SlideShare a Scribd company logo
1 of 2
Download to read offline
Webroot® SecureAnywhere™ 2012
Revolutionary new products taking security to the cloud.
And deliver the fastest, least disruptive protection your customers can buy.
Webroot’s SecureAnywhere approach offers fast and light protection for PCs, laptops, tablets, and smartphones. And because
it’s in the cloud, it uses less system resources and is always up to date. SecureAnywhere products work so silently you hardly
notice they’re working. But they are. More effectively than any security product you’ve ever experienced.


                                                                       Unmatched value for your customers.
                    Why Recommend
                                                                       • Free program and definition updates for the life
                Webroot SecureAnywhere?
                                                                         of your subscription
                                                                       • Protects up to three PCs (plus three mobile devices
     • Its cloud-based subscription model means                          with SecureAnywhere Complete Premium)
       security is always current without having to
                                                                       • Works with all popular Windows operating systems
       download updates
     • It’s fast and light — scanning in just two
       minutes—so you can work and play without                        Webroot SecureAnywhere Antivirus
       disruptions                                                     The most revolutionary security product you can buy
     • It doesn’t conflict with other apps and
       can be used as added protection with other                      • Scans PCs in about 2 minutes
       security software                                               • Protects against new threats as soon as they emerge
     • It’s easy to manage all your devices from                       • Use as a standalone or as an added layer of protection
       anywhere in a convenient online portal
                                                                       Webroot SecureAnywhere Essentials
                                                                       The fastest and lightest antivirus and firewall protection

                                                                       • Includes all the features of the SecureAnywhere
                                                                         Antivirus
                                                                       • Blocks hackers and online scams
                                                                       • Protects files with online backup and synchronizes
   “WOW!!! This has to be one of the quickest and smartest
                                                                         files between PCs
       anti-virus and malware software out there.”
                            —TIJANA H.
                                                                       Webroot SecureAnywhere Complete
         “I had nasty viruses on my laptop and nothing                 The fastest, most complete protection for PCs and mobile devices
 would remove them. Webroot took less than 5 minutes to scan
             my laptop and remove all of the viruses                   • Includes all the features of SecureAnywhere Essentials,
      I had on my laptop. Thanks Webroot, you ROCK!”                     plus much more
                             —DAWIT
                                                                       • Protects PCs and mobile devices, including iPhone, iPad,
                                                                         and Android devices
 “It runs so efficiently, you actually forget that it’s on your PC.”
                            —D. FARKAS
                                                                       • Encrypts passwords, credit cards, and files to prevent
                                                                         identity theft
                                                                       • Lets you manage all your PCs and devices via any
                                                                         web connection
Webroot® SecureAnywhere™ 2012




                                       Webroot SecureAnywhere | Webroot SecureAnywhere Essentials | Webroot SecureAnywhere Complete




  SECURITY FEATURES                                                                                 Webroot                                 Webroot                                 Webroot
                                                                                                    SecureAnywhere                          SecureAnywhere                          SecureAnywhere
                                                                                                    Antivirus                               Essentials                              Complete Premium
                                                                                                    3 USERS                                 1 & 3 USERS                             3 USERS

  THREAT PROTECTION
  Blocks viruses, spyware, rootkits, and other threats                                              x                                       x                                        x
  Scans your PC in about two minutes*                                                               x                                       x                                        x
  Stops unknown threats based on suspicious behaviour                                               x                                       x                                        x
  Continually updates itself so it’s always current                                                 x                                       x                                        x
  Blocks harmful websites before you connect                                                        x                                       x                                        x
  Prevents malicious programs from changing your settings                                           x                                       x                                        x
  Includes firewall and network connection monitor                                                                                          x                                        x
  IDENTITY PROTECTION
  Wipes away all traces of online activity                                                                                                  x                                        x
  Makes deleted files unrecoverable                                                                                                         x                                        x
  Blocks phishing attacks                                                                                                                   x                                        x
  Encrypts usernames, passwords, and credit card numbers                                                                                                                             x
  Logs you into trusted sites and securely fills in online forms                                                                                                                     x
  Creates hacker-proof passwords                                                                                                                                                     x
  Provides advanced protection for online shopping and banking                                                                                                                       x
  PERSONAL FILE PROTECTION
  Backs up your files online automatically                                                                                                  2 GB/user                                10 GB/user
  Synchronises files across all your devices                                                                                                x                                        x
  Synchronises passwords and files between PCs and mobile devices                                                                                                                    x
  MOBILE DEVICE PROTECTION
  Protects your Android™ and Apple iOS™ devices                                                                                                                                      x
  Scans all apps and downloads automatically                                                                                                                                         x
  Locks or wipes your smartphone or tablet remotely if needed**                                                                                                                      x
  Locates your smartphone or tablet if lost or stolen**                                                                                                                              x

  * After initial scan, full system scans typically take two minutes or less
  ** 3G/4G data connection required for some features




© 2006 – 2011 Webroot Software, Inc. All rights reserved. Webroot, SecureAnywhere, Webroot SecureAnywhere, and the globe design are trademarks or registered trademarks of Webroot Software, Inc. in the United
States and/or other countries. Windows, Windows Vista, and Internet Explorer are trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Mozilla and Firefox are
registered trademarks of the Mozilla Foundation. Android is a trademark of Google, Inc. Apple is a registered trademark of Apple, Inc. All other trademarks are properties of their respective owners.

