Webroot introduced a vulnerability scanner delivered in the cloud as part of a Web security software-as-a-service (SaaS) model.
The new service offers weekly and monthly tests for more than 400 common vulnerabilities found in the operating system, Web browsers, browser plug-ins, Microsoft Office and its components, media players, instant messaging software and various third-party solutions – the most common ways Web-based malware is delivered to business and consumer computers.
The new feature is included in the Webroot Web Security Service. By inspecting applications and analyzing them via the cloud, the Webroot service can automatically and efficiently identify threats and vulnerabilities as well as identify missing patches. The service is linked to the NIST National Vulnerability Database, ensuring the latest threats are included in the scan.
Also included in the update is a new layer of antispyware detection. In addition to monitoring outbound traffic from a system, Webroot now automatically analyzes the processes running on the user’s computer. This additional layer of protection ensures that threats are identified before they have a chance to spread. The service tests for more than 3,500 known malicious programs today and is continually updated for the latest threats.
Webroot’s vulnerability scanning takes less than 15 seconds and leverages the cloud for up-to-date vulnerabilities and spyware definitions to help ensure endpoints are secure.
Focusing on the programs most susceptible to malicious attacks, a lightweight scan at the endpoint uploads process information to the cloud, where Webroot identifies vulnerabilities and centralizes results in a Web-based management portal. Administrators can search and sort by machine, user, type of scan and number of vulnerabilities and then drill down to view information about each machine or threat.
“Organizations are finding that vulnerability assessments that are mired on the desktop are becoming more burdensome and less effective,” said Gerhard Eschelbeck, CTO, Webroot. “Leveraging the cloud, we’re enabling organizations to aggressively monitor their IT infrastructure without worrying about its affect on user productivity, and with much better protection than traditional solutions.”