Secureanywhere for Pcs User Guide

Total Page:16

File Type:pdf, Size:1020Kb

Secureanywhere for Pcs User Guide User Guide for PCs SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection Copyright Webroot SecureAnywhere User Guide for PCs July, 2013 © 2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is a trademark of Webroot Software, Inc. All other product and company names mentioned may be trademarks or registered trademarks of their respective owners. Table of Contents Getting Started 1 Installing SecureAnywhere on a PC 2 Creating a Webroot account 8 Using the SecureAnywhere interface 12 Using the system tray 14 Viewing protection status 15 Scanning for Malware 17 Running scans 18 Viewing the latest scan results 18 Running a scan immediately 19 Managing detected threats 21 Changing the scan schedule 22 Changing the scan settings 25 Shielding Your PC 29 Managing shields 30 Changing Realtime shield settings 32 Changing Behavior shield settings 35 Changing Core System shield settings 38 Changing Web Threat shield settings 41 Using Web Threat protection 44 Surfing websites 44 Using search engines 45 Using Firewall Protection 47 Managing the firewall 48 Changing firewall alert settings 49 Managing network applications 50 Managing Quarantine 53 Managing quarantined items 54 Managing file detection 56 Using antimalware tools 58 Managing Identity Protection 61 Managing Identity Protection 62 Changing Identity Protection settings 63 Managing protected applications 66 Managing protected websites 69 Managing Passwords 73 Using password management 74 Downloading the passwords component 75 Managing Backup & Sync 77 Using Backup & Sync 78 Downloading the Backup & Sync component 79 Synchronizing files 81 Changing sync settings 85 Adding sync folders 88 Synchronizing folders with other computers 92 Removing a folder from synchronization 95 Backing up files 97 Changing backup settings 101 Changing backup filters 104 Changing the backup schedule 107 Checking file status 109 Using the System Cleaner 113 Running a system cleanup 114 Running a scheduled cleanup 117 Changing Windows Desktop settings 120 Changing Windows system settings 123 Changing Application settings 126 Changing Internet Explorer settings 128 Using Secure File Removal 132 Viewing the cleanup log 135 Using Advanced Tools 137 Controlling active processes 138 Using the SafeStart sandbox 140 Saving a scan log 142 Using the System Analyzer 143 Viewing the execution history 145 Viewing the protection statistics 146 Managing Your Account 149 Viewing your account details 150 Activating a new keycode 151 Renewing your subscription 152 Checking for updates 153 Setting Preferences 155 Setting general preferences 156 Setting basic configuration 162 Setting access control 166 Defining proxy server settings 169 Adjusting heuristics 172 Exporting and importing settings 177 Setting self protection 180 Accessing Support and Resources 183 Accessing Technical Support options 184 Accessing additional publications 185 Saving a threat log for analysis 186 Submitting a file to Webroot for analysis 187 Glossary 189 Index 193 Getting Started Webroot® SecureAnywhere™ delivers complete protection against viruses, spyware, and other online threats without slowing down PC performance or disrupting your normal activities. With its fast scans and threat removal, you can rest assured that malware is eliminated quickly and easily. SecureAnywhere gives you the freedom to surf, share, shop, and bank online — all with the confidence that your PC and your identity will be kept safe. Note: This guide describes the features of all SecureAnywhere editions: AntiVirus, Internet Security Plus, Complete, or Endpoint. Your edition may not include some of the features described in this guide. To get started with SecureAnywhere, see the following topics: Installing SecureAnywhere on a PC 2 Creating a Webroot account 8 Using the SecureAnywhere interface 12 Using the system tray 14 Viewing protection status 15 - 1 - User Guide for PCs Installing SecureAnywhere on a PC SecureAnywhere is available in several editions, described in the table below. If you aren't certain which edition you purchased, look at the email from Webroot (if you purchased SecureAnywhere online) or the product packaging (if you purchased SecureAnywhere from a store). SecureAnywhere editions AntiVirus Provides protection from viruses, spyware, and phishing. Also includes a firewall and features for safe web searching. This edition is available with: l Licenses for 1 or 3 devices (PC or Mac) l Subscriptions for 1 or 2 years Internet Security Provides all the features of the AntiVirus edition, plus a Plus password management feature and protection for mobile devices. This edition is available with: l Licenses for 3 or 5 devices (PC, Mac, or mobile) l Subscriptions for 1 or 2 years Complete Provides all the features of the Internet Security Plus edition, along with a system cleaner that removes traces of Internet activity and a feature for backing up and synchronizing your data. This edition is available with: l Licenses for 5 