Kaseya Partners with Webroot to Help MSPs Offer Total Endpoint Security

Security is the No. 1 issue MSPs face today, and keeping client endpoints safe is paramount. Providers that rely on Kaseya VSA now not only have Webroot SecureAnywhere fully integrated with the RMM, but they also can purchase this endpoint protection directly from Kaseya.

The Webroot Kaseya Module includes:

  • Easy deployment management: Intuitive, straightforward GUI-driven install/uninstall
  • Combined deployment and status dashboard: Single pane of glass view to manage Webroot within the VSA dashboard
  • Powerful search capabilities: Search via Kaseya group, machine ID or other criteria
  • Deployment flexibility: Mirrored management for Kaseya groups via Webroot groups or sites with single or multiple keys
  • Auto-discovery: Automatic recognition and management for already installed Webroot agents via VSA

“The combination of Kaseya’s industry-leading IT management platform and Webroot’s proven cloud-based endpoint security solution means that our customers can not only offer better protection against threats, but also increase operating margins by significantly reducing the complexities and inefficiencies associated with managing two disparate products. Through this partnership our customers will have peace of mind in knowing that they can manage, automate and protect all of IT,” said Mike Puglia, chief product officer of Kaseya.

MSPs see this value just as much as Puglia. “The recent epidemic of high-profile breaches has highlighted to businesses the importance of improving their defenses from cyberattacks,” said Chriss Rhode, CEO of Orlando-based OrLANtech. “We chose Webroot because it is the premier provider of endpoint security solutions that are easy to deploy and manage. As a customer of both Kaseya and Webroot, we anticipate strong traction among the Kaseya user community as a result of this partnership.”

MSPs can get the Webroot Kaseya Module through the Kaseya Automation Exchange marketplace. For more information and to register for a free trial of the Webroot Kaseya Module, visit https://automationexchange.kaseya.com/products/298#details.

Digging into Webroot

Webroot doesn’t take a standard, static approach to warding off malicious software. Instead, it goes in several unique directions.

One is to combat so-called polymorphic infections, which is malware that constantly changes such that standard definition-based protections can’t identify them.

To protect against these threats, Webroot looks in real time at a user’s applications and the websites he visits, as well as related IP addresses and files, and it does so across millions of endpoints. This allows Webroot to understand what is happening collectively across endpoints, setting a bit of a baseline as to what can be expected. This creates a “reputation” for all these applications and defines them as legitimate. Because these are defined and stable, Webroot knows they are not polymorphic. In contrast, polymorphic malware is that way because it is always unique.

In addition, Webroot SecureAnywhere is accompanied by the cloud-based Webroot Intelligence Network (WIN), which acts as huge malware detection system, driven by data from security vendors, test labs and customers. Because Webroot applies predictive intelligence to the behavior of applications and other executables, it knows when something is out of whack. When these anomalies are detected, Webroot automatically asks the WIN database if this behavior is truly unique. If so, the software uses heuristics to define the specific characteristics of that potentially malicious software.

Webroot also has deep insight into breaches by collecting contextual information about the incursion. This is the essence of Webroot’s Dwell Time reporting. It offers MSPs insight into the infection, including when it started and when it was stopped. This information helps security response teams investigate and take proper action going forward.

For more detail about these threats, take a look at the 2016 Webroot Threat Brief.

Posted by Doug Barney
Doug Barney was the founding editor of Redmond Magazine, Redmond Channel Partner, Redmond Developer News and Virtualization Review. Doug also served as Executive Editor of Network World, Editor in Chief of AmigaWorld, and Editor in Chief of Network Computing.
SD Wan in Action with Eric Gray from Convergence Networks

How One MSP Improved Customer Satisfaction and Reduced Support Tickets

Because so many business applications we use are now in the Cloud, internet continuity is critical to daily operations, employeeRead More

Wooden block that says Business Continuity

What is BCDR? Business Continuity and Disaster Recovery Explained

With organizations going through digital transformations and more employees working remotely, cybersecurity is a top priority for almost all ITRead More

IT infrastructure costs contral

Key Ways to Cut IT Infrastructure Costs

The current global economic crisis has fundamentally changed the way many businesses operate. Given the fact that it will probablyRead More

MSP Marketing

MSP Marketing:  3 Channels to Build Your Sales Pipeline

Many managed service providers (MSPs) struggle with getting their marketing strategy in place. This is usually because MSP owners areRead More

2020 IT Operations Survey Results - Highlighs and Key Takeaways - Watch Now
2020 MSP Benchmark Survey Report