DATASHEET | Next Gen Endpoint Security Solution

Webroot Business Endpoint Protection A ‘Next Gen’ Endpoint Security Solution

Cutting Through the Hype to Discover Real Next-Gen Detection and Response

PREDICT

PROTECT/PREVENT

Evaluate individual devices’ D security postures E T Real-time anti-

Assess, predict, and A protection prioritize protection M and script/exploit O Leverage cloud-based, T

shields U real-time machine learning

A Web threat and identity shields Continuous, collective, (only needs partial metadata)

Behavioral heuristics/Infrared

cloud-driven, real-time

threat monitoring and

assessment

+

Containment to

safeguard users, data,

DETECT

systems, and

A

communications

REMEDIATE U

Core system shield

T

O

Behavioral detection with

M

Perform automatic threat

real-time extended analysis

A

remediation

T

and containment

E

Report on threat dwell-time, D

Continuous journaling and

extent, duration, type

monitoring

Feed data back to threat

intelligence platform in real

time

Next-Gen Endpoint Security

Defining “Next-Gen” Security experts, analysts, and vendors use a variety of terms and jargon to describe detection and response capabilities. Today many “traditional” the makeup of their next-generation endpoint security, with none agreeing on a set antivirus companies have added next-gen features to their existing definition. Originally, the term was coined to differentiate innovators in endpoint architectures and lines between the two have begun to blur. security, meaning those who no longer relied upon traditional file scanning methods Today, a next-gen endpoint security solution does have some to detect threats. differences (many of them involve better system performance Modern solutions have re-architected their detection and protection and multi-vector defense layers). But the real question is: “Is my approaches to use more advanced prevention, detection, and prevention methods endpoint protection highly effective at protecting me and my system that don’t rely on the slower, signature-based defenses that were then widely used. from the sophisticated, multi-level attacks being used to infect devices today?” To accomplish that, you need endpoint protection The term next-gen also refers to solutions that use real-time predictive methods like that examines every process on every device and counters all attack machine learning (ML), artificial intelligence (AI), and behavioral analysis to increase vectors to stop the malicious tactics now in use every day. prevention efficacy and speed. In some cases, the term extends to automated threat Key Next-Gen Threat Detection Techniques Webroot – Advanced Endpoint Protection Typically, a next-gen endpoint security solution should employ: Threat Prevention (pre-execution) »» Automated detection and response (ADR) to stop threats and Application/file blacklisting 3 remediate systems automatically Application whitelisting 3 »» Behavioral analysis to identify malicious files based on behavioral Application/file execution isolation 3 deviations or anomalies Application/file reputation analysis 3 »» Threat intelligence that processes data through ML and AI algorithms On-host machine learning (for pre-execution file scanning) 3 to determine whether a file or process is malicious Host Intrusion Prevention System 3 Threat Detection (Post-Execution) »» protection to record file and system changes so Endpoint behavioral analysis with prioritized alerts 3 systems can be restored to their pre-infected state in the event of a 3 ransomware infection On-host machine learning (for malicious behavior detection) User behavior analysis (used for external threat validation/risk adjustment) 3 »» Forensics capable of replaying attacks to help security teams better Dwell-time network and device infection reporting 3 mitigate future breaches Remediation/Control »» Endpoint detection and response to continuously monitor systems Endpoint behavioral analysis with automatic containment options 3 and networks to mitigate advanced threats Automatic, policy-based endpoint configuration roll-back 3 »» Anti-script/anti-exploit protection that prevents application exploits Automatic, policy-based file quarantine 3 from launching Malicious in-memory activity containment 3 Additional Threat Protection/Prevention In addition, features like granular policy customization, low system Continuous endpoint security monitoring 3 resource usage, and ease of operation are also major differentiators. Collective real-time threat protection 3 Real-Time Anti-Phishing 3 Webroot® Business Endpoint Protection – Web browser and safe search security 3 The 1st Next-Gen Endpoint Protection Privacy and identity credential protection 3 In 2011, Webroot launched a completely re-architected and unique Next Gen Performance Features endpoint security solution to replace our traditional, signature-based Automated system malware protection and containment 3 antivirus products. In doing so, Webroot became the first cloud-based Highly effective predictive pre-execution protection 3 cybersecurity vendor using an advanced machine learning-based threat Auto-quarantine and system remediation 3 intelligence platform to power real-time predictive and behavioral analysis Low system resources usage - RAM; CPU and Disk - in use and at idle 3 to deliver highly automated threat prevention and protection. Low system resource usage - general operation 3 Since then we have continually evolved and enhanced our prevention and Negligible false positives/negatives 3 protection capabilities to increase efficacy, efficiency, and ease of use. This approach is highly attractive for small to medium-sized businesses Summary and managed service providers because it arms them with an endpoint ® security solution that just works, and is highly effective at stopping attacks Webroot Business Endpoint Protection offers the advanced prediction, designed to compromise both users and their devices. detection, prevention, and protection today’s organizations need. And, with its cloud-based architecture and advanced multi-vector approach to The following are some of the key ways in which Webroot® Business Endpoint stopping user and device attacks, a highly effective and efficient endpoint Protection uses next-gen and other advanced endpoint protection capabilities security solution that simply works when it comes to stopping infections to protect devices and users from being compromised and infected. and compromises.

About Webroot Webroot, a Carbonite company, harnesses the cloud and artificial intelligence to protect businesses and individuals against cyber threats. We provide endpoint protection, network protection, and security awareness training solutions purpose built for managed service providers and small businesses. Webroot BrightCloud® Threat Intelligence Services are used by market leading companies like Cisco, F5 Networks, Citrix, Aruba, Palo Alto Networks, A10 Networks, and more. Leveraging the power of machine learning to protect millions of businesses and individuals, Webroot secures the connected world. Webroot operates globally across North America, Europe, Australia and Asia. Discover Smarter Cybersecurity® solutions at webroot.com.

World Headquarters Webroot EMEA Webroot APAC 385 Interlocken Crescent 6th floor, Block A Suite 1402, Level 14, Tower A Suite 800 1 George’s Quay Plaza 821 Pacific Highway Broomfield, Colorado 80021 USA George’s Quay, Dublin 2, Ireland Chatswood, NSW 2067, Australia +1 800 772 9383 +44 (0) 870 1417 070 +61 (0) 2 8071 1900

© 2019 Webroot Inc. All rights reserved. Webroot, BrightCloud, FlowScape, SecureAnywhere, and Smarter Cybersecurity are trademarks or registered trademarks in the United States and/or other countries. All other trademarks are properties of their respective owners. DS _ 071119 _ US