devices (PC, Mac, or mobile) l Subscriptions for 1, 2, or 3 years Endpoint Provides all the features of the AntiVirus edition, plus the system cleaner. (This product is available only with the Endpoint Protection business version of SecureAnywhere.) - 2 - Getting Started You can install SecureAnywhere on a device with one of the following operating systems: SecureAnywhere system requirements PCs Compatible with the following operating systems: ® l Windows 8 32-bit and 64-bit l Windows 7 32-bit and 64-bit (all Editions), Windows 7 SP1 32-bit and 64-bit (all Editions) l Windows XP 32-bit and 64-bit SP2, SP3 ® l Windows Vista 32-bit (all Editions), Windows Vista SP1, SP2 32-bit and 64-bit (all Editions) Minimum system requirements: l Intel®Pentium®/Celeron® family, or AMD® K6/Athlon™/Duron™ family, or other compatible processor l 128 MB RAM (minimum) l 10 MB Hard Disk Space Internet access with one of the following browsers: l Microsoft® Internet Explorer® 7.0 and higher l Mozilla® Firefox® 3.6 and higher l Google Chrome™ 10.0 or higher Macs Compatible with the following operating systems: l Mac OS® X v.10.7 "Lion" l Mac OS X v. 10.8 " Mountain Lion" For more information on Mac requirements and how to install SecureAnywhere on a Mac, see the Webroot SecureAnywhere User Guide for Mac OS X. You will also need a separate installer file for Mac. Go to your Mac and download the file from: http://anywhere.webrootcloudav.com/zerol/wsamac.dmg - 3 - User Guide for PCs SecureAnywhere system requirements Mobile Compatible with the following operating systems: l Android™ devices with operating system version 2.2 or higher l Apple® devices with iOS version 4.2 or later (compatible with iPhone®, iPod touch®, and iPad® mobile digital devices) Mobile apps are available with the purchase of Internet Security Plus or Complete editions. You can also purchase them separately. To download and install mobile apps, see the download instructions. To install SecureAnywhere on a PC: 1. Before you begin: a. Read the license agreement at: http://detail.webrootanywhere.com/eula.asp. b. Close all programs that may be open on your computer. c. Make sure you have the keycode, which is a 20-character license that identifies your Webroot account. Your keycode comes in an email message or is listed inside the retail box. If you purchased a multi-user license, you can use the same keycode to install the software on up to three or five devices. Note: The keycode is associated only with SecureAnywhere and does not include any information related to your computer or its configuration. Webroot does not use the keycode in any way to track individual use of its products. 2. Start the installation routine either from a CD or from a downloaded file: l If you are installing from a CD, insert the CD into the CD drive. An installation dialog opens where you can click a link to begin. If the installation dialog does not open, use Windows Explorer to navigate to your CD drive and double-click the software’s installation file. l If you are installing from a downloaded file, navigate to where you downloaded the file in Windows Explorer and double-click the file to start the installation. Click Run to begin. 3. When the Webroot installer dialog opens, enter your keycode in the field. (If your keycode came in an email, you can cut and paste the code into this field.) - 4 - Getting Started 4. If desired, you can click the Installation Options link at the bottom right to modify these settings: o Change the installation location. In this field, you can enter a different folder for the SecureAnywhere installation files. o Create a shortcut to SecureAnywhere on the desktop. Click this checkbox to place a shortcut icon on your Windows Desktop for Webroot SecureAnywhere. o Randomize the installed filename to bypass certain infections. Click this checkbox to change the Webroot installation filename to a random name (for example, “QrXC251G.exe”), which prevents malware from detecting and blocking Webroot’s installation file. o Protect the SecureAnywhere files, processes, and memory from modification. Click this checkbox to enable self protection and the CAPTCHA prompts. (CAPTCHA requires that you read distorted text on the screen and enter the text in a field before performing any critical actions.) For more information, see "Setting self protection" on page 180 and "Setting access control" on page 166. o Change Language. To change the language displayed in SecureAnywhere, click the Change Language button and select from the supported languages. (You can only change the displayed language during installation, not after.) The Installation Options dialog is similar to the following example. - 5 - User Guide for PCs Click Close when you're done. 5. At the main Installation dialog, click Agree and Install to begin installation. 6. If you are prompted to enter an email address, enter your address and click Continue. SecureAnywhere begins scanning and configuring the application. If your system is clean, SecureAnywhere displays a status screen similar to the following example.
