This is a very simple to deploy endpoint security system with optional mobile device management. The management console is in the Webroot cloud while agents sit on the endpoints. If one wants to add mobile devices, this can be done for an extra cost.
We started out by accessing our trial account - the trials work just like the production systems and, in fact, you can start with a trial and move up to an enterprise system. We began our test deployment after we had accessed our management console. That is done using a key that Webroot sends you. Once you have accessed your console, you can begin setting up policies. After the policies are in place, deploying endpoint agents can begin.
The agents are very lightweight and will run on just about any recent version of Windows - from Windows XP forward, from 10.8 forward and lots of Windows servers. It also will run in a virtual environment on VMware, Citrix, Hyper-V or Virtual Box.
The console has four default policies installed: Recommended Default, Recommended Server Defaults, Silent Audit and Unmanaged. If an endpoint is subject to any of the policies, except Unmanaged, the endpoint becomes secured and the user cannot remove the agent. You cannot edit the provided policies, as one would expect, but you can clone them and then edit the clone, saving it with a new name. Using that approach, you can build as many policies as you need to cover a wide range of unique requirements.
The agent checks for updates when certain events - such as scans, reboots or a new file - is found. Intervals can be set from 15 minutes to daily. Agents can be installed from .exe files or .msi files. For those masochists who like to work in command line, the tool provides that capability and the available switches are well-documented. The administrator, of course, can override policy actions from the console.
This is a next-generation tool that takes advantage of telemetry from all of the other Webroot installations, as well as its own threat intelligence platform. Webroot always has had a good anti-phishing reputation and that capability is built into the cloud-based system. All of this offloads processing from the endpoint onto the cloud.
Support is good with 24/7 web, email, in-product or phone aid. Because there are support centers around the globe follow-the-sun operation of help desks facilitates 100 percent assistance coverage. The website is complete and has lots of documentation for download, as well as a support portal, a knowledge base and an FAQ.
The documentation is complete and is available for download. In addition to the expected getting-started doc, there is an admin guide, as well as several specialized guides for GSM (Global Site Manager)-managed services providers and mobile device protection startup and admin guides. There are several other downloads that cover such things as best practices. The manuals and guides are well laid out, visually easy to follow with good use of screen shots. Along with the documentation, Webroot has a YouTube channel with a good collection of training videos. There also is a community section on the website. Pricing is very aggressive, especially considering Webroot's reputation over the years.