Top Rated Webroot Business Endpoint Protection Alternatives
525 Webroot Business Endpoint Protection Reviews
Overall Review Sentiment for Webroot Business Endpoint Protection
Log in to view review sentiment.
Webroot Endpoint Protection is a cloud-based endpoint security solution designed to protect businesses from various types of cyber threats such as viruses, malware, phishing attacks, and other online security risks. It is a lightweight solution that uses a predictive AI and machine learning to protect endpoints against known and unknown threats in real-time.
One of the strengths of Webroot Endpoint Protection is its fast scanning and detection capabilities. It is designed to work silently in the background without slowing down the computer or interrupting the user's workflow. It can quickly detect and block malicious activities before they can cause any damage to the system.
Another advantage of Webroot Endpoint Protection is its cloud-based management console. It allows administrators to manage and monitor the security of endpoints from a single dashboard, making it easy to deploy and manage the solution across multiple devices and locations.
Webroot Endpoint Protection also offers various features such as firewall protection, web filtering, and real-time threat intelligence that help keep endpoints secure from online threats. The solution is also compatible with different operating systems, making it an ideal choice for businesses with mixed environments. Review collected by and hosted on G2.com.
One potential negative aspect of using Webroot Endpoint Security is its heavy reliance on cloud-based technology. Although this can be an advantage in terms of scalability and management, it can also be a disadvantage for businesses with limited internet connectivity or those who prefer to keep their data on-premises for security or compliance reasons. Review collected by and hosted on G2.com.

We started to use and develop Webroot to our customer less than 1 year ago. We are moving them expecially from Trend Micro (enterprise client) or Kaspersky/Norton (for small organisation). We have almost finished this switch off. Plenty of satisfaction, easily way to deploy the agents and monitoring all the "bad" activities of the end users. . . That's make us really happy because we are now able to be pro-active in front of our customers . I want also to spend few word about the support / help desk : fantastic , reactive and professional. Next step will be to start with the DNS protection Review collected by and hosted on G2.com.
To be honest sometimes we have some difficulties in understanding how to updated the software exception (false positive) and a lot of time with some dedicate software , especially in the healty business, we till need to have the assistant of the support team Review collected by and hosted on G2.com.

Protects endpoints. Less system resource Review collected by and hosted on G2.com.
Webroot endpoints double installed on cp Review collected by and hosted on G2.com.
Webroot Endpoint Protection is a product you can install and let be, and I'm not kidding when I say that.
From installing to protecting, Webroot makes it effortless for both consumer and business users.
As long as you have everything set on the Management Console side, you can rely on Webroot to automatically pick up the config and be on its way.
It's quiet, lightweight and gets the job done. I never have doubts about its protection and have yet to come across a client who's complained about how it's performed.
There are easy on-demand controls you can toggle (if policy allows), and updating the configuration is two clicks away. Review collected by and hosted on G2.com.
The differences between the Mac and Windows platform.
It can be a little deceiving to differentiate what the Mac Webroot shows (on the user's machine) as opposed to a Windows machine with the same settings.
This is most likely by design due to Mac's not being the easiest when it comes to being user-friendly on the back-end side of things. Review collected by and hosted on G2.com.

Have been running webroot endpoint protection for a number of years and it has proven to be very good. Review collected by and hosted on G2.com.
Could do with a bit more work on the interface side and it jumps between many different panels to administer it. Review collected by and hosted on G2.com.
the protection is top quality. I like the features it allows me to use and the reports are great! Gives an insight into our clients secutiy and helps improve it overall. The filters are also great and many of our clients rave about this feature. Review collected by and hosted on G2.com.
False positives appear alot of the times, i believe they has reduced these with the latest updates but previously this was something that I did not like about the product. Review collected by and hosted on G2.com.

My favourite feature of Webroot is how little it affects PC performance and how stealthily it runs in the background. Most other AV software packages always send pop-ups on the screen and scream for definition/agent updates. Webroot does it all behind the scenes and only lets the user know how it's performed once a scan has run. The web portal is fantastic and easy to use; creating device groups and custom policies is incredibly simple to implement. Review collected by and hosted on G2.com.
Sometimes, as IT professionals, we need to disable AV temporarily to work on an issue or determine whether it's interfering. Unfortunately, because it is managed centrally, there are no local options to change this. It would be great if there were a secret we could generate or a token to do this. Review collected by and hosted on G2.com.

It is easy to deploy and configure "on the fly". It works well with other anti-virus solutions that may already be deployed. It helps in creating less headaches. Review collected by and hosted on G2.com.
The console can be cumbersome to navigate at times. The dashboard widgets are not 100% accurate. Review collected by and hosted on G2.com.
Webroot Business Endpoint protection allows easy implementation of policies and can be layered so you can have multiple policies in a single client infrastructure. Review collected by and hosted on G2.com.
There was an instance where webroot didn't detect activity from a Conti breach whereas we were alerted by Sophos as to the presence on systems protected by Sophos. Review collected by and hosted on G2.com.

Its being used on out own internal workstations and now plays a main part in our product portfolio which we are rolling out to our customers.
Our IT team are able to silently install on computers missing the license and with Admin control you can go as far as restricting whether the program opens or not on there workstation, its simply in the back doing its job !!
The installation took an average of 30 - 45 seconds and scans take average 3 minutes time and run in the background allowing the user to work as its very light on system resources. The updates are tiny and are automatic so you done have to waste time on downloading new antivirus. The price structure is great for business no matter the size Review collected by and hosted on G2.com.
Sometimes we find when programs are blocked it can take a little while unblocking them, this originally costing the company but eventually got there in the end .. Review collected by and hosted on G2.com.