Recommended publications
  • Webroot Secureanywhere User Guide Complete Edition
    User Guide for the Complete Edition Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Version 8.0.1 Webroot SecureAnywhere User Guide for the Complete Edition Version 8.0.1; May, 2012 © 2011- 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is a trademark of Webroot Software, Inc. All other product and company names mentioned may be trademarks or registered trademarks of their respective owners. Contents 1: Getting Started . .1 Installing the software. .2 Using the main interface. .5 Using the system tray menu. .6 Viewing the protection status . .7 Creating a Webroot account. .8 Adding PCs to your account . .9 Adding mobile devices to your account . .10 Viewing the PC security status online . .11 2: Scans . .15 About scans . .16 Running an immediate scan. .17 Running a custom scan . .19 Changing the scan schedule . .21 Changing scan settings . .23 3: Shields . .25 About shields . .26 Changing Realtime shield settings . .27 Changing Behavior shield settings . .29 Changing Core System shield settings . .31 Changing Web Threat shield settings . .33 4: Firewall. .35 About the firewall . .36 Changing firewall alert settings . .37 Managing network applications . .38 5: Quarantine . .41 About quarantine . .42 Managing quarantined items . .43 Managing file detection . .45 Using antimalware tools . .47 Saving a threat log . .49 6: Identity Protection. .51 About the Identity shield. .52 Changing Identity shield settings . .53 Managing protected applications . .55 Managing protected websites. .57 7: Password Management . .61 About Password Management . .62 Downloading the Passwords component . .63 Capturing login credentials in a website.
    [Show full text]
  • Hostscan 4.8.01064 Antimalware and Firewall Support Charts
    HostScan 4.8.01064 Antimalware and Firewall Support Charts 10/1/19 © 2019 Cisco and/or its affiliates. All rights reserved. This document is Cisco public. Page 1 of 76 Contents HostScan Version 4.8.01064 Antimalware and Firewall Support Charts ............................................................................... 3 Antimalware and Firewall Attributes Supported by HostScan .................................................................................................. 3 OPSWAT Version Information ................................................................................................................................................. 5 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.890.0 for Windows .................................................. 5 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.890.0 for Windows ........................................................ 44 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.824.0 for macos .................................................... 65 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.824.0 for macOS ........................................................... 71 Cisco AnyConnect HostScan Antimalware Compliance Module v4.3.730.0 for Linux ...................................................... 73 Cisco AnyConnect HostScan Firewall Compliance Module v4.3.730.0 for Linux .............................................................. 76 ©201 9 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
    [Show full text]
  • Q3 Consumer Endpoint Protection Jul-Sep 2020
    HOME ANTI- MALWARE PROTECTION JUL - SEP 2020 selabs.uk [email protected] @SELabsUK www.facebook.com/selabsuk blog.selabs.uk SE Labs tested a variety of anti-malware (aka ‘anti-virus’; aka ‘endpoint security’) products from a range of well-known vendors in an effort to judge which were the most effective. Each product was exposed to the same threats, which were a mixture of targeted attacks using well-established techniques and public email and web-based threats that were found to be live on the internet at the time of the test. The results indicate how effectively the products were at detecting and/or protecting against those threats in real time. 2 Home Anti-Malware Protection July - September 2020 MANAGEMENT Chief Executive Officer Simon Edwards CONTENTS Chief Operations Officer Marc Briggs Chief Human Resources Officer Magdalena Jurenko Chief Technical Officer Stefan Dumitrascu Introduction 04 TEstING TEAM Executive Summary 05 Nikki Albesa Zaynab Bawa 1. Total Accuracy Ratings 06 Thomas Bean Solandra Brewster Home Anti-Malware Protection Awards 07 Liam Fisher Gia Gorbold Joseph Pike 2. Threat Responses 08 Dave Togneri Jake Warren 3. Protection Ratings 10 Stephen Withey 4. Protection Scores 12 IT SUPPORT Danny King-Smith 5. Protection Details 13 Chris Short 6. Legitimate Software Ratings 14 PUBLICatION Sara Claridge 6.1 Interaction Ratings 15 Colin Mackleworth 6.2 Prevalence Ratings 16 Website selabs.uk Twitter @SELabsUK 6.3 Accuracy Ratings 16 Email [email protected] Facebook www.facebook.com/selabsuk 6.4 Distribution of Impact Categories 17 Blog blog.selabs.uk Phone +44 (0)203 875 5000 7.
