Microsoft Defender vs Webroot

August 06, 2023 | Author: Michael Stromann
40
Microsoft Defender
Microsoft Defender is working to protect your Windows 10 PC by scanning for malicious software. Microsoft Defender uses real-time protection to scan everything you download or run on your PC. It will turn itself off if you install another antivirus app.
19
Webroot
Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals in a connected world.
Microsoft Defender and Webroot are both popular antivirus solutions, but they differ in certain aspects. Microsoft Defender, built into Windows operating systems, offers robust protection against various malware threats and provides regular updates to stay ahead of emerging risks. It integrates well with other Microsoft products and offers seamless integration with Windows security features. On the other hand, Webroot is a lightweight and cloud-based antivirus that focuses on real-time threat detection. Its cloud-based approach enables fast scanning and minimal impact on system resources. Webroot's emphasis on cloud-based protection makes it an attractive choice for those seeking an antivirus solution with a smaller footprint.

See also: Top 10 Antivirus Software
Microsoft Defender vs Webroot in our news:

2021. Microsoft launches Defender for Business



Microsoft has unveiled Microsoft Defender for Business, an innovative and affordable endpoint security solution designed specifically to cater to businesses employing up to 300 individuals. This new offering from Microsoft enhances security measures beyond traditional antivirus systems by providing next-generation protection, endpoint detection and response capabilities, threat and vulnerability management, and more. With simplified configuration and management, along with intelligent and automated investigation and remediation, Defender for Business ensures robust security. It safeguards against a range of cybersecurity threats, including malware and ransomware, across Windows, macOS, iOS, and Android devices. Available as a standalone solution, it can be obtained for a cost of $3 per user per month.


2019. Microsoft Defender comes to Mac



Microsoft Defender Advanced Threat Protection (ATP) will be available for Mac as well. Previously, it served as a Windows solution designed to safeguard the machines of Microsoft 365 subscribers and the assets managed by IT administrators. Formerly known as Windows Defender ATP, Microsoft has decided to drop the "Windows Defender" name since it is now accessible on Mac. Many enterprises utilize a combination of Windows and Mac machines and already equip their employees with Office. By having a security solution that covers both systems, IT departments can significantly simplify their operations, as managing security vulnerabilities on a single system is challenging enough as it is.


2016. Microsoft released Windows Defender Advanced Threat Protection


WDATP is a cloud service offered by Windows Defender, the built-in antivirus in Windows. Currently, Windows Defender primarily focuses on scanning websites and downloads to prevent hacking attempts. However, in the era of social engineering and spear-phishing, antivirus software needs to adopt a more proactive approach. Windows Defender Advanced Threat Protection (WDATP) aims to address this by shifting its attention from monitoring individual files to observing the overall behavior of a machine. Instead of simply searching for specific viruses, WDATP keeps a close watch on symptoms that indicate potential threats. For instance, if a machine starts establishing connections with unusual ports or executing uncommon PowerShell commands—behavior that deviates from the norm for most users—WDAPT alerts administrators. It provides them with an overview of both current and historical machine behavior for further analysis. Moreover, Microsoft is capitalizing on the extensive Windows user base to jumpstart its antivirus program. By analyzing millions of suspicious files from machines worldwide in the cloud, a vast centralized database is being constructed, encompassing not only malicious files but also malicious behavior.

Author: Michael Stromann
Michael is an expert in IT Service Management, IT Security and software development. With his extensive experience as a software developer and active involvement in multiple ERP implementation projects, Michael brings a wealth of practical knowledge to his writings. Having previously worked at SAP, he has honed his expertise and gained a deep understanding of software development and implementation processes. Currently, as a freelance developer, Michael continues to contribute to the IT community by sharing his insights through guest articles published on several IT portals. You can contact Michael by email stromann@liventerprise.com