Click here to close now.

Welcome!

.NET Authors: Andreas Grabner, Pat Romanski, Elizabeth White, Tad Anderson, Gregor Petri

News Feed Item

Webroot Provides the Best Security Performance on Windows® 8 for Both Consumers and Business Users

Offers superior protection in the Windows 8 environment

BROOMFIELD, Colo., Nov. 27, 2012 /PRNewswire/ -- Webroot, a leader in delivering Internet security as a service, today released the results of an independent test that shows Webroot® SecureAnywhere™ scored 33% better than the next closest vendor in terms of the overall impact of antivirus software on Windows 8 operating system performance[1]. In addition, Webroot provides superior protection with unique features tailored to the new Windows 8 environment.

(Logo: http://photos.prnewswire.com/prnh/20121016/LA94090LOGO)

PassMark™ Software, an independent software testing lab, recently conducted objective performance testing on five antivirus software products on the Windows 8 operating system using 13 performance metrics, including scheduled scan time, installation size, boot time, memory usage and network throughput. Webroot bested all other vendors included in the test in 10 of the 13 metrics. 

"We continue to blow the competition out of the water on performance, which is of particular importance for the 'fast and fluid' experience Microsoft is delivering with Windows 8," said Mike Malloy, executive vice president, Webroot Products and Strategy. "As one of very few security providers with solutions for both consumer and business users that are compatible with Windows 8, Webroot provides the best choice for anyone moving to the Windows 8 environment on a desktop or tablet, at home or in the office."

Webroot is listed among only five vendors that have both consumer and business security solutions that are compatible with Windows 8 according to AV-Test, the independent IT security institute.

Superior Performance

Webroot SecureAnywhere was 96% faster than the average on default scheduled scanning times – those scans that run on a user-defined schedule to check the entire system for threats. In the test, Webroot's scheduled scan took two minutes compared to an industry average of 45 minutes.

In addition, the test showed Webroot has a 99% smaller installation size than the average vendor, adding a little more than 4 MB in files during the installation, compared to more than 370 MB added on average by the other vendors and a whopping 600 MB added by one vendor. Webroot also used 96% less memory than the average, using 3.3 MB of RAM during a period of system idle compared to an average of 76.1 MB and one vendor that used almost 200 MB of RAM.

Superior Protection

Webroot's high performance architecture is also designed for superior protection of the next generation of Windows 8 computing devices.  As the popularity of tablet devices grows, the Windows 8 operating system provides significant performance advantages over previous Windows versions in the form of reduced battery consumption and lighter system utilization. Webroot SecureAnywhere extends these advantages, providing online and offline protection with an executable file that is less than 750 KB in size, and does not require downloading threat signature updates.  This minimizes the disk space, processing capacity and battery power required to keep these devices secure.

In addition, Webroot SecureAnywhere provides real-time protection against threats, immediately blocking and placing in quarantine programs or services behaving suspiciously. A particular strength is Identity Shield, which protects users' sensitive data that may be exposed when making online transactions, for example banking details, credit cards, and passwords. Automatically blocking any malicious content, Identity Shield detects online identity threats and phishing attacks, and prevents programs from accessing users' protected credentials.

The Windows Store, the new Windows 8 online marketplace, offers both traditional Windows desktop applications as well as the new Windows RT apps. Apps from the Windows Store are checked by Microsoft, but the Identity Shield within Webroot SecureAnywhere will stop malware from trying to access the user's information within the Windows RT apps. This is especially useful given the drive by Microsoft for banking and ecommerce providers to develop apps for the Windows 8 operating system. Users will enjoy a level of visibility, protection and control over Windows 8 apps which is unavailable to users or administrators using other security solutions.

For business users, all desktop applications present on a device will be visible to administrators using Webroot SecureAnywhere's endpoint protection and cloud-based management console. SecureAnywhere establishes and maintains a current applications list for full visibility of every Windows desktop app installed on each user device. This makes it easy to create application black-lists and white-lists detailing apps which can and cannot run.

Webroot App for Windows RT

Webroot has also recently released a new Backup and Sync app that runs on Windows 8 and Windows RT devices, including the new Windows Surface tablet.  Webroot's new app enables users of Webroot SecureAnywhere Complete to access photos and files backed up from their Android, iOS, and Windows PC devices. This new app is now live in the Productivity section of the Windows app store.