    [Show full text]
  • Endpoint Integrity Check\221\316\211\236\210\352\227\227.Xlsx
    エンドポイントインテグリティチェック - アンチウイルス対応メーカ一覧 360safe.com AEC, spol. s r.o. ALWIL Software AT & T AVG Technologies Agnitum Ltd AhnLab, Inc. Aliant America Online, Inc. Antiy Labs Authentium, Inc. Avanquest Publishing USA, Inc. Avira GmbH Beijing Rising Technology Corp. Ltd. Bell Bell Aliant BellSouth Bitdefender BullGuard Ltd. CJSC Returnil Software CMC Information Security Cat Computer Services Pvt. Ltd. Central Command , Inc. Check Point, Inc Cisco Systems, Inc. ClamAV ClamWin Comodo Group Computer Associates International, Inc Coranti, Inc Crawler LLC Cyber Defender Corp. Defender Pro LLC ESTsoft Corp. EathLink, Inc Emsi Software GmbH Eset Software F-Secure Corp. FairPoint Faronics Corporation Fortinet, Inc Frisk Software International GData Software AG GFI Software Grisoft, Inc. H+BEDV Datentechnik GmbH HAURI, Inc IKARUS Software GmbH Internet Security Systems, Inc. Jiangmin, Inc K7 Computing Pvt. Ltd. kaspersky Labs Kingsoft Corp. LANDesk Software, Ltd. Lavasoft, Inc. Lumension Security McAfee, Inc. MicroWorld Microsoft Corp. N-able Technologies Inc Nano Security New Technology Wave Inc. Norman ASA ONO Omniquad PC Tools Software PCSecurityShield Panda Software Parallels, Inc. Preventon Technologies Ltd. Prevx Ltd. Quick Heal Technologies (P) Ltd. Radialpoint Inc. Rogers SOFTWIN SalD Ltd. Security Coverage Inc. Sereniti, Inc. Shavlik Technologies Sophos, Plc Sunbelt Software Symantec Corp. TELUS Thirtyseven4, LLC. Tobit.Software Trend Micro, Inc. Troppus Software Corporation TrustPort, a.s. VCOM VMware, Inc. Verizon Videotron Virgin Broadband Virgin Media Virus BlokAda Ltd. Virus Buster Ltd. Webroot Software, Inc Yahoo!, Inc Zone Labs LLC e frontier, Inc. eEye Digital Security iolo technologies, LLC.
