from other “cloud” antivirus solutions?
Other vendors have invested in threat intelligence networks, but             3. WIN allows ultrafast scan times—a PC scan will typically take less
they are used as bolt-on supplements to their traditional antivirus             than one minute, so it never noticeably interrupts users or unacceptably
solutions. None of these systems delivers or offers the breadth of              slows down their PC.
in-depth capabilities offered by WIN. WIN is purpose architected             4. WIN promotes low PC resource usage. Webroot SecureAnywhere –
to be an integral part of the Webroot SecureAnywhere – Endpoint                 Endpoint Protection needs only 5MB of RAM; even when scanning,
Protection solution.                                                            it uses less than 50 percent of the CPU’s resources.
When comparing Webroot with competitors’ solutions, the                      5. WIN also allows Webroot SecureAnywhere – Endpoint Protection to be
differences and advantages of Webroot’s revolutionary new                       completely update free, with only ultra-low data exchanges between
approach to infection protection quickly become clear:                          them needed. All the updating happens in the “cloud,” resulting in WIN
                                                                                network traffic of only about 120KB per day—significantly less than
1. WIN allows Webroot SecureAnywhere – Endpoint Protection to have a            bandwidth usage by other antivirus solutions.
   footprint that is less than 1MB in size—the world’s smallest endpoint
                                                                             WIN with Webroot SecureAnywhere – Endpoint Protection is a
   security solution. In comparison, the nearest traditional or “cloud”
                                                                             brand-new way of protecting PCs from malware. It eliminates
   antivirus solution installation file is more than 128MB, and antivirus
                                                                             traditional signature-based detection and fully exploits the
   solutions can easily use 750MB of hard disk space when fully installed.
                                                                             benefits of cloud computing and a central intelligence net. Its
2. Because of its exceptionally small installation size, Webroot             unique approach to preventing malware infection provides
   SecureAnywhere – Endpoint Protection installs in seconds. And             enterprises with not only the best security protection available,
   it doesn’t require traditional AV software solutions to be uninstalled    but also improvements to PC performance and greatly reduced
   beforehand, since it doesn’t conflict with their detection processes.     management overheads.
Webroot Intelligence Network




Try the Webroot Intelligence Network for yourself
Download a free trial, or request a demonstration of Webroot SecureAnywhere – Endpoint Protection
and its intuitive web-based security policy management console at www.webroot.com.


About Webroot                                                                          Webroot Headquarters
Webroot is committed to taking the misery out of Internet                              385 Interlocken Crescent, Suite 800
security for businesses and consumers. Founded in 1997,                                Broomfield, Colorado 80021 USA
privately held Webroot is headquartered in Colorado and                                800 772 9383
has operations across North America, Europe and the Asia
Pacific region. For more information visit www.webroot.com.                            Next steps:
                                                                                       Talk to an enterprise product expert by calling 800 870 8102



© 2012 Webroot Inc. All rights reserved. Webroot, SecureAnywhere, Webroot SecureAnywhere and Phileas are trademarks or registered trademarks of Webroot Inc. in the
United States and/or other countries.

Weitere ähnliche Inhalte

Was ist angesagt?

Network Security Risk
Network Security RiskNetwork Security Risk
Network Security RiskDedi Dwianto
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security BoxSophos
 
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report PresentationSophos
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012Symantec
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityUltraUploader
 
ENT-Data-Sheet_Features-Benefits
ENT-Data-Sheet_Features-BenefitsENT-Data-Sheet_Features-Benefits
ENT-Data-Sheet_Features-BenefitsENT Technologies
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentKaspersky
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attackskevinmass30
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancementsNarenda Wicaksono
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2fadielmoussa
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec
 
Junos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite LaunchJunos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite LaunchJuniper Networks
 
Sandbox Technology in AntiVirus
Sandbox Technology in AntiVirusSandbox Technology in AntiVirus
Sandbox Technology in AntiVirusAshish Gautam
 

Was ist angesagt? (18)

Network Security Risk
Network Security RiskNetwork Security Risk
Network Security Risk
 
UTM - The Complete Security Box
UTM - The Complete Security BoxUTM - The Complete Security Box
UTM - The Complete Security Box
 
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012
 
2013 Security Threat Report Presentation
2013 Security Threat Report Presentation2013 Security Threat Report Presentation
2013 Security Threat Report Presentation
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus security
 
ENT-Data-Sheet_Features-Benefits
ENT-Data-Sheet_Features-BenefitsENT-Data-Sheet_Features-Benefits
ENT-Data-Sheet_Features-Benefits
 
Cybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking AboutCybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking About
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
 
It kamus virus security glossary
It kamus virus   security glossaryIt kamus virus   security glossary
It kamus virus security glossary
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacks
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
 