ABOUT WEBROOT

Webroot is bringing the power of software-as-a-service (SaaS) to Internet security with its suite of Webroot® SecureAnywhere offerings for consumers and businesses. Webroot also offers security intelligence solutions to government agencies and corporations focused on cybersecurity, such as Palo Alto Networks, F5, Corero, Juniper, and others. Founded in 1997 and headquartered in Colorado, Webroot is the largest privately held security organization based in the United States. For more information, visit http://www.webroot.com or call 800.772.9383. Read the Webroot Threat Blog: http://blog.webroot.com. Follow Webroot on Twitter: http://twitter.com/webroot.

©2012 Webroot Inc. All rights reserved. Webroot, SecureAnywhere, and Webroot SecureAnywhere are registered trademarks or trademarks of Webroot Inc. in the United States and other countries. Windows and Surface are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.  Android is a trademark of Google Inc.

[1] PassMark™ Software, Webroot SecureAnywhere Cloud Antivirus vs. Four Competitor Antivirus Products on Windows 8, Nov. 2012. To read the full report visit www.webroot.com/En_US/consumer-products-secureanywhere-windows-8.html.

SOURCE Webroot

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
IoT is still a vague buzzword for many people. In his session at @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, discussed the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. He also discussed how IoT is perceived by investors and how venture capitalist access this space. Other topics discussed were barriers to success, what is new, what is old, and what the future may hold. Mike Kavis is Vice President & Principal Cloud Architect at Cloud Technology Pa...
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has been a focus since the earliest days of the cloud revolution. Understandably so: a lot can go wrong when you allow valuable information to live outside the firewall. Recent revelations about government snooping, along with a steady stream of well-publicized data breaches, only add to the uncertainty
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @ThingsExpo, Michael Sick, a Senior Manager and Big Data Architect within Ernst and Young's Financial Servi...
PubNub on Monday has announced that it is partnering with IBM to bring its sophisticated real-time data streaming and messaging capabilities to Bluemix, IBM’s cloud development platform. “Today’s app and connected devices require an always-on connection, but building a secure, scalable solution from the ground up is time consuming, resource intensive, and error-prone,” said Todd Greene, CEO of PubNub. “PubNub enables web, mobile and IoT developers building apps on IBM Bluemix to quickly add scalable realtime functionality with minimal effort and cost.”
The Internet of Things (IoT) is rapidly in the process of breaking from its heretofore relatively obscure enterprise applications (such as plant floor control and supply chain management) and going mainstream into the consumer space. More and more creative folks are interconnecting everyday products such as household items, mobile devices, appliances and cars, and unleashing new and imaginative scenarios. We are seeing a lot of excitement around applications in home automation, personal fitness, and in-car entertainment and this excitement will bleed into other areas. On the commercial side, m...
Sensor-enabled things are becoming more commonplace, precursors to a larger and more complex framework that most consider the ultimate promise of the IoT: things connecting, interacting, sharing, storing, and over time perhaps learning and predicting based on habits, behaviors, location, preferences, purchases and more. In his session at @ThingsExpo, Tom Wesselman, Director of Communications Ecosystem Architecture at Plantronics, will examine the still nascent IoT as it is coalescing, including what it is today, what it might ultimately be, the role of wearable tech, and technology gaps stil...
With several hundred implementations of IoT-enabled solutions in the past 12 months alone, this session will focus on experience over the art of the possible. Many can only imagine the most advanced telematics platform ever deployed, supporting millions of customers, producing tens of thousands events or GBs per trip, and hundreds of TBs per month. With the ability to support a billion sensor events per second, over 30PB of warm data for analytics, and hundreds of PBs for an data analytics archive, in his session at @ThingsExpo, Jim Kaskade, Vice President and General Manager, Big Data & Ana...
In the consumer IoT, everything is new, and the IT world of bits and bytes holds sway. But industrial and commercial realms encompass operational technology (OT) that has been around for 25 or 50 years. This grittier, pre-IP, more hands-on world has much to gain from Industrial IoT (IIoT) applications and principles. But adding sensors and wireless connectivity won’t work in environments that demand unwavering reliability and performance. In his session at @ThingsExpo, Ron Sege, CEO of Echelon, will discuss how as enterprise IT embraces other IoT-related technology trends, enterprises with i...
When it comes to the Internet of Things, hooking up will get you only so far. If you want customers to commit, you need to go beyond simply connecting products. You need to use the devices themselves to transform how you engage with every customer and how you manage the entire product lifecycle. In his session at @ThingsExpo, Sean Lorenz, Technical Product Manager for Xively at LogMeIn, will show how “product relationship management” can help you leverage your connected devices and the data they generate about customer usage and product performance to deliver extremely compelling and reliabl...