    [Show full text]
  • PC Pitstop Supershield 2.0
    Anti -Virus Comparative PC Matic PC Pitstop SuperShield 2.0 Language: English February 2017 Last Revision: 30 th March 2017 www.av-comparatives.org Commissioned by PC Matic - 1 - PC Pitstop – February 2017 www.av-comparatives.org Introduction This report has been commissioned by PC Matic. We found PC Matic PC Pitstop very easy to install. The wizard allows the user to change the location of the installation folder and the placing of shortcuts, but the average user only needs to click Next a few times. The program can be started as soon the setup wizard completes. A Different Approach PC Matic approaches security differently than traditional security products. PC Matic relies mainly on a white list to defeat malware; this can lead to a higher number of false alarms if users have files which are not yet on PC Matic’s whitelist. Unknown files are uploaded to PC Matic servers, where they get compared against a black- and white list (signed and unsigned). By default, PC Matic SuperShield only blocks threats and unknown files on-execution, but does not remove/quarantine them. Additional features In addition to malware protection, PC Matic also provides system maintenance and optimization features. These include checking for driver updates, outdated programs with vulnerabilities, erroneous registry entries and disk fragmentation. A single scan can be run which checks not only for malware, but also for any available system optimization opportunities. Commissioned by PC Matic - 2 - PC Pitstop – February 2017 www.av-comparatives.org Tested products The tested products have been chosen by PC Matic. We used the latest available product versions and updates available at time of testing (February 2017).
    [Show full text]
  • Webroot Secureanywhere® Business Endpoint Protection the Security Industry Had a BIG IDEA About How to Address Today’S Increasing Threats
    Webroot SecureAnywhere® Business Endpoint Protection The security industry had a BIG IDEA about how to address today’s increasing threats. Push down gargantuan loads of signatures to ever fatter software clients. Face it, your current endpoint security software is slow, heavy, and you wonder if it causes more problems than it solves. Meanwhile you have to keep up with a number of new challenges – from a more mobile workforce to more dangerous malware. Has this broken model pushed you to the breaking point? Do long scan times, massive downloads, and slow performance make your users less productive ? Do constant updates, patches, and reimaging requests distract you and your staff from addressing true business needs ? Does mammoth security software consume too many resources on your users’ computers – and does managing it require a dedicated server ? Are you concerned that you don’t have enough control when endpoint devices leave the office ? “Over 450,000 new “67% of attacks carried “No organization is immune malicious software programs out are for criminal to the problem of security are registered each day.” purposes.” risks, regardless of size.“ AV-Test, The Independent IT – Security Institute Hackmageddon.com Canalys Research Fixing security requires a new, Smarter approach. It’s called forget the old approach. Seeing traditional security software become too big and too much “Downloaded, copied to target, set up, installed, of a burden on endpoint devices, networks, and IT staff, Webroot “running, baselined, and fully scanned in 5 minutes? I’d decided to start fresh. We built a new kind of security software that love to see anyone else come close.” Sean Kethcart, IT Systems Support Analyst, Haymarket Center completely does away with old-school approaches like signature downloads, the need for constant updates, and big-footprint client “This is by far the fastest, easiest malware solution I software.
    [Show full text]
  • Cisco Identity Services Engine Supported Windows AV/AS/PM/DE
    Cisco Identity Services Engine Supported Windows AS/AV, Patch Management and Disk Encryption Products Compliance Module Version 3.6.10363.2 This document provides Windows AS/AV, Patch Management and Disk Encryption support information on the the Cisco AnyConnect Agent Version 4.2. Supported Windows Antispyware Products Vendor_Name Product_Version Product_Name Check_FSRTP Set_FSRTP VirDef_Signature VirDef_Time VirDef_Version 360Safe.com 10.x 360安全卫士 vX X v v 360Safe.com 4.x 360安全卫士 vX X v v 360Safe.com 5.x 360安全卫士 vX X v v 360Safe.com 6.x 360安全卫士 vX X v v 360Safe.com 7.x 360安全卫士 vX X v v 360Safe.com 8.x 360安全卫士 vX X v v 360Safe.com 9.x 360安全卫士 vX X v v 360Safe.com x Other 360Safe.com Antispyware Z X X Z X Agnitum Ltd. 7.x Outpost Firewall Pro vX X X O Agnitum Ltd. 6.x Outpost Firewall Pro 2008 [AntiSpyware] v X X v O Agnitum Ltd. x Other Agnitum Ltd. Antispyware Z X X Z X AhnLab, Inc. 2.x AhnLab SpyZero 2.0 vv O v O AhnLab, Inc. 3.x AhnLab SpyZero 2007 X X O v O AhnLab, Inc. 7.x AhnLab V3 Internet Security 2007 Platinum AntiSpyware v X O v O AhnLab, Inc. 7.x AhnLab V3 Internet Security 2008 Platinum AntiSpyware v X O v O AhnLab, Inc. 7.x AhnLab V3 Internet Security 2009 Platinum AntiSpyware v v O v O AhnLab, Inc. 7.x AhnLab V3 Internet Security 7.0 Platinum Enterprise AntiSpyware v X O v O AhnLab, Inc. 8.x AhnLab V3 Internet Security 8.0 AntiSpyware v v O v O AhnLab, Inc.
