Webroot Rebrands Its Consumer Products
PC Magazine Editor's Choice award winner expands to include self-configuring firewall
BOULDER, Colo. -- Webroot Software, Inc., a leading provider of Internet security software for the consumer, enterprise and SMB markets, today unveiled Webroot® AntiVirus with AntiSpyware and Firewall, an enhanced and rebranded version of the current Webroot Spy Sweeper® with AntiVirus 5.5 solution; a recent winner of the PC Magazine Editor’s Choice award. Webroot AntiVirus with AntiSpyware and Firewall offers the most complete security protection against viruses, spyware, data theft and hackers through an integrated combination of anti-malware shields and behavioral technology, as well as a two-way desktop firewall with multi-layer intrusion prevention software. The firewall is also available online as a standalone solution called Webroot Desktop Firewall.
“A large percentage of the users we speak to tell us that they aren’t using their firewalls because they are too hard to configure. The intelligent Webroot Desktop Firewall solution monitors and learns what user behavior is ‘normal’ for that PC and creates rules based on it. It even allows users to redefine rules as new programs are added or as their security needs change,” said Mike Irwin, COO, Webroot Software. “Webroot AntiVirus with AntiSpyware and Firewall marks our evolution into providing broader, easier to use security solutions to protect our customers while enjoying the Internet.”
The award-winning antivirus and antispyware protection in Webroot AntiVirus with AntiSpyware and Firewall helps protect home users against identity and data theft, hackers and other types of unauthorized access to their PC. This protection now also includes two-way firewall technology with system anomaly, email anomaly, and process monitoring layers to detect and block intrusion attempts and suspicious behavior. This multi-layered approach helps secure system vulnerabilities against cyber criminals that try to exploit them in order to gain unauthorized access to PCs and steal private information.
Read more about:
2007About the Author
You May Also Like