This solution addresses Webroot Business Endpoint Protection

New forms of malware emerge daily. These threats often have randomly generated filenames, folder names, hashes, registry hives and keys, and some use root-specific techniques to hide themselves from endpoint detection software and the Windows operating system, making them difficult to detect.

However, Webroot’s cloud-based approach and Threat Research Team combat these emerging threats and significantly decrease the window of vulnerability that exists with traditional endpoint security. Webroot endpoint protection delivers continuous real-time protection against all types of malicious threats, from when an exploit is released to when it is detected.

If an unknown threat does manage to execute on a system then our journaling and rollback ensure that no permanent damage is done to the host drive. And more importantly, as soon as an unknown, zero day or advanced persistent threat is detected on one computer protected by Webroot, every other Webroot device in the world is immediately protected from ever encountering it again by being connected to our collective Webroot Threat Intelligence Platform.

Webroot endpoint protection was designed to mitigate malware that may have never been seen before, Zero Day threats or highly targeted malware, through a variety of unique protection measures. First, any file that is not explicitly known as ‘good’ is assumed to be suspicious. A suspicious file’s initial execution is conducted in a protected environment where the other files it wants to touch, changes it wants to make, and network activities it needs to initiate are matched against behaviors of known malware. If the behaviors match known ‘bad’ behavior, the file is immediately blocked from further execution. If its behaviors do not immediately classify it as ‘bad’, it is allowed to execute on the computer, but every action is meticulously journaled so that in the event the file is later classified as a threat, everything it has done can be rolled-back to return the computer to its pre-infection state.

While no security software provider can guarantee 100% efficacy against all threats, Webroot makes every effort to give customers the best protection possible. If you believe a computer is infected and have been unable to remove the threat, contact support for assistance.
Is this article helpful?
   
Thanks for your feedback!

Powered by noHold, Inc. U.S. Patent No. 10,659,398
All Contents Copyright© 2024