Question for Webroot Security Experts and Ransomware?

  • 10 February 2020
  • 5 replies
  • 134 views

Userlevel 7
Badge +55

Okay Webroot I want to know how good is WSA against all Ransomware with it’s Monitoring and Rollback feature as it says here: https://www.webroot.com/us/en/home/products/compare

There’s not much info I can find anywhere or even on the Webroot YouTube Channel: https://www.youtube.com/user/WebrootSoftware/videos so lets put it to bed once and for all.

 

 

“Protection that stops ransomware”

So does it protect from Ransomware or not and please explain in detail as we want to know.

@DanP@TylerM@Grayson@freydrew@khumphrey 

 

Thanks,


5 replies

Userlevel 6
Badge +16

@TripleHelix ,

Great questions here! I’m reaching out to our threat/product teams to see if we can get a specialist to create a thorough answer for you. 

-Keenan

Userlevel 7
Badge +55

@TripleHelix ,

Great questions here! I’m reaching out to our threat/product teams to see if we can get a specialist to create a thorough answer for you. 

-Keenan


That would be great as i said all the years and I asked a couple of times but no true answer and I would like to point others to an answer from Webroot Staff.

 

Thanks,

Userlevel 7

Good question Daniel. I’d like to know how good Webroot protects against ransomware on a Mac computer also. Since Webroot has No Rollback feature for Mac.

Userlevel 7
Badge +55

Bump!

Userlevel 7
Badge +48

I was talking with @TylerM (thanks for that Tyler btw) about this who had this to say:  

Ransomware has evolved over the years to target victims at multiple different layers, or attack vectors. Webroot offers a unique solution to protect users at each of these different layers, starting with the URL or IP. For example, say a user clicks on a phishing link or URL that deploys malicious payload. Webroot can stop over 99% of threats on this level. Now, let's say that that layer fails and the machine is able to resolve that URL or IP. As the file is downloaded, our massive machine learning database analyzes topical signatures of the file. From there, we're able to quarantine the file before it is executed or does any harm. This is our strongest layer. This last heuristics layer is comparable to the only layer of traditional AV blacklists. We have  improved upon this with multiple layers of protection. 

 

Reply