Endpoint & DNS Protection (web filtering)
Managed Endpoint Protection and Web Filtering service providing protection to your organisation against sophisticated cyberattacks. Streamline management with fast deployment and scans.
Block threats at the domain level and reduce costs due to infections. Control costs with per device per month charges and only pay for what you use.
Features
- Realtime Shield and Outbound Firewall
- Contextual threat intelligence
- Identity and Privacy Shields
- Evasion Shield protects against file-based and fileless script attacks
- Infrared Protection provides Advanced Detection of Zero-Day Malware
- Continuous Monitoring
- Advanced Traffic Filtering
- Policy enforcement of web categories
- Offline Protection
- Block Threats at the domain level
Benefits
- Lower Total Cost of Ownership & flexible monthly billing
- Fast deployment, effective, easy-to-use security with low footprint
- Protection against known and unknown threats
- No setup costs
- Fully remote endpoint management and control
- Powered by world-class real-time threat intelligence
- No on-site hardware to install for web filtering
- Accurately filter your outbound network/user traffic
- Extensive, granular, and highly accurate domain filtering categorisations
- Multi OS, virtualization, terminal server, and Citrix support
Pricing
£2.18 a device a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 7 5 2 3 1 5 7 1 8 8 1 3 3 6
Contact
ACTISOFT TECHNOLOGY LIMITED
Bill Slaven
Telephone: 0203 931 0199
Email: bill.slaven@actisofttechnology.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- DNS Protection (web filtering) may be constrained if the endpoint has an unsupported VPN in use.
- System requirements
-
- Windows 11 64-bit
- Windows 10, 8.1, 8, 7 & 7 SP1
- MacOS 10.14, 10.15, 11, 12
- Windows Server 2019, 2016, 2012R2, 2008R2
- VMWare vSphere 5.5, Citrix Xendesktop6.5, MS HyperV 2008,2012, 2016
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- SLA 1 business hour response for Critical, 4 business hours for Major and 7.5 business hours for Minor
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Via chatbot on website
- Web chat accessibility testing
- None at present
- Onsite support
- Yes, at extra cost
- Support levels
-
One service level is included in pricing.
Support contact provided - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- On-boarding process for new accounts. Training is provided remotely or onsite (for a fee) to administrators. User documentation is provided for administrators for the Management Console and the applications.
- Service documentation
- No
- End-of-contract data extraction
- Reports can be created
- End-of-contract process
- Software is uninstalled remotely and deactivated. No additional costs.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- MacOS
- Windows
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- Users can see what protection they have on their endpoint
- Accessibility standards
- None or don’t know
- Description of accessibility
- Users can run scans on the endpoint but cannot make any changes
- Accessibility testing
- Not known.
- API
- Yes
- What users can and can't do using the API
- The Webroot Unity API platform simplifies access to the Webroot® Global Site Manager (GSM) console using representational state transfer (REST) architectural web services to retrieve individual data sets whenever admins need them.
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- No
- Customisation available
- No
Scaling
- Independence of resources
- Webroot has a large scaleable infrastructure
Analytics
- Service usage metrics
- Yes
- Metrics types
- If required we can provide usage metrics along with other reporting
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra support
- Organisation whose services are being resold
- Webroot
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data is exported through the Management Console
- Data export formats
- CSV
- Data import formats
- Other
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Webroot's SLA is guaranteed 99.9% availability over any calendar month
- Approach to resilience
- Data is stored across a minimum of 2 data centres.
- Outage reporting
- A public dashboard
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Dependent upon processes already in place at user level.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
We regularly reevaluate critical IT and business functions through
Integrated risk management functions
Threat and vulnerability analysis
Data governance and threat protection
Aligning business strategy with IT strategy - Information security policies and processes
-
Regular reviews to;
Categorise and mitigate risks and threats
Prepare for identifying, remediating, and recovering from a cyberattack or breach
Provide a method for executive leadership to understand our risk posture and maturity levels
Outline a risk-based approach with regards to the people, systems, and technology that are used every day
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Audit logs are available. All changes are discussed and reviewed before implementation to insure that the level of security is now lowered without being aware of the risks.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Regular reviews of threats. Patches are deployed by the software vendor directly to their service and endpoints. Webroot operates a high level of threat intelligence.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Monitor endpoints for scans, threat alerts and other anomalous activity. Threat alerts are sent out as soon as there is a detection. Remediation action takes place as soon as a threat is detected. Incidents are responded as soon as they are detected.
- Incident management type
- Supplier-defined controls
- Incident management approach
- We used a pre-defined NIST framework if an incident occurs. If we are not alerted to incidents by the system a user would report an incident via support ticket or telephone call. Once an incident has been fully investigated and mitigated an incident report will follow.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
Our services allow users to work from any location that they wish. This will allow remote access to organisation systems if they need to work from home or other location reducing stress from situations
Pricing
- Price
- £2.18 a device a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 30 day free trial for an agreed number of users. Support at normal service levels as a fully paid customer