The management interface is very user-friendly and it is simple to deploy the software through GPO or startup scripts. The software is light and does not interfere with user activities. The restrictions and application settings are extremely customization and the group management makes it easy to compartmentalize regular systems from servers.
The system uses an environment that constantly delivers system information to cloud servers when real-time protection detects an unknown application. This is not good for development environments nor for highly secured facilities that audit in and out-bound traffic. This would require us to disable the real-time monitor on most of our systems. Disabling an integral feature to the software renders it useless and not worth the money we are paying for it.
I would recommend that users look into how their data is handled. It is important to be aware of any information that is being collected behind the scenes. Webroot was not exactly forthcoming about the fact that they collect system data and share it with the cloud.
The primary goal was to utilize Webroot as the primary AV application across our enterprise, however, with the discovery of the previously mentioned information we could not leverage the software as a viable solution for the entire company. We ended up selecting Trend Micro as an on-premises solution since it does not collect or broadcast any system data.
It is normal in development environments for dozens if not hundreds of new MD5’s to be compiled that Webroot has never seen before. Our Team recommends remedying this by turning off “Scan files when written or modified”, a component of our Realtime shield. This setting is implemented as a default in our Server Policies. Disabling the Realtime shield entirely is never a solution given by our Support Team.
In regards to the handling of user's data, this is clearly outlined in our EULA: https://www.webroot.com/us/en/legal/service-terms-and-conditions
Digital Care Coordinator