Click here to close now.


API Journal Authors: AppDynamics Blog, Elizabeth White, Pat Romanski, Yakov Fain, XebiaLabs Blog

News Feed Item

Webroot Provides the Best Security Performance on Windows® 8 for Both Consumers and Business Users

Offers superior protection in the Windows 8 environment

BROOMFIELD, Colo., Nov. 27, 2012 /PRNewswire/ -- Webroot, a leader in delivering Internet security as a service, today released the results of an independent test that shows Webroot® SecureAnywhere™ scored 33% better than the next closest vendor in terms of the overall impact of antivirus software on Windows 8 operating system performance[1]. In addition, Webroot provides superior protection with unique features tailored to the new Windows 8 environment.


PassMark™ Software, an independent software testing lab, recently conducted objective performance testing on five antivirus software products on the Windows 8 operating system using 13 performance metrics, including scheduled scan time, installation size, boot time, memory usage and network throughput. Webroot bested all other vendors included in the test in 10 of the 13 metrics. 

"We continue to blow the competition out of the water on performance, which is of particular importance for the 'fast and fluid' experience Microsoft is delivering with Windows 8," said Mike Malloy, executive vice president, Webroot Products and Strategy. "As one of very few security providers with solutions for both consumer and business users that are compatible with Windows 8, Webroot provides the best choice for anyone moving to the Windows 8 environment on a desktop or tablet, at home or in the office."

Webroot is listed among only five vendors that have both consumer and business security solutions that are compatible with Windows 8 according to AV-Test, the independent IT security institute.

Superior Performance

Webroot SecureAnywhere was 96% faster than the average on default scheduled scanning times – those scans that run on a user-defined schedule to check the entire system for threats. In the test, Webroot's scheduled scan took two minutes compared to an industry average of 45 minutes.

In addition, the test showed Webroot has a 99% smaller installation size than the average vendor, adding a little more than 4 MB in files during the installation, compared to more than 370 MB added on average by the other vendors and a whopping 600 MB added by one vendor. Webroot also used 96% less memory than the average, using 3.3 MB of RAM during a period of system idle compared to an average of 76.1 MB and one vendor that used almost 200 MB of RAM.

Superior Protection

Webroot's high performance architecture is also designed for superior protection of the next generation of Windows 8 computing devices.  As the popularity of tablet devices grows, the Windows 8 operating system provides significant performance advantages over previous Windows versions in the form of reduced battery consumption and lighter system utilization. Webroot SecureAnywhere extends these advantages, providing online and offline protection with an executable file that is less than 750 KB in size, and does not require downloading threat signature updates.  This minimizes the disk space, processing capacity and battery power required to keep these devices secure.

In addition, Webroot SecureAnywhere provides real-time protection against threats, immediately blocking and placing in quarantine programs or services behaving suspiciously. A particular strength is Identity Shield, which protects users' sensitive data that may be exposed when making online transactions, for example banking details, credit cards, and passwords. Automatically blocking any malicious content, Identity Shield detects online identity threats and phishing attacks, and prevents programs from accessing users' protected credentials.

The Windows Store, the new Windows 8 online marketplace, offers both traditional Windows desktop applications as well as the new Windows RT apps. Apps from the Windows Store are checked by Microsoft, but the Identity Shield within Webroot SecureAnywhere will stop malware from trying to access the user's information within the Windows RT apps. This is especially useful given the drive by Microsoft for banking and ecommerce providers to develop apps for the Windows 8 operating system. Users will enjoy a level of visibility, protection and control over Windows 8 apps which is unavailable to users or administrators using other security solutions.

For business users, all desktop applications present on a device will be visible to administrators using Webroot SecureAnywhere's endpoint protection and cloud-based management console. SecureAnywhere establishes and maintains a current applications list for full visibility of every Windows desktop app installed on each user device. This makes it easy to create application black-lists and white-lists detailing apps which can and cannot run.

Webroot App for Windows RT

Webroot has also recently released a new Backup and Sync app that runs on Windows 8 and Windows RT devices, including the new Windows Surface tablet.  Webroot's new app enables users of Webroot SecureAnywhere Complete to access photos and files backed up from their Android, iOS, and Windows PC devices. This new app is now live in the Productivity section of the Windows app store.


Webroot is bringing the power of software-as-a-service (SaaS) to Internet security with its suite of Webroot® SecureAnywhere offerings for consumers and businesses. Webroot also offers security intelligence solutions to government agencies and corporations focused on cybersecurity, such as Palo Alto Networks, F5, Corero, Juniper, and others. Founded in 1997 and headquartered in Colorado, Webroot is the largest privately held security organization based in the United States. For more information, visit or call 800.772.9383. Read the Webroot Threat Blog: Follow Webroot on Twitter:

©2012 Webroot Inc. All rights reserved. Webroot, SecureAnywhere, and Webroot SecureAnywhere are registered trademarks or trademarks of Webroot Inc. in the United States and other countries. Windows and Surface are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.  Android is a trademark of Google Inc.

