Kaseya Partners with Webroot to Help MSPs Offer Total Endpoint Security

Security is the No. 1 issue MSPs face today, and keeping client endpoints safe is paramount. Providers that rely on Kaseya VSA now not only have Webroot SecureAnywhere fully integrated with the RMM, but they also can purchase this endpoint protection directly from Kaseya.

The Webroot Kaseya Module includes:

  • Easy deployment management: Intuitive, straightforward GUI-driven install/uninstall
  • Combined deployment and status dashboard: Single pane of glass view to manage Webroot within the VSA dashboard
  • Powerful search capabilities: Search via Kaseya group, machine ID or other criteria
  • Deployment flexibility: Mirrored management for Kaseya groups via Webroot groups or sites with single or multiple keys
  • Auto-discovery: Automatic recognition and management for already installed Webroot agents via VSA

“The combination of Kaseya’s industry-leading IT management platform and Webroot’s proven cloud-based endpoint security solution means that our customers can not only offer better protection against threats, but also increase operating margins by significantly reducing the complexities and inefficiencies associated with managing two disparate products. Through this partnership our customers will have peace of mind in knowing that they can manage, automate and protect all of IT,” said Mike Puglia, chief product officer of Kaseya.

MSPs see this value just as much as Puglia. “The recent epidemic of high-profile breaches has highlighted to businesses the importance of improving their defenses from cyberattacks,” said Chriss Rhode, CEO of Orlando-based OrLANtech. “We chose Webroot because it is the premier provider of endpoint security solutions that are easy to deploy and manage. As a customer of both Kaseya and Webroot, we anticipate strong traction among the Kaseya user community as a result of this partnership.”

MSPs can get the Webroot Kaseya Module through the Kaseya Automation Exchange marketplace. For more information and to register for a free trial of the Webroot Kaseya Module, visit https://www.community.connectit.com/automation-exchange/products/298#details.

Digging into Webroot

Webroot doesn’t take a standard, static approach to warding off malicious software. Instead, it goes in several unique directions.

One is to combat so-called polymorphic infections, which is malware that constantly changes such that standard definition-based protections can’t identify them.

To protect against these threats, Webroot looks in real time at a user’s applications and the websites he visits, as well as related IP addresses and files, and it does so across millions of endpoints. This allows Webroot to understand what is happening collectively across endpoints, setting a bit of a baseline as to what can be expected. This creates a “reputation” for all these applications and defines them as legitimate. Because these are defined and stable, Webroot knows they are not polymorphic. In contrast, polymorphic malware is that way because it is always unique.

In addition, Webroot SecureAnywhere is accompanied by the cloud-based Webroot Intelligence Network (WIN), which acts as huge malware detection system, driven by data from security vendors, test labs and customers. Because Webroot applies predictive intelligence to the behavior of applications and other executables, it knows when something is out of whack. When these anomalies are detected, Webroot automatically asks the WIN database if this behavior is truly unique. If so, the software uses heuristics to define the specific characteristics of that potentially malicious software.

Webroot also has deep insight into breaches by collecting contextual information about the incursion. This is the essence of Webroot’s Dwell Time reporting. It offers MSPs insight into the infection, including when it started and when it was stopped. This information helps security response teams investigate and take proper action going forward.

Posted by Doug Barney
Doug Barney was the founding editor of Redmond Magazine, Redmond Channel Partner, Redmond Developer News and Virtualization Review. Doug also served as Executive Editor of Network World, Editor in Chief of AmigaWorld, and Editor in Chief of Network Computing.
How to Win More Business During Cybersecurity Awareness Month

How to Win More Business During Cybersecurity Awareness Month

Cybersecurity Awareness Month is here! This October, get in front of your audience and educate them on the evolving cybersecurityRead More

Why You Need to Talk About Cyber Insurance With SMBs

Over the last few years, we’ve watched cybercriminals increasingly targeting small and midsize businesses, while many small business owners still thinkRead More

Survey Results Highlight 3 Growth Areas for MSPs: Cybersecurity, Cloud and Automation

A robust IT infrastructure is undoubtedly the lifeblood of an organization, regardless of size. Small and midsize businesses (SMBs) especially requireRead More

IT Reports: Examples, Benefits, Best Practices and More

Data makes the world go round, forming the basis for some of the most critical business and political decisions. InRead More

Download the 2022 IT Operations Survey Report - Click Here
2022 Benchmark Survery Results