                                                                                                                                                                                 www.webroot.co.uk

More Related Content

Recently uploaded

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Recently uploaded (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Featured

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

Revolutionary new products taking security to the cloud. And deliver the fastest, least disruptive protection your customers can buy.

  • 1. Webroot® SecureAnywhere™ 2012 Revolutionary new products taking security to the cloud. And deliver the fastest, least disruptive protection your customers can buy. Webroot’s SecureAnywhere approach offers fast and light protection for PCs, laptops, tablets, and smartphones. And because it’s in the cloud, it uses less system resources and is always up to date. SecureAnywhere products work so silently you hardly notice they’re working. But they are. More effectively than any security product you’ve ever experienced. Unmatched value for your customers. Why Recommend • Free program and definition updates for the life Webroot SecureAnywhere? of your subscription • Protects up to three PCs (plus three mobile devices • Its cloud-based subscription model means with SecureAnywhere Complete Premium) security is always current without having to • Works with all popular Windows operating systems download updates • It’s fast and light — scanning in just two minutes—so you can work and play without Webroot SecureAnywhere Antivirus disruptions The most revolutionary security product you can buy • It doesn’t conflict with other apps and can be used as added protection with other • Scans PCs in about 2 minutes security software • Protects against new threats as soon as they emerge • It’s easy to manage all your devices from • Use as a standalone or as an added layer of protection anywhere in a convenient online portal Webroot SecureAnywhere Essentials The fastest and lightest antivirus and firewall protection • Includes all the features of the SecureAnywhere Antivirus • Blocks hackers and online scams • Protects files with online backup and synchronizes “WOW!!! This has to be one of the quickest and smartest files between PCs anti-virus and malware software out there.” —TIJANA H. Webroot SecureAnywhere Complete “I had nasty viruses on my laptop and nothing The fastest, most complete protection for PCs and mobile devices would remove them. Webroot took less than 5 minutes to scan my laptop and remove all of the viruses • Includes all the features of SecureAnywhere Essentials, I had on my laptop. Thanks Webroot, you ROCK!” plus much more —DAWIT • Protects PCs and mobile devices, including iPhone, iPad, and Android devices “It runs so efficiently, you actually forget that it’s on your PC.” —D. FARKAS • Encrypts passwords, credit cards, and files to prevent identity theft • Lets you manage all your PCs and devices via any web connection
  • 2. Webroot® SecureAnywhere™ 2012 Webroot SecureAnywhere | Webroot SecureAnywhere Essentials | Webroot SecureAnywhere Complete SECURITY FEATURES Webroot Webroot Webroot SecureAnywhere SecureAnywhere SecureAnywhere Antivirus Essentials Complete Premium 3 USERS 1 & 3 USERS 3 USERS THREAT PROTECTION Blocks viruses, spyware, rootkits, and other threats x x x Scans your PC in about two minutes* x x x Stops unknown threats based on suspicious behaviour x x x Continually updates itself so it’s always current x x x Blocks harmful websites before you connect x x x Prevents malicious programs from changing your settings x x x Includes firewall and network connection monitor x x IDENTITY PROTECTION Wipes away all traces of online activity x x Makes deleted files unrecoverable x x Blocks phishing attacks x x Encrypts usernames, passwords, and credit card numbers x Logs you into trusted sites and securely fills in online forms x Creates hacker-proof passwords x Provides advanced protection for online shopping and banking x PERSONAL FILE PROTECTION Backs up your files online automatically 2 GB/user 10 GB/user Synchronises files across all your devices x x Synchronises passwords and files between PCs and mobile devices x MOBILE DEVICE PROTECTION Protects your Android™ and Apple iOS™ devices x Scans all apps and downloads automatically x Locks or wipes your smartphone or tablet remotely if needed** x Locates your smartphone or tablet if lost or stolen** x * After initial scan, full system scans typically take two minutes or less ** 3G/4G data connection required for some features © 2006 – 2011 Webroot Software, Inc. All rights reserved. Webroot, SecureAnywhere, Webroot SecureAnywhere, and the globe design are trademarks or registered trademarks of Webroot Software, Inc. in the United States and/or other countries. Windows, Windows Vista, and Internet Explorer are trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Mozilla and Firefox are registered trademarks of the Mozilla Foundation. Android is a trademark of Google, Inc. Apple is a registered trademark of Apple, Inc. All other trademarks are properties of their respective owners. www.webroot.co.uk