Welcome!

Microsoft Cloud Authors: Pat Romanski, Liz McMillan, Lori MacVittie, Elizabeth White, Yeshim Deniz

News Feed Item

Webroot® SecureAnywhere™ Business - Endpoint Protection is The Absolute Performance Leader

Webroot Achieves Highest Ranking in Antimalware Software Performance Tests, Outperforming the Competition in New Research by PassMark

BROOMFIELD, Colo., Feb. 21, 2013 /PRNewswire/ -- Webroot, a leader in delivering Internet security as a service, today released the results of a third party test that establishes Webroot® SecureAnywhere™ Business – Endpoint Protection as the absolute performance leader in terms of overall impact of antimalware software on devices using Windows® 7 operating system. Webroot's performance benchmarks against other leading endpoint solutions show that its real-time, cloud-based protection offers extremely effective security against both known and unknown malware with minimal performance impacts on the endpoint device or the user's productivity.

(Logo: http://photos.prnewswire.com/prnh/20121016/LA94090LOGO)

Webroot earned top ratings in the test conducted by PassMark Software, an independent software testing lab, in a major review of performance benchmark testing for eight of the latest endpoint protection software products. The products were rated according to 13 core performance metrics using the Windows 7 Ultimate 64-bit operating system. Webroot SecureAnywhere Business – Endpoint Protection received the highest overall scores in their respective categories. Specifically, PassMark Software found that Webroot SecureAnywhere – Endpoint Protection installed faster, scanned faster, booted faster, used less memory and required less disk space then every major competitor. The complete report is available at http://www.webroot.com/shared/pdf/Passmark_Endpoint_2013.pdf.

"PassMark was commissioned to conduct independent performance testing on Webroot SecureAnywhere Business – Endpoint Protection and seven leading competitor products across 13 selected performance metrics. Having attained an overall score of 97 out of a maximum of 104, Webroot ranked the highest, with the next competitor being 30 points behind," commented David Wren, Managing Director, PassMark.

Top report findings:

  • Webroot SecureAnywhere installed in just 16 seconds on average and the quickest competitor took 99 seconds, while the slowest took a dismal 1,183 seconds to install.
  • Webroot SecureAnywhere completed a scheduled scan in an average of 23 seconds compared to the competition that averaged 635 seconds.
  • Webroot SecureAnywhere scanned six times faster than the quickest scheduled scan time set by a competitor, and 92 times faster than slowest scheduled scan time set by another competitor.
  • Webroot SecureAnywhere uses only 15.3 percent of CPU resources when scanning a mixed set of media, system and Microsoft® Office files of over 5GB, compared to other vendor products that use on average 27.9 percent of CPU resources.
  • Webroot SecureAnywhere uses 0.4MB of RAM memory when the system is idle compared to the competitors' average of 73.3MB, and up to 94% more memory.

"Unlike traditional security solutions, Webroot SecureAnywhere installs in seconds, scans in less than two minutes and never requires security updates or signature database downloads that consume network bandwidth and leave users exposed," said David Duncan, chief marketing officer at Webroot. "Only with Webroot's cloud-based security intelligence can you get the immediate protection against zero day threats that our customers are seeing today, and the new research by PassMark speaks for itself. Once again, Webroot has completely outshined the competition with our lightning-quick and game-changing performance."

ABOUT WEBROOT

Webroot is bringing the power of software-as-a-service (SaaS) to Internet security with its suite of Webroot® SecureAnywhere offerings for consumers and businesses. Webroot also offers security intelligence solutions to organizations focused on cyber-security, such as Palo Alto Networks, F5, Corero, SOTI, NEC, FancyFon and others. Founded in 1997 and headquartered in Colorado, Webroot is the largest privately held security organization based in the United States. For more information, visit http://www.webroot.com or call 800.772.9383. Read the Webroot Threat Blog: http://blog.webroot.com. Follow Webroot on Twitter: http://twitter.com/webroot.

© 2013 Webroot Inc. All rights reserved. Webroot, SecureAnywhere, and Webroot SecureAnywhere are trademarks or registered trademarks of Webroot Inc. in the United States and other countries. Microsoft and Windows are registered trademarks of Microsoft Corporation in the United States and other countries.  All other trademarks are properties of their respective owners.

SOURCE Webroot

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...