What is Endpoint Protection?
Endpoint protection software secures user devices such as desktops, laptops, and mobile devices against cyber attacks. It protects devices and networks against viruses, malware and ransomware attacks and therefore protects you from loss of data.
Why do schools and academies need Endpoint Protection?
Both the DfE and the National Cyber Security Centre (NCSC) have noticed an increasing number of cyber attacks affecting education.
Organisations of all sizes are under constant attack from cyber criminals, who use multiple threats to steal credentials, bypass defences and infect computers. With the variety, volume and speed of attacks increasing, it has never been more critical to deploy effective endpoint security.
Internet4schools recommends Webroot Business Endpoint Protection to schools and academies
Webroot is a next-generation, cloud-based endpoint security solution. It uses the power of machine learning to monitor and adapt each system’s endpoint defences to the unique threats that your systems and users face.
Because it takes a predictive, adaptive, multi-layered approach to stopping attacks in real time, Webroot Business Endpoint Protection offers a faster and more effective alternative to traditional antivirus solutions.
Webroot Business Endpoint Protection is very different from the other endpoint security solutions. As a software-as-a-service (SaaS), cloud-based driven endpoint security solution, it offers a variety of benefits.
The Webroot Approach
The small but powerful software agent needs just 30 seconds to install and won’t conflict with existing security software. It will even run over the top of existing antivirus software making deployment fast and easy.
Fully remote endpoint management
The single integrated management console gives administrators full security visibility and control over any device with the software agent installed. Admins can manage multiple sites and locations, allocate different access permissions and admin rights all from a single online console. And there’s no on-premises hardware to manage.
Fully automated operation
Endpoint Protection is easy to deploy, manage, and maintain. Use pre-configured policy templates or create your own. There are no signatures or definitions to manage; all protection occurs in real-time, from the cloud, without impacting the user’s or admin’s experience. Admins can also automate software updates, which takes 5 seconds or less and are transparent to the user. Webroot uses automated alerting and scheduled reporting.
On- and offline protection and auto-remediation
Webroot uses propriety technology to monitor, journal, and contain potential infections, even when a given endpoint is offline. This reduces the number of false detections to nearly negligible levels.
Instead of a Volume Shadow Copy, which can be compromised by attackers, Webroot uses a patented approach to preserving data and system changes. That means a compromised endpoint’s local drives may be automatically restored to its uninfected state, without re-imaging.
User transparency and low system overheads
A key advantage of a cloud-driven, real-time approach is the heavy processing is performed in the cloud, not on the client device. Consequently, full scheduled scans are transparent to users. System CPU and RAM usage are lightweight and don’t hog resources. Most users will hardly notice Webroot Business Endpoint Protection running.
Unlike traditional antivirus, which only has one opportunity to detect and stop a threat, Webroot protection works in multiple stages. First, it attempts to prevent malware from infiltrating the system. If malware does get through, Webroot protection stops it before it can execute. Should it execute (this might happen in cases of brand-new, never-before-seen malware), Webroot protection will journal the file’s activities and undo its changes to local drives, once it’s determined to be malware.
Powered by world-class threat intelligence
Network and security vendors worldwide trust Webroot protection solutions. Webroot has been using machine learning to classify and categorize threats since 2007. Its advanced 6th- generation machine learning architecture processes threat data sourced from a variety of vetted sources, as well as our own real-world customers and users of our technology partners’ solutions.
Endpoint Protection at a Glance
» Secure and resilient distributed cloud architecture – We use multiple secure global data centres to support customers and roaming users globally with full service resilience and redundancy.
» Layered user and device defences – Stop attacks that take advantage of poor user awareness, not just those that target device vulnerabilities.
» Malware detection, prevention, and protection – Prevent viruses, malware, Trojans, phishing, ransomware, spyware, browser-based attacks, cryptojacking, credential-stealing malware, and wide range of other endpoint threats.
» Multi-shield protection – Endpoint Protection includes the following shields for predictive protection against zero-day threats: Real-Time, Behaviour, Core System, Web Threat, Identity, Phishing, and Offline.
» User Identity and Privacy – The world’s leading banks trust the Identity shield component in Endpoint Protection to stop online banking related attacks such as DNS poisoning, keystroke logging, screen grabbing, cookie scraping, clipboard grabbing, and browser and session hijacking by malicious software.
» White and blacklisting – Admins have direct control over which applications are allowed to execute.
» Intelligent firewall – The system-monitoring and application-aware outbound firewall augments the built-in Windows® firewall to protect users both on and off the corporate network.
» Infrared dynamic risk prevention – This feature analyses individual user behaviour to dynamically tailor malware prevention.
» Powerful heuristics – Admins can adjust these based on risk tolerance for file execution.
» Full offline protection – Stop attacks when offline or create separate file execution policies for local disk, USB, CD, and DVD drives.
» Multi OS, virtualization, terminal server, and Citrix support –Endpoint Protection supports MacOS® devices, Windows® computers and servers, as well as virtualization, terminal server, and Citrix environments.
» Multi-language support – The Webroot software agent supports over 14 languages.
» Free telephone support – The award-winning in-house Webroot support team is standing by.
What Results to Expect
Webroot Business Endpoint Protection delivers advanced detection, protection and prevention against the ever-increasing number of attacks that organisations face. Because it’s a highly automated and effective solution, Webroot makes it easier to keep your network safe.
Trial and Next Steps
For more information use our contact us form or email us on firstname.lastname@example.org