Producer Information

Webroot solutions are the answer to the global problem of ransomware and zero-day malware, which few million appear every day worldwide. Due to the widespread access to artificial intelligence algorithms, this problem will be bigger. Webroot was one of the first to use cloud and artificial intelligence to block threats in real time, and has undeniably been one of the lightest security software in the world for years.

Key features of Webroot

The software provides protection for endpoints, laptops, desktops, smartphones, tablets, servers, and virtual environments. It uses advanced machine learning and cloud-based protection.

Endpoint Protection secures devices against ransomware, phishing, zero-day threats, and cyberattacks. This is possible thanks to the multi-vector security modules, precise system monitoring, and Rollback technology that automatically restores files modified and corrupted by malware.

Webroot is known for its light agent designed to minimize the impact of system performance. This is possible thanks to cloud computing power and machine learning which constantly monitor the operating system on the end device with minimal impact on performance, and human interaction.

The software is easy to deploy in larger environments, installs in few seconds, provides ultra-fast system scans, offers an administration console for endpoint management, visibility of the attack event chain, and security incident remediation.

Selected awards

Certificates that confirm the high quality of software and effectiveness in protecting against threats and attacks in real time.

We awarded the certificate for the highest quality of protection against Internet threats in the Advanced In The Wild Malware Test.

Certificates are granted to solutions that are characterized by a high level of security in the Advanced In The Wild Malware Test.

The TOP Remediation Time award reflects the fast response to threats by completely neutralizing the entire malware lifecycle.

After completion of all edition of the test, we granted a special certificate for the high level of protection maintained throughout 2022.

Advanced In The Wild Malware Test

Recent Results in January 2024

Tested on default settings.

Webroot Antivirus

Blocked: 379/380
Total: 99,74%

PRE-LAUNCH: This classification references the detection of malware samples before they are launched in a live system.

POST-LAUNCH: This indicates an analysis level, i.e., an attack has executed and has been blocked by a tested product.

FAIL: This classification indicates a detection failure, i.e., an attack has NOT been blocked and has infected a system.

Remediation Time in a Nutshell

January 2024



Average Remediation Time of active threats



Fastest Remediation Time of one single threat



Longest Remediation Time of one single threat


data breaches

or active threats
after Remediation

Remediation Time (RT) Legend
The time expressed in seconds from the introduction of malware into the system by a browser, through the launch, to detection and resolution of a security incident. The Remediation Time may depend on the real activity of the malware, which may increase the time. Occurs only at the POST-Launch level.

remediation time

Example indicators

We can completely automate security tests carried out. For instance, we are able to record events of blocking an attack by a specific technology implemented in a product. If a product reacts to a malicious modification of the system, this kind of information is saved in the Windows event log or the local logs of the protection solution. We can capture such modification using the Windows API. For example, the activity of moving a virus to quarantine or running malware in a sandbox will cause the reading of a relevant key from the Windows registry or executing an action by a process. Then, we can mark recorded indicators as a detected attack, a blocked network connection, or an infected file removal. Here are some example indicators:

 ESET Internet Security:

C:\ProgramData\ESET\ESET Security\Logs\virlog.datMalware was removed or cured
*AppData\Local\ESET\ESET Security\QuarantineMalware was quarantined
C:\ProgramData\ESET\ESET Security\epfwlog.datBlocking of traffic by a firewall
C:\ProgramData\ESET\ESET Security\Logs\urllog.datBlocking of malware on a website

See the previous results

You can always go back in time and check how each individual security product performed during previous editions of the test. We make the results from all previous tests available to you to verify if your favorite developer has improved protection against latest malware in his security software.