Skip the hardware and software This fully cloud-based, secure, and resilient service takes just minutes to set up. Protect your DNS connection, network, and users from cyberattacks
Get detailed reports on-demand Drill down into reports on all threats the business would’ve been susceptible to without DNS Protection in place, and get full visibility into risk and usage.
Enable policies by group, device, IP Control internet usage for your users using pre-configured and custom policies by group, device or network.
Block threats at the domain level Over 80 URL categories give you granular, policy-based control to automatically block dangerous and questionable sites (such as Malware and Adult) or unwanted sites (such as streaming media).
Apply leading web classification Webroot® threat intelligence backs all Webroot products, and is trusted by over 65 leading technology vendors to enhance their services.
Reduce costs relating to infections DNS Protection stops up to 90% of web-borne malware at the domain layer, so it never reaches your network. It saves you time and money, while also minimizing unproductive web usage.

Multi-vector protection
Protects against threats across email, browsers,    files, URLs, ads, apps, and more in real time.

Deep learning intelligence
Uses a layered approach to global threat intelligence to continually refine and enhance classification accuracy.

Zero-hour security
Uses advanced behavioral heuristics to identify and protect against never-before-seen threats

Industry-leading efficacy
Secures endpoints with 100% efficacy over a 24-hour period, as shown in independent tests by MRG Effitas.

Fast deployment & scans
Small endpoint client agent deploys and scans in seconds and is always up-to-date, without bulky updates or definitions.

No conflicts
Runs alongside other security software. No need to uninstall existing protection just to give us a try.


No reimaging
Uses journaling and rollback features to restore files to their uninfected state, so you don’t have to reimage.

Online management
Enables endpoint management anywhere, anytime, online with hierarchical controls and visibility.

RMM & PSA integrations
Integrates with leading RMM and PSA platforms for single-pane-of-glass MSP management.

InFlexible billing
Offers monthly and annual subscription options, so MSPs pay as you go, per device, per month.

Lower TCO
Imposes minimal system burden, improves automation, and streamlines management to boost MSP profitability.

MSP-Friendly Unity API
Enhances automation, reduces management costs, improves reporting, and simplifies billing for MSPs.

Proven efficacy
User error accounts for up to 90% of successful breaches. With computer-based training, you can significantly change the odds.

Ongoing defense
Ongoing user training ensures your clients are kept up to date on the latest methods of attack, so they stay on track and out of the headlines.

Regulatory compliance
Protect users and data, avoid fines, and ensure compliance with SEC, FINRA, PCI, HIPAA, GDPR, and other regulations.

Easy 5-step setup wizard and LMS
Our learning management system lets you launch effective education programs in minutes. You can also schedule training and reports to run automatically.

A fully featured phishing simulator
Launching realistic phishing simulations lets you accurately monitor real-world user responses,then direct awareness programs to users accordingly.

Engaging, interactive courses
Succinct, easily-consumed, interactive courses increase end users’ attentiveness, as well as the overall effectiveness of cybersecurity education programs.

Trackable, customizable campaigns
Measuring individual and overall success is key. The LMS keeps track of user participation, making all education accountable and measurable.

Campaign and contact management
Our campaign management wizard, contact manager, email templates, course library, and reporting center let you schedule and assign training efficiently.

Reporting Center
Activity reports can be shared with management to measure progress, risk score, and ROI. Training reports show user progress so accountability and value are always clear.