    [Show full text]
  • Q1 Home Anti-Malware Protection Jan-Mar 2020
    HOME ANTI- MALWARE PROTECTION JAN - MAR 2020 www.SELabs.uk [email protected] @SELabsUK www.facebook.com/selabsuk blog.selabs.uk SE Labs tested a variety of anti-malware (aka ‘anti-virus’; aka ‘endpoint security’) products from a range of well-known vendors in an effort to judge which were the most effective. Each product was exposed to the same threats, which were a mixture of targeted attacks using well-established techniques and public email and web-based threats that were found to be live on the internet at the time of the test. The results indicate how effectively the products were at detecting and/or protecting against those threats in real time. 2 Home Anti-Malware Protection January - March 2020 MANAGEMENT Chief Executive Officer Simon Edwards CONTENTS Chief Operations Officer Marc Briggs Chief Human Resources Officer Magdalena Jurenko Chief Technical Officer Stefan Dumitrascu Introduction 04 TESTING TEAM Executive Summary 05 Thomas Bean Solandra Brewster 1. Total Accuracy Ratings 06 Dimitar Dobrev Liam Fisher Home Anti-Malware Protection Awards 07 Gia Gorbold Dave Togneri 2. Threat Responses 08 Jake Warren Stephen Withey 3. Protection Ratings 10 IT SUPPORT 4. Protection Scores 12 Danny King-Smith Chris Short 5. Protection Details 13 PUBLICATION 6. Legitimate Software Ratings 14 Steve Haines Colin Mackleworth 6.1 Interaction Ratings 15 Website www.SELabs.uk 6.2 Prevalence Ratings 16 Twitter @SELabsUK Email [email protected] 6.3 Accuracy Ratings 16 Facebook www.facebook.com/selabsuk Blog blog.selabs.uk 6.4 Distribution of Impact Categories 17 Phone 0203 875 5000 Post SE Labs Ltd, 7.
    [Show full text]
  • ESAP 2.8.4 Release Notes
    ESAP 2.8.4 Release Notes Version Mac and Windows 3.6.10120.2 (V2 Unified + V3). Published July 2015 Note: The SDK embedded in this ESAP version has been tested and qualified to interoperate with a limited list of end endpoint security applications covering most of the widely used products listed in the supported products list, all new products added to the supported list and all products for which a bug fix was added in this release. Noteworthy changes: • This ESAP version contains additional files in preparation of new features that will be enabled in the next major release of SA and IC. ESAP 2.8.4 and Pulse Secure Access/Access Control Service Compatibility Chart: This ESAP package can be installed on the following Pulse Secure Access/Access Control Service software versions. • SA 8.0Rx • SA 7.4Rx • SA 7.3Rx • SA 7.2Rx • SA 7.1Rx • SA 7.0Rx • SA 6.5Rx • UAC 5.0Rx • UAC 4.4Rx • UAC 4.3Rx • UAC 4.2Rx • UAC 4.1Rx • UAC 4.0Rx • UAC 3.1Rx © 2015 by Pulse Secure, LLC. All rights reserved 2 Note: The ESAP package may install and function without any errors on older releases however as the install has not been tested, we recommend that it be used only on the above versions of software releases. Support has been added for the following products in ESAP2.8.4 Windows OS Antivirus Products [Bitdefender] Endpoint Client by Bitdefender (5.x) [Symantec Corp.] Norton Internet Security (22.x) [Webroot Software, Inc.] Webroot AntiVirus (9.x) Antispyware Products [Bitdefender] Endpoint Client by Bitdefender (5.x) [Symantec Corp.] Norton Internet Security (22.x) [Webroot Software, Inc.] Webroot AntiVirus (9.x) Firewall Products [Bitdefender] Endpoint Client by Bitdefender Firewall (5.x) [Microsoft Corp.] Microsoft Windows Firewall (10.x) [Symantec Corp.] Norton Internet Security (22.x) MAC OS Antivirus Products [Doctor Web] Dr.Web for Mac (10.x) [F-Secure Corp.] F-Secure Anti-Virus for Mac (1.x) [Kaspersky Labs] Kaspersky Anti-Virus (15.x) Antispyware Products [Doctor Web] Dr.Web for Mac (10.x) © 2015 by Pulse Secure, LLC.
