More than just you standard
antivirus protection

To secure your business, you need endpoint protection that’s stronger and smarter than traditional business antivirus.

What is endpoint protection?

Endpoint protection, or endpoint security, is a general term that describes cybersecurity services for network endpoints, like laptops, desktops, smartphones, tablets, servers, and virtual environments. These services may include antivirus and antimalware, web filtering, and more.

Endpoint protection helps businesses keep critical systems, intellectual property, customer data, employees, and guests safe from ransomware, phishing, malware, and other cyberattacks.

 

Why businesses need CT-PROTECT endpoint protection?

Criminals are constantly developing new ways to attack networks, take advantage of employee trust, and steal data. Smaller businesses may think they’re not a target, but that couldn’t be further from the truth. In fact, small businesses with 100 employees or fewer now face the same risk of attack as a 20,000-employee enterprise.*

No matter their size, businesses need reliable endpoint security that can stop modern attacks. And since most companies are subject to some form of compliance and privacy regulations, protection for endpoints is 100% necessary to help businesses avoid hefty fines and damage to their reputation due to a security breach.

Webroot

EndPoint Protection
£3.00* per month

Webroot Device License for 1 PC/MAC.

Monthly or Annual Pricing

*price excludes vat


Zero-hour security

Uses advanced behavioral heuristics to identify and protect against never-before-seen threats


No conflicts

Runs alongside other security software. No need to uninstall existing protection just to give us a try.


RMM & PSA integrations

Integrates with leading RMM and PSA platforms for single-pane-of-glass MSP management.


MSP-Friendly Unity API

Enhances automation, reduces management costs, improves reporting, and simplifies billing for MSPs.


Deep learning intelligence

Uses a layered approach to global threat intelligence to continually refine and enhance classification accuracy.


Fast deployment & scans

Small endpoint client agent deploys and scans in seconds and is always up-to-date, without bulky updates or definitions.


Online management

Enables endpoint management anywhere, anytime, online with hierarchical controls and visibility.


Lower TCO

Imposes minimal system burden, improves automation, and streamlines management to boost MSP profitability.


Multi-vector protection

Protects against threats across email, browsers, files, URLs, ads, apps, and more in real time.


Industry-leading efficacy

Secures endpoints with 100% efficacy over a 24-hour period, as shown in independent tests by MRG Effitas.


No reimaging

Uses journaling and rollback features to restore files to their uninfected state, so you don’t have to reimage.


Flexible billing

Offers monthly and annual subscription options, so MSPs pay as you go, per device, per month.

Ultimate virus protection through machine learning

The CT-PROTECT Webroot® Platform is a cloud-based architecture that classifies and scores 95% of the internet 3x per day. With over 10 years’ experience innovating in the field of cutting-edge machine learning technology, Webroot Threat Intelligence provides the accuracy and context organizations and vendors need to protect themselves and their customers.

Supported systems and browsers

Desktops

  • Windows® 10 32 and 64-bit
  • Windows 8, 8.1, 32 and 64-bit
  • Windows 7, 32 and 64-bit
  • Windows Vista®, 32 and 64-bit
  • Windows XP®** 3, 32 and 64-bit
  • Windows XP** Embedded
  • Mac OS X 10.7 (Lion®)
  • Mac OS X 10.8 (Mountain Lion®)
  • OS X 10.9 (Mavericks®)
  • OS X 10.10 (Yosemite®)
  • OS X 10.11 (El Capitan®)
  • macOS 10.12 (Sierra®)
  • macOS 10.13 (High Sierra®)
  • macOS 10.14 (Mojave®)
  • **must support SHA-2

Servers

  • Windows Server® 2012 R2 Standard, R2 Essentials
  • Windows Server 2008 R2 Foundation, Standard, Enterprise
  • Windows Server 2003** Standard, Enterprise, 32 and 64-bit (must support SHA-2)
  • Windows Small Business Server 2008, 2011, 2012
  • Windows Server Core 2003**, 2008, 2012
  • Windows Server 2003** R2 for Embedded Systems
  • Windows Embedded Standard 2009 SP2
  • Windows XP Embedded SP1, Embedded Standard 2009 SP3
  • Windows Embedded for POS Version 1.0
  • Windows Server® 2016 Standard, Enterprise and Datacentre

**must support SHA-2

VM Platforms

  • VMware® vSphere® 5.5 and older (ESX®/ESXi 5.5 and older), Workstation 9.0 and older, Server 2.0 and older
  • Citrix® XenDesktop® 5, XenServer® 5.6 and older, XenApp® 6.5 and older
  • Microsoft® Hyper-V® Server 2016
  • Microsoft® Hyper-V® Server 2012, 2012 R2
  • Microsoft® Hyper-V® Server 2008, 2008 R2
  • Virtual Box

Browsers

  • Google Chrome® 11 and newer
  • Internet Explorer® version 11 and newer (Windows XP IE8)
  • Microsoft Edge® (partial support)
  • Mozilla® Firefox® version 3.6 and newer
  • Safari 5 and newer
  • Opera 11 and newer