Webroot by Open Text

On guard against online threats

Webroot Business Endpoint Protection

To secure businesses, you need endpoint protection that’s stronger and smarter than traditional business antivirus.

Why Webroot Business Endpoint Protection is Different

  • Stop sophisticated cyberattacks:
    - Next-generation protection
    - Contextual threat intelligence
    - Industry-leading efficacy
  • Streamline management:
    - Cloud-based console
    - Fast deployment & scans
    - RMM, PSA & BI integrations
  • Save time and money:
    - Lower TCO & flexible billing
    - No software conflicts
    - No reimaging

Webroot DNS Protection

Secure your DNS connection against cyberattacks, get total visibility into web usage, and enforce acceptable web usage policies to reduce security risk.

Why Webroot DNS Protection is different

  • Skip the hardware and software: This fully cloud-based, secure, and resilient service takes just minutes to set up. Protect your DNS connection, network, and users from cyberattacks.
  • Reduce costs relating to infections: DNS filtering stops up to 88% of known malware at the domain layer, so it never reaches your network. It saves you time and money, while also minimizing unproductive web usage.
  • Apply leading web classification: Webroot® threat intelligence backs all Webroot products, and is trusted by over 100 leading technology vendors to enhance their services.
  • Block threats at the domain level: Over 80 URL categories give you granular, policy-based control to automatically block dangerous and questionable sites (such as Malware and Adult) or unwanted sites (such as streaming media).
  • Enable policies by group, device, IP: Control internet usage for your users using pre-configured and custom policies by group, device or network.
  • Get detailed reports on-demand: Drill down into reports on all threats the business would've been susceptible to without DNS Protection in place, and get full visibility into risk and usage.

Webroot Security Awareness Training

Easily maximize your ability to secure your business and employees.

Why Webroot Security Awareness Training is different

  • Campaign and contact management: Our campaign management wizard, contact manager, email templates, course library and reporting center let you schedule and assign training efficiently.
  • Reporting Center: Activity reports can be shared with management to measure progress, risk score and ROI. Training reports show user progress, so accountability and value are always clear.
  • Trackable, customizable campaigns: Measuring individual and overall success is key to both business and the employee participation. Webroot’s console with its built-in learning management software (LMS) keeps track of participation, automatically sends reminders and schedules executive reporting, making every training campaign fully accountable and measurable.
  • Fully customizable phishing simulator: Webroot offers 200+ and growing realistic phishing simulations that let you test and measure real-world employee cyber-awareness and training effectiveness. Results allow you to direct further campaigns to employees as needed, while our built-in template editor lets you modify or create email lures for even the savviest users.
  • Regulatory compliance included: Does your business take credit card payments? Is it part of a regulated industry? Then its necessary to educate employees to avoid being fined (or worse). Webroot® Security Awareness Training includes compliance training at no extra cost for PCI, HIPAA, GDPR, and other regulations.
  • Engaging, interactive courses: Succinct, easily consumed courses increase employee attentiveness and the overall effectiveness of cybersecurity education programs. More than 60 of Webroot’s current training courses take 10 minutes or less to complete and all involve the employee by being informative and interactive.
  • Microsoft® Azure AD onboarding and auto-enrollment: Webroot’s Microsoft® Azure AD app is all you need to easily link Active Directory for automatic maintenance of the employees including new starters and leavers. Auto-enrollment means setting relevant and ongoing training programs for starters or any group of employees is straightforward and less time-consuming.
  • Current, relevant and effective education: Training on an ongoing and continuous basis ensures employees are kept up to date on the latest methods of attack, so they stay informed and you stay out of any headlines. Webroot is constantly developing, adapting and adding new training content at least monthly and often more frequently.
  • Proven efficacy: Phishing and credential theft are the number one1 tactics used in breaches, with user error being more common than malware as the causal factor. With computer-based training, you can significantly change the odds, with click rates dropping by up to 50%2 after just 12 lessons.

Carbonite Endpoint

Carbonite Endpoint is data protection that goes everywhere your workforce does.

Advanced Security Features of Carbonite Endpoint

  • Global Device Tracking: The ability to locate a device anywhere in the world with GPS tracking and to wipe its contents remotely.
  • Easy Deployment: Quick, silent, and centralized deployment and management with minimal disruption to productivity or network performance.
  • Simple Migrations: Scheduled restore windows and policy-controlled backups that don't interfere with user productivity.
  • Remote Access: Secure, remote data access from any device, anywhere, and at any time, including the ability to restore devices remotely.
  • Multi-Device Protection: Provides laptops, desktops, and tablets with data protection and technical support.
  • Enterprise-Grade Backup: Maximum deployment flexibility and scalability for large, distributed organizations and today's mobile workforce.

Carbonite Backup for Microsoft 365

Essential data protection for your most trusted productivity tools with advanced recovery features. Complete cloud-to-cloud backup for Microsoft 365.

Carbonite Backup for Microsoft 365 Features

  • Dedicated Support Team: Enjoy onboarding and recovery support and technical assistance from experts 24x7, plus a Knowledge Base packed with a searchable database of helpful resources.
  • Daily Backup Scheduling: Run backups automatically up to four times per day, or every six hours, with flexible retention options and customizable settings for decreasing frequency.
  • Granular Policy Control: Create granular policies specifying what business-critical data should be protected based on properties including content type, owner, date created, and more.
  • Rollback Capabilities: Perform site-level rollback to easily restore Microsoft 365 data and undo unintended permissions changes by performing security rollbacks.
  • Easy Restore: Easily restore granular data, including mailboxes, conversations, projects, and more while maintaining all metadata and permissions
  • Comprehensive Backup Protection: Comprehensive protection for the entire Microsoft 365 suite including Teams, OneDrive, Exchange, SharePoint, and Planner.