    [Show full text]
  • Partner Edge
    PROGRAM BRIEF Partner Edge MSP Program The Webroot Partner Edge Program helps our MSP, Reseller, Distributor and Security vendor partners to grow their businesses with predictable and recurring revenue income from our cloud-based cybersecurity and threat intelligence solutions. Webroot provides the industry-specific tools; security and threat intelligence services; training; integrations; certifications and platforms partners need to ensure the reliability and trust so essential to your customers. Webroot’s goal is to empower all of our We are always business partners to become their most successful. looking for Why partner with Webroot? industry leading • Predictable, recurring revenue grows your business • Sales and marketing tools enable greater profitability technologies • Superior cybersecurity solutions that reduce your costs to bring to our • Technical and sales certifications to support your Service clients. Webroot’s MSPs who partner with Webroot enjoy: technology has • Single endpoint solution for antivirus/antimalware greatly reduced • Powerful integrated Endpoint and DNS protection, plus automated security awareness training to empower end users virus disruptions • Lower operational costs on our clients’ • Superior productivity, uptime, and customer satisfaction • Single-pane-of-glass online management console designed for multi-sites and systems. customers to reduce administrative effort • Zero on-site hardware infrastructure to maintain Erik Nachbahr • Rollback remediation and no reimaging President and Founder • RMM integrations
    [Show full text]
  • Fileless Malware Protection Test
    FILELESS MALWARE PROTECTION TEST OCTOBER 2017 Fileless Malware Protection Test. October 2017. 1 / 12 INTRODUCTION In times of digitalization of each aspect of public and private life new and interesting techniques of bypassing protections are abundant. Although for a few years the main threat among the malicious software has still been the techniques based on asymmetric cryptography, we cannot complain about the lack of methods of deceiving the protection products whose level of preparation and complicated escalation cycle exceed the viruses from the ransomware family. The threats examined in this report are so-called fileless malware. Although the infection vector usually starts traditionally, i.e. from the delivery of a malicious file to the victim’s computer – via scam or a drive-by download attack as a result of using an exploit – this is where the similarities to traditional attacks with files end. The fileless malicious software operates directly in the computer’s internal memory. In this scenario, the activated virus will not be transferred to quarantine by the protecting software as it is not a file, but a set of instructions to be executed, operating on system processes. The authors of malicious code, who often are experts in their field, can use this in order not to leave any traces on the hard drive and to make detection by the antivirus software difficult. The fileless threats have a few features in common with rootkits: they can store data in the register which is the base for the settings of internal memory and some applications, and even intercept and modify some low-level API functions.
    [Show full text]
  • Faqs for Webroot Secureanywhere Identity Shield
    FAQs for Webroot SecureAnywhere Identity Shield Table of Contents General Questions .....................................................................................................................................................2 Why is the bank offering Webroot SecureAnywhere Identity Shield? ............................................................................................. 2 What does it protect? ....................................................................................................................................................................... 2 Who is Webroot? .............................................................................................................................................................................. 2 Is the Webroot software different from the bank than I can get directly from Webroot? .............................................................. 2 Can I upgrade Webroot software? .................................................................................................................................................... 2 What is the difference between my antivirus and Webroot SecureAnywhere Identity Shield? ...................................................... 2 What happens if my Webroot SecureAnywhere Identity Shield detects a threat? .......................................................................... 3 Installing Webroot SecureAnywhere Identity Shield ....................................................................................................4
    [Show full text]