The Internet of Things (IoT) is causing data centers to become radically decentralized and atomized within a new paradigm known as “fog computing.” To support IoT applications, such as connected cars and smart grids, data centers' core functions will be decentralized out to the network's edges and endpoints (aka “fogs”). As this trend takes hold, Big Data analytics platforms will focus on high-volume log analysis (aka “logs”) and rely heavily on cognitive-computing algorithms (aka “cogs”) to make sense of it all.
One of the biggest impacts of the Internet of Things is and will continue to be on data; specifically data volume, management and usage. Companies are scrambling to adapt to this new and unpredictable data reality with legacy infrastructure that cannot handle the speed and volume of data. In his session at @ThingsExpo, Don DeLoach, CEO and president of Infobright, will discuss how companies need to rethink their data infrastructure to participate in the IoT, including: Data storage: Understanding the kinds of data: structured, unstructured, big/small? Analytics: What kinds and how responsiv...
The Workspace-as-a-Service (WaaS) market will grow to $6.4B by 2018. In his session at 16th Cloud Expo, Seth Bostock, CEO of IndependenceIT, will begin by walking the audience through the evolution of Workspace as-a-Service, where it is now vs. where it going. To look beyond the desktop we must understand exactly what WaaS is, who the users are, and where it is going in the future. IT departments, ISVs and service providers must look to workflow and automation capabilities to adapt to growing demand and the rapidly changing workspace model.
Sensor-enabled things are becoming more commonplace, precursors to a larger and more complex framework that most consider the ultimate promise of the IoT: things connecting, interacting, sharing, storing, and over time perhaps learning and predicting based on habits, behaviors, location, preferences, purchases and more. In his session at @ThingsExpo, Tom Wesselman, Director of Communications Ecosystem Architecture at Plantronics, will examine the still nascent IoT as it is coalescing, including what it is today, what it might ultimately be, the role of wearable tech, and technology gaps stil...
The Internet of Things (IoT) promises to evolve the way the world does business; however, understanding how to apply it to your company can be a mystery. Most people struggle with understanding the potential business uses or tend to get caught up in the technology, resulting in solutions that fail to meet even minimum business goals. In his session at @ThingsExpo, Jesse Shiah, CEO / President / Co-Founder of AgilePoint Inc., showed what is needed to leverage the IoT to transform your business. He discussed opportunities and challenges ahead for the IoT from a market and technical point of vie...
Hadoop as a Service (as offered by handful of niche vendors now) is a cloud computing solution that makes medium and large-scale data processing accessible, easy, fast and inexpensive. In his session at Big Data Expo, Kumar Ramamurthy, Vice President and Chief Technologist, EIM & Big Data, at Virtusa, will discuss how this is achieved by eliminating the operational challenges of running Hadoop, so one can focus on business growth. The fragmented Hadoop distribution world and various PaaS solutions that provide a Hadoop flavor either make choices for customers very flexible in the name of opti...
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impact.
Advanced Persistent Threats (APTs) are increasing at an unprecedented rate. The threat landscape of today is drastically different than just a few years ago. Attacks are much more organized and sophisticated. They are harder to detect and even harder to anticipate. In the foreseeable future it's going to get a whole lot harder. Everything you know today will change. Keeping up with this changing landscape is already a daunting task. Your organization needs to use the latest tools, methods and expertise to guard against those threats. But will that be enough? In the foreseeable future attacks w...
Disruptive macro trends in technology are impacting and dramatically changing the "art of the possible" relative to supply chain management practices through the innovative use of IoT, cloud, machine learning and Big Data to enable connected ecosystems of engagement. Enterprise informatics can now move beyond point solutions that merely monitor the past and implement integrated enterprise fabrics that enable end-to-end supply chain visibility to improve customer service delivery and optimize supplier management. Learn about enterprise architecture strategies for designing connected systems tha...
Wearable devices have come of age. The primary applications of wearables so far have been "the Quantified Self" or the tracking of one's fitness and health status. We propose the evolution of wearables into social and emotional communication devices. Our BE(tm) sensor uses light to visualize the skin conductance response. Our sensors are very inexpensive and can be massively distributed to audiences or groups of any size, in order to gauge reactions to performances, video, or any kind of presentation. In her session at @ThingsExpo, Jocelyn Scheirer, CEO & Founder of Bionolux, will discuss ho...