EndPoint Protection at a Glance

HawkPoint
13 June 2022 8 min read

Businesses of all sizes are under constant attack. While some attacks are opportunistic and automated, many are targeted and precise. With the variety and large number of attacks, it’s never been more critical to use an effective antivirus that stops malware, ransomware, phishing, cryptomining and the other damaging attacks. We recommend Webroot’s EndPoint Protection to get the job done. Here are some important benefits EndPoint Protection can provide:

  • Layered user and device defenses: Stop attacks that take advantage of poor user awareness, not just those that target device vulnerabilities.
  • Malware detection and prevention: Blocks viruses, malware, Trojans, phishing, ransomware, spyware, browser-based attacks, cryptojacking, credential-stealing malware, and script-based attacks, and a wide range of other threats.
  • Multi-shield protection: Webroot’s multi-shield protection includes Real-Time, Behavior, Core System, Web Threat, Identity, Phishing, Evasion, and Offline shields for detection, prevention and protection from complex attacks.
  • Secure and resilient distributed cloud architecture: Uses multiple secure data centers globally to support customers and roaming users with full-service resilience and redundancy.
  • Malicious script protection: Webroot detects, blocks, and remediates (quarantines) evasive script attacks, whether they are filebased, fileless, obfuscated, or encrypted, and prevents malicious behaviors from executing in PowerShell, JavaScript, and VBScript.
  • User identity and privacy protection: The Identity Shield (browser and application isolation) is trusted by the world’s leading banks to stop attacks like DNS poisoning, keylogging, screen grabbing, cookie scraping, clipboard grabbing, and browser and session hijacking by malicious software.
  • Intelligent firewall: The system-monitoring and application-aware outbound firewall augments the built-in Windows firewall to protect users both on and off corporate networks.
  • Infrared dynamic risk prevention: Analyzes individual user behavior to dynamically tailor malware prevention heuristics.
  • Full offline protection: Stops attacks even when offline and enables admins to create separate file execution policies for local disk, USB, CD, and DVD drives.