![]() The last thing you want to do is go in and block your svchost.exe or something else equally important. Of course, this is really a power-user tool. Likewise, there's a System Process control panel, so that you can monitor or block any active system process. There's a smart sandbox for running any file you want in a safe, walled-off garden. There's also a silent gaming mode, although we found, during our tests of the program, that it was remarkably silent, even without activating the gaming mode. You can run on-demand scans that can be configured to focus on specific drives, folders or file types, and change heuristics settings based on how a file is introduced, as well as to be more aggressive or more passive and the program has its real-time protection shield running by default. In practice, no protection net is foolproof, but as you'll see in the Performance section of this review, SecureAnywhere has scored well in early tests. So, ideally, what you wind up seeing when a threat is encountered is nothing. ![]() Trojans, keyloggers and other similar threats get blocked generically, also a unique approach, according to Webroot. You won't ever see any of this exposed in the program, but it's important to note this, since it's an unusual model that's different from the researcher-reliant models of Webroot competitors. Webroot's goal is to automate the entire process, and keep its researchers from having to analyse samples. The cloud then determines if it's safe or not. If the file is suspicious, the sample gets sandboxed and tested behaviourally, and a description of the behaviour is sent to the cloud. If the file is recognised as being safe, the cloud tells SecureAnywhere to allow it to proceed. SecureAnywhere takes a file, creates a unique identifying number for it called a hash and sends that to the cloud. Webroot claims it has the world's largest database of malware. Thanks to its Prevx core, though, Webroot has been able to make some interesting innovations. Again, this is not news in and of itself, as most security suites have already been moving to at least a partially cloud-based model. Threat detection comes courtesy of a cloud-based system. The important thing is that it's not underpowered when judged against the high-end, premium-level competition. SecureAnywhere Complete offers a competitive range of features, although nothing stands out as remarkable. Of course, figuring out those features can be another story. The uniformity of design and judicious use of white space render simple the otherwise challenging task of navigating through the dozens of options. The Reports tab lets you dive into your security history, and the "Submit a file" tab is for sending questionable files to Webroot for security verification. The System Cleaner includes a secure file shredder, while the System Control tab includes a sandbox for running suspicious programs safely. System Tools looks like the PC Security window, with a four-tab spread. The PC Security tab contains four horizontal tabs for Scans, Shields, Firewall and Quarantine, while the Identity and Privacy tab contains two tabs: one for the Identity Shield that looks for websites with phishing threats, blocks sites from creating high-risk tracking information and looks at DNS/IP information to protect you against man-in-the-middle attacks the other focuses on Password Management, powered by LastPass but baked into Webroot.īackup and Sync requires you to download an additional module. You can also start a scan from the Overview tab. If you're in the red zone, a button appears that will attempt to fix what ails you with one click. The Overview window presents your security status as a large icon, green when you're safe and red when you're not. At the bottom are simple text links to My Account, Settings and Help and Support. The interface contains a left nav divided into five button-size tabs: Overview, PC Security, Identity and Privacy, Backup and Sync and System Tools. Meanwhile, large buttons and sliders make changing settings simple. This makes it easy to differentiate all of the choices you have. SecureAnywhere does an admirable job of this arduous task, presenting the result in a colour scheme of brushed metal with green highlights. ![]() The key struggle for any security suite is that it must cram a vast range of features, options and menus into a single window. This first scan doesn't hang around long, completing for us in two minutes, 14 seconds in SecureAnywhere Complete, and in less than a minute in SecureAnywhere AntiVirus. Also, when you install, the suite instantly begins a scan. If you click on "Change installation options" from the bottom of the installer window, for example, you can randomise the installation file names to circumvent certain types of infections that would look for names that are more obvious. The program's useful security features begin with the installer.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |