Webroot AntiSpyware with AntiVirus 3.5 review
Webroot's corporate edition provides comprehensive protection against spyware and viruses on the desktop.
Review Date: 12 Nov 2007
Reviewed By: Ian Parsons
Price when reviewed: per user for a 10-user licence for 1 year including support; upgrade included in support
Webroot's AntiSpyware uses adaptive recognition techniques to find and remove spyware and rootkits even when they've managed to infiltrate themselves into the OS itself.
Webroot also includes a number of software components (Smart Shields) that operate whenever an activity occurs that might indicate malware. General system protection is provided in a number of areas. The Windows Registry is protected by the Start-up Shield, which blocks unauthorised attempts to write Registry keys, while the Windows File System is protected by the On-Access Shield, which prevents known or suspected malware programs from reading, writing or executing any file or process. Any executable file can be added to the list of prohibited programs, giving a further level of control over which programs can be run. NTFS's Alternate Data Streams are included and provide no hiding place for malware. System memory is also scanned at startup and at intervals throughout the day.
The Internet Communication Shield can prevent access to websites known to host malware, while another shield will remove any unwanted tracking cookies. Internet Explorer is a favourite target. The ActiveX Shield can block malware installation through ActiveX controls, while another shield tracks Internet Explorer's security settings to prevent unauthorised additions. It also prevents the installation of helpful toolbar extensions, as these may also have been modified. Even the local hosts file can be a source of problems, and Webroot monitors the state of the hosts file to prevent unauthorised changes.
Although the array of malware detection and prevention features is impressive, their effectiveness is considerably improved when antivirus functions are added. Instead of simply being a standalone component, the antivirus engine is combined with several shields to prevent the installation of malware in the first place. This close integration extends Webroot's functionality to include Sophos' proven antivirus capabilities and avoids the problems that can occur when separate antivirus and antispyware products operate on the same system.
Installation is straightforward. The software uses a central server as a software and signature repository. Large networks can use one or more satellite servers to distribute the software to each client, while smaller networks can simply use the central server. Once installed on the central server, Webroot can examine the network and identify the clients either directly or through Active Directory. The client software is then pushed out to each system. When everything is up and running, the clients report back to the central server, which produces a summary dashboard display of the network's status. And when laptops and other remote systems, not always connected to the network, connect to the internet at any time the software will automatically download the latest updates from Webroot's servers.
Webroot's range of detection tools combined with Sophos' antivirus technology provides a comprehensive defence against malware of all kinds.
Author: Ian Parsons
- Google sued over $66 in-app purchase
- Snowden: I was right to leak NSA data
- BBC revamps iPlayer for the "multiscreen world"
- Sony revives optical discs with 1TB Archival Disc
- Surface Power Cover finally arrives
- Mt Gox bankruptcy "leaves fox guarding the henhouse"
- iOS 7.1: what's new?
- All New HTC One: specs, release date and more
- Energy firms forced to use QR codes on bills
- Google to release "wearable" Android within a fortnight
- CeBit 2014 diary: Cameron comes to town
- The 5 most interesting UK businesses at SXSW
- Quickest way to upload 1GB? Hop on a train
- Move over Delia: IBM Watson is cooking tonight
- Eric Schmidt on the double-edged smartphone: friend and foe
- Getty joins the race to the bottom
- Hour of Code: five steps to learn how to code
- Sony Xperia Z2 Tablet review: first look
- Sony Xperia Z2 review: first look
- Samsung Galaxy Gear 2 review: first look
- Make the most of your mobile data
- Old-school internet scams: five that just won't die
- Bitcoin believers not worried by Mt. Gox disarray
- How to hack your car
- Small server vs cloud: which is best for SMBs?
- Block party: why do millions play Minecraft?
- What to do if you’re still on Windows XP
- Microsoft Word: top 20 secret features
- Measuring me: is your body the future of security?
- The best mobile apps for business
- Headings vs headers: how to use both in Word
- Windows Server 2012 R2: how the Datacenter edition could change SMBs
- Invoices and VAT: how to set up your documents correctly
- Nexus 5 vs Samsung Galaxy S4 Active: the best phone for avoiding screen burn
- How much is a social user worth?
- The key to choosing a secure password
- Thunderbolt Bridge: a fast Mac migration tool
- Should you advertise on Twitter?
- How to track a lost smartphone
- Self-publishing success: the best way to sell your book