Junos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite LaunchJunos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite Launch
 
Sandbox Technology in AntiVirus
Sandbox Technology in AntiVirusSandbox Technology in AntiVirus
Sandbox Technology in AntiVirus
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
 

Ähnlich wie Real-Time Protection From Every Malware Infection

Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.Yury Chemerkin
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesIşınsu Akçetin
 
Todd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012Nicolai Henriksen
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser ProtectionSophos
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security
 
chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}richbryansalvo
 
Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)richbryansalvo
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protectionphanleson
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementIntergen
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsAnthony Daniel
 
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET Journal
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't StopSophos
 
White Paper: Defense In Breadth
White Paper: Defense In BreadthWhite Paper: Defense In Breadth
White Paper: Defense In BreadthCourtland Smith
 
VIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTIC
VIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTICVIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTIC
VIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTICijcsit
 

Ähnlich wie Real-Time Protection From Every Malware Infection (20)

Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.
 
McAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded DevicesMcAffee_Security and System Integrity in Embedded Devices
McAffee_Security and System Integrity in Embedded Devices
 
Todd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane's PhD Proposal
Todd Deshane's PhD Proposal
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Sophos EndUser Protection
Sophos EndUser ProtectionSophos EndUser Protection
Sophos EndUser Protection
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 
chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}
 
Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 
Microsoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT ManagementMicrosoft System Center 2012 Delivering better IT Management
Microsoft System Center 2012 Delivering better IT Management
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefits
 
NetWitness
NetWitnessNetWitness
NetWitness
 
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
 
8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop8 Threats Your Anti-Virus Won't Stop
8 Threats Your Anti-Virus Won't Stop
 
White Paper: Defense In Breadth
White Paper: Defense In BreadthWhite Paper: Defense In Breadth
White Paper: Defense In Breadth
 
VIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTIC
VIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTICVIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTIC
VIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTIC
 

Kürzlich hochgeladen

Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 

Kürzlich hochgeladen (20)

Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 

Real-Time Protection From Every Malware Infection

  • 1. Webroot SecureAnywhere Business Webroot® Intelligence Network Real-Time Protection From Every Malware Infection Malware is at such high levels (more than 60 million Recent global research by Webroot* revealed that 83 unique samples per year) that protecting an endpoint with percent of enterprises were infected with some form of traditional antivirus software has become futile. More than malware in the past 12 months, and other independent 100,000 new types of malware are now released every surveys show similar and even higher infection levels. day, and antivirus vendors are racing to add new protection features to try to keep their protection levels up. A new malware protection approach is desperately needed. The Webroot Intelligence Network (WIN) is the key But new features need even more CPU and RAM resources, component of a revolutionary approach to next-generation which reduces performance and usability to even more malware protection. When WIN is combined with unacceptable levels. The torrent of new malware is also Webroot’s ultra-efficient endpoint agent—Webroot forcing antivirus vendors to continually update their SecureAnywhere™ – Endpoint Protection—the resulting signature/protection files, with more than 5MB of updates solution ensures that both known and unknown infections per day being commonplace. are removed before they do harm. The underlying problem is that even with all these “advances,” not all new malware exploits are detected, and machines are becoming infected. Simply put, protection using traditional malware detection techniques is no longer adequate. So many unknown infections are being distributed by cyber- criminals that everyone is at risk. How the Webroot Intelligence Network (WIN) Works * Research in January 2011 by Research Now—IT decision-makers in firms 100 to 5,000 seats in the USA, UK, and Australia
  • 2. Webroot Intelligence Network The Webroot Intelligence Network (WIN) The Good, The Bad, And The Unknown The Webroot Intelligence Network integrates billions of WIN uses the Internet to connect with Webroot pieces of information from multiple sources—including data SecureAnywhere – Endpoint Protection through a from customers, test laboratories, and intelligence shared secure firewall connection. It identifies and learns about between security vendors—to create the world’s largest everything installed on a user’s endpoint, and then malware detection net. classifies the files as Good, Bad, or Unknown. During the short “learning” phase, Webroot inventories WIN incorporates Webroot’s patented fourth-generation everything on the user’s machine, while automatically Phileas® malicious code identification system, as well as stopping bad activities and removing malware. ENZO, our threat-processing system for categorizing every software file with intimate knowledge of more From the point when Webroot SecureAnywhere – Endpoint than 125 million executables, including their behavioral Protection is installed, all suspicious processes are closely characteristics. WIN also uses systems that let us instantly monitored, analyzed, and resolved in real time through WIN. categorize files and their interactions with other files. It Its vast intelligence net keeps Webroot users safe from both uses our Webroot IP Reputation Service to track every known and completely new and unknown infections. Even malicious IP address on the Internet and provide accurate when Webroot SecureAnywhere – Endpoint Protection is content classification, threat reputation, and threat vector not connected to the Internet, it is able to function, detect data. These systems, along with another 50+ terabytes malware, and take the appropriate steps to stop infections. of threat data, ensure that the Webroot Intelligence Network is always up to date and ready to detect any No approach to stopping and protecting machines from new malware infections. infection is perfect, however, and false positive mistakes are possible. Webroot SecureAnywhere – Endpoint Protection and WIN minimize these inaccuracies, even allowing a change to be reversed should files be incorrectly categorized. Webroot Customer Data Feeds External Threat Data Feeds Remote Laptop Users (client app<1MB) Known File REAL-TIME Hash Database Admin Console FILE DATA (browser) Behaviors Other Database Threat Databases Corporate Workstations (client app<1MB) Webroot Intelligence Network How Webroot SecureAnywhere Works
  • 3. Webroot Intelligence Network Protection From Infection, Not Protection Through Detection By combining the hugely powerful cloud interrogation With its advanced heuristics and behavior-based of WIN with a completely new endpoint, Webroot interception analyzing all files and potential threats in real SecureAnywhere – Endpoint Protection is able to stop time, WIN ensures that every user’s window of vulnerability— infections without requiring lots of signature updates. the time between when a threat emerges and when users WIN harnesses the collective community of Webroot are protected —is minimized. And most important, it is this customers to continuously refine file categorizations, high level of protection against “unknown” malware that even for low-level and unique malware that normally makes Webroot SecureAnywhere – Endpoint Protection and remains undetected by traditional AV methods. WIN so powerful when compared with every other solution. This capability ensures that all Webroot endpoints are always protected against malware, including viruses, worms, Trojans, spyware, adware, bots, rootkits, and unique zero-day threats. How is WIN different from other “cloud” antivirus solutions? Other vendors have invested in threat intelligence networks, but 3. WIN allows ultrafast scan times—a PC scan will typically take less they are used as bolt-on supplements to their traditional antivirus than one minute, so it never noticeably interrupts users or unacceptably solutions. None of these systems delivers or offers the breadth of slows down their PC. in-depth capabilities offered by WIN. WIN is purpose architected 4. WIN promotes low PC resource usage. Webroot SecureAnywhere – to be an integral part of the Webroot SecureAnywhere – Endpoint Endpoint Protection needs only 5MB of RAM; even when scanning, Protection solution. it uses less than 50 percent of the CPU’s resources. When comparing Webroot with competitors’ solutions, the 5. WIN also allows Webroot SecureAnywhere – Endpoint Protection to be differences and advantages of Webroot’s revolutionary new completely update free, with only ultra-low data exchanges between approach to infection protection quickly become clear: them needed. All the updating happens in the “cloud,” resulting in WIN network traffic of only about 120KB per day—significantly less than 1. WIN allows Webroot SecureAnywhere – Endpoint Protection to have a bandwidth usage by other antivirus solutions. footprint that is less than 1MB in size—the world’s smallest endpoint WIN with Webroot SecureAnywhere – Endpoint Protection is a security solution. In comparison, the nearest traditional or “cloud” brand-new way of protecting PCs from malware. It eliminates antivirus solution installation file is more than 128MB, and antivirus traditional signature-based detection and fully exploits the solutions can easily use 750MB of hard disk space when fully installed. benefits of cloud computing and a central intelligence net. Its 2. Because of its exceptionally small installation size, Webroot unique approach to preventing malware infection provides SecureAnywhere – Endpoint Protection installs in seconds. And enterprises with not only the best security protection available, it doesn’t require traditional AV software solutions to be uninstalled but also improvements to PC performance and greatly reduced beforehand, since it doesn’t conflict with their detection processes. management overheads.
  • 4. Webroot Intelligence Network Try the Webroot Intelligence Network for yourself Download a free trial, or request a demonstration of Webroot SecureAnywhere – Endpoint Protection and its intuitive web-based security policy management console at www.webroot.com. About Webroot Webroot Headquarters Webroot is committed to taking the misery out of Internet 385 Interlocken Crescent, Suite 800 security for businesses and consumers. Founded in 1997, Broomfield, Colorado 80021 USA privately held Webroot is headquartered in Colorado and 800 772 9383 has operations across North America, Europe and the Asia Pacific region. For more information visit www.webroot.com. Next steps: Talk to an enterprise product expert by calling 800 870 8102 © 2012 Webroot Inc. All rights reserved. Webroot, SecureAnywhere, Webroot SecureAnywhere and Phileas are trademarks or registered trademarks of Webroot Inc. in the United States and/or other countries.