Webroot Business Endpoint Protection review

An affordable but limited platform

Webroot Business Endpoint Protection
(Image: © Webroot )

TechRadar Verdict

Arguably one of the best platforms in terms of features that’s also very affordable. However it’s let down by a complex interface and its failure to cater to mobile devices, which are fast emerging as the leading source of security breaches.


  • +

    Extensive protection features

  • +

    Resource efficient client

  • +

    Useful documentation

  • +



  • -

    No support for Linux and mobile devices

  • -

    No device control

Why you can trust TechRadar Our expert reviewers spend hours testing and comparing products and services so you can choose the best for you. Find out more about how we test.

Business endpoint security protection (opens in new tab) needs to offer a comprehensive defense against all kinds of malicious bits floating around on the Internet. Webroot Business Endpoint Protection (WBEP) is designed to shield workstations (opens in new tab) running Windows and macOS operating systems from such known as well as new threats.  

Plans and Pricing 

Webroot only offers 1 year subscriptions for WBEP. The platform will cost $30 for each endpoint for upto 9 endpoints. You’ll get a discounted price for protecting 10 endpoints and more. 

Protecting 10 endpoints costs $276, which comes to $27.6 per endpoint. It’ll cost the same for protecting 15 endpoints (for a total of $414), or for 20 endpoints that will cost $552, making it one of the cheapest endpoint security solutions on offer.

Webroot Business Endpoint Protection 1

(Image credit: Webroot )


First things first: as far as security is concerned, WBEP has all the features you’d expect from a protection platform. It can prevent viruses, malware (opens in new tab), trojans, ransomware (opens in new tab), spyware, phishing attacks, browser-based attacks, cryptojacking, and all the other usual threats from wreaking havoc on your endpoints.

WBEP wraps these features inside what it refers to as shields, such as real-time shield, web shield, identity shield, phishing shield and more. 

The realtime shield blocks known threats that are listed in Webroot's threat definitions. A useful feature is the identity shield that includes mechanisms that help protect sensitive data that might be exposed during online transactions. 

Webroot Business Endpoint Protection 2

(Image credit: Webroot )

The WBEP platform also includes the behavior shield, which monitors individual user behavior to dynamically tailor malware prevention. It also includes various heuristics settings that you can use to set the level of threat analysis that WBEP performs when scanning the protected endpoints.

A new addition to the list is the evasion shield that’ll help detect, block, and quarantine evasive script attacks, including file-based, fileless, obfuscated, or encrypted threats. It’ll also prevent malicious actions in PowerShell, JavaScript (opens in new tab), VBScript, and more. Hat tip to the WBEP developers for disabling the feature by default since many organisations use legitimate custom scripts in their environments where this shield might generate false positives.

Besides file protections, WBEP also includes other security-related features as well. For instance, you can use it to control which applications are allowed to run. The platform also includes a software firewall (opens in new tab) and several other useful features to help you take charge of your endpoints.

Webroot Business Endpoint Protection 3

(Image credit: Webroot )

Interface and use

WBEP offers a couple of administration interfaces, each tailored to a different environment. The Business interface is designed for managing the devices within an organisation, and is the one we’ll be using in this review. Besides this, WBEP also has an administration interface for managing devices for your customers that can handle multiple businesses.

Although the workflow of the WBEP platform is pretty similar to its peers, the layout of its administration interface leaves much to be desired. 

The interface isn’t logically arranged, and instead of clearly-labelled starting points, you’ll have to head to the last Downloads tab to install the WBEP agent on your endpoints. 

The platform offers both EXE and MSI installers for Windows installations and DMG for macOS for simple manual installation. For advanced automated installs, you can hook up WBEP with an existing active directory server on your network.

In terms of workflow, all endpoints must subscribe to defined policies. While this allows for greater control over the behavior of individual endpoints, WBEP has its peculiarities.

Webroot Business Endpoint Protection 4

(Image credit: Webroot)

To begin with, all WBEP endpoints subscribe to the Silent Audit policy that offers limited protection. It’d be natural to switch the endpoints to the Recommended Defaults policy that provides maximum protection and remediation.

However this policy has a poll interval of 24 hours, which means scans or any other actions initiated from the administration interface can take upto a day to be communicated to the endpoint. Another unusual behavior of this policy is that it hides the platform’s resource-efficient endpoint agent.

While this might seem like a good idea once you’ve configured WBEP as per your requirements, it’ll only create confusion for first time users. Thankfully, Webroot has a good administrator’s guide and a best practices guide to help you utilize the platform to its full extent.

Besides defining policies and assigning them to the endpoints, you can also use the interface to define exceptions and do a lot more. But again you’ll need to refer to the documentation to use these functions effectively.

Webroot Business Endpoint Protection 5

(Image credit: Webroot )

The competition

In terms of its platform coverage, WBEP only supports Windows and macOS. There’s no support for Linux installations, nor does it offer protection features for Android and iOS mobile devices. 

Linux isn’t supported by most of WBEP’s peers including Kaspersky Endpoint Security Cloud (opens in new tab), and Avira Antivirus for Endpoint (opens in new tab). Both of these however support Android and iOS devices, which are even protected by ESET Endpoint Protection Advanced Cloud (opens in new tab) under certain conditions.

Only Avast Business Antivirus Pro Plus (opens in new tab) restricts itself to Windows and macOS just like WBEP. However, Avast makes up for this limitation by including several privacy-enhancing features like a fully-functional VPN service (opens in new tab), that you don’t get with WBEP.

Another feature we missed in WBEP is the lack of ability to control pluggable devices like you get with many of its peers, such as Trend Micro Worry-Free Business Security Services Advanced (opens in new tab). Of course the lack of tweakability is another characteristic that sets WBEP apart from many of its peers.

Final Verdict

WBEP has a lot of protection features that you get at a very affordable price. However, the platform does a poor job of exposing its strengths. In fact, the interface is the weakest point of the entire platform, which will particularly irritate first time users who are not familiar with its peculiarities. 

Also while you can’t find fault with WBEP in terms of its anti-virus (opens in new tab) and anti-malware features, it doesn’t allow the same degree of control over these features that you get on other platforms.

Which is why despite its strong set of features, the platform will appeal to a very narrow set of users, especially due to its limited operating system support and because of its counter-intuitive interface. We strongly advise you to read through its administration guide before you take advantage of the 60-day extended free trial to explore the platform. 

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.