[1] PassMark™ Software, Webroot SecureAnywhere Cloud Antivirus vs. Four Competitor Antivirus Products on Windows 8, Nov. 2012. To read the full report visit

SOURCE Webroot

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
SYS-CON Events announced today that IBM Cloud Data Services has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IBM Cloud Data Services offers a portfolio of integrated, best-of-breed cloud data services for developers focused on mobile computing and analytics use cases.
Today’s connected world is moving from devices towards things, what this means is that by using increasingly low cost sensors embedded in devices we can create many new use cases. These span across use cases in cities, vehicles, home, offices, factories, retail environments, worksites, health, logistics, and health. These use cases rely on ubiquitous connectivity and generate massive amounts of data at scale. These technologies enable new business opportunities, ways to optimize and automate, along with new ways to engage with users.
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new data-driven world, marketplaces reign supreme while interoperability, APIs and applications deliver un...
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data shows "less than 10 percent of IoT developers are making enough to support a reasonably sized team....
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
SYS-CON Events announced today that Sandy Carter, IBM General Manager Cloud Ecosystem and Developers, and a Social Business Evangelist, will keynote at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi's VP Business Development and Engineering, will explore the IoT cloud-based platform technologies driving this change including privacy controls, data transparency and integration of real time context w...
The IoT market is on track to hit $7.1 trillion in 2020. The reality is that only a handful of companies are ready for this massive demand. There are a lot of barriers, paint points, traps, and hidden roadblocks. How can we deal with these issues and challenges? The paradigm has changed. Old-style ad-hoc trial-and-error ways will certainly lead you to the dead end. What is mandatory is an overarching and adaptive approach to effectively handle the rapid changes and exponential growth.
There will be 20 billion IoT devices connected to the Internet soon. What if we could control these devices with our voice, mind, or gestures? What if we could teach these devices how to talk to each other? What if these devices could learn how to interact with us (and each other) to make our lives better? What if Jarvis was real? How can I gain these super powers? In his session at 17th Cloud Expo, Chris Matthieu, co-founder and CTO of Octoblu, will show you!
Developing software for the Internet of Things (IoT) comes with its own set of challenges. Security, privacy, and unified standards are a few key issues. In addition, each IoT product is comprised of at least three separate application components: the software embedded in the device, the backend big-data service, and the mobile application for the end user's controls. Each component is developed by a different team, using different technologies and practices, and deployed to a different stack/target - this makes the integration of these separate pipelines and the coordination of software upd...
Mobile messaging has been a popular communication channel for more than 20 years. Finnish engineer Matti Makkonen invented the idea for SMS (Short Message Service) in 1984, making his vision a reality on December 3, 1992 by sending the first message ("Happy Christmas") from a PC to a cell phone. Since then, the technology has evolved immensely, from both a technology standpoint, and in our everyday uses for it. Originally used for person-to-person (P2P) communication, i.e., Sally sends a text message to Betty – mobile messaging now offers tremendous value to businesses for customer and empl...
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
WebRTC converts the entire network into a ubiquitous communications cloud thereby connecting anytime, anywhere through any point. In his session at WebRTC Summit,, Mark Castleman, EIR at Bell Labs and Head of Future X Labs, will discuss how the transformational nature of communications is achieved through the democratizing force of WebRTC. WebRTC is doing for voice what HTML did for web content.
The IoT is upon us, but today’s databases, built on 30-year-old math, require multiple platforms to create a single solution. Data demands of the IoT require Big Data systems that can handle ingest, transactions and analytics concurrently adapting to varied situations as they occur, with speed at scale. In his session at @ThingsExpo, Chad Jones, chief strategy officer at Deep Information Sciences, will look differently at IoT data so enterprises can fully leverage their IoT potential. He’ll share tips on how to speed up business initiatives, harness Big Data and remain one step ahead by apply...
Nowadays, a large number of sensors and devices are connected to the network. Leading-edge IoT technologies integrate various types of sensor data to create a new value for several business decision scenarios. The transparent cloud is a model of a new IoT emergence service platform. Many service providers store and access various types of sensor data in order to create and find out new business values by integrating such data.
The broad selection of hardware, the rapid evolution of operating systems and the time-to-market for mobile apps has been so rapid that new challenges for developers and engineers arise every day. Security, testing, hosting, and other metrics have to be considered through the process. In his session at Big Data Expo, Walter Maguire, Chief Field Technologist, HP Big Data Group, at Hewlett-Packard, will discuss the challenges faced by developers and a composite Big Data applications builder, focusing on how to help solve the problems that developers are continuously battling.
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete end-to-end walkthrough of the analysis from start to finish. Participants will also be given the pract...
WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications. In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, will introduce the technologies required for implementing these ideas and some early experiments performed in the Kurento open source software community in areas ...
Internet of Things (IoT) will be a hybrid ecosystem of diverse devices and sensors collaborating with operational and enterprise systems to create the next big application. In their session at @ThingsExpo, Bramh Gupta, founder and CEO of, and Fred Yatzeck, principal architect leading product development at, discussed how choosing the right middleware and integration strategy from the get-go will enable IoT solution developers to adapt and grow with the industry, while at the same time reduce Time to Market (TTM) by using plug and play capabilities offered by a robust IoT ...
“In the past year we've seen a lot of stabilization of WebRTC. You can now use it in production with a far greater degree of certainty. A lot of the real developments in the past year have been in things like the data channel, which will enable a whole new type of application," explained Peter Dunkley, Technical Director at Acision, in this interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.