- Jan 31, 2018
- 66
Penalized for how it functions would be the proper way to state what mostly occurred here.Boy Webroot continues to take a dump to the point it's useless now.
Did they basically stop working on it? I suspect their major snafu's with damaging millions of systems harmed them irreparably. I haven't run into anyone using Webroot in almost a year now, and the only major MSP's I know using it, stopped.
Not all protections, or detection's for that matter, are equal. A product might completely block a URL, which stops the threat before it can even start its intended series of malicious events. Alternatively, the product might allow a web-based exploit to execute but prevent it from downloading any further code to the target. In another case malware might run on the target for a short while before its behavior is detected and its code is deleted or moved to a safe ‘quarantine’ area for future analysis. We take these outcomes into account when attributing points that form final ratings. For example, a product that completely blocks a threat is rated more highly than one that allows a threat to run for a while before eventually evicting it. Products that allow all malware infections, or that block popular legitimate applications, are penalized heavily.
Boy Webroot continues to take a dump to the point it's useless now.
Did they basically stop working on it? I suspect their major snafu's with damaging millions of systems harmed them irreparably. I haven't run into anyone using Webroot in almost a year now, and the only major MSP's I know using it, stopped.
Penalized for how it functions would be the proper way to state what mostly occurred here.
Webroot is always butthurt and comes up with an new excuses why in lab tests their product didn't perform well. Tested version was 9.0.19.43Boy Webroot continues to take a dump to the point it's useless now.
Did they basically stop working on it? I suspect their major snafu's with damaging millions of systems harmed them irreparably. I haven't run into anyone using Webroot in almost a year now, and the only major MSP's I know using it, stopped.
Webroot notes that testing
occurred before it released its script and anti-
exploit protection.
You are correct, but what is not mentioned here is the ability to manually monitor or block processes and the extra tools built in... The product is wrapped around the test instead of the way it should be.Webroot rollback only works against specific types of infections. And even then, sometimes only against a specific infection within a subset.
Like any of them work as they should e.g. SafeStart Sandboxextra tools built in...
Im not a fanboy of webroot, do not even use it, just pointing out that products are not all designed the same, and testing with one methodology and penalizing some for the way they are designed is not correct or accurate. Now if they tested the product as it was designed and it failed, then i would salute them and move on.Like any of them work as they should e.g. SafeStart Sandbox
You are correct, but what is not mentioned here is the ability to manually monitor or block processes and the extra tools built in... The product is wrapped around the test instead of the way it should be.
Did manually clicking block the process stop them? It is kind of my point with this, although i do not need to explain this to you, as you are aware how they all test and how it does not fit the design.You can monitor Zeus or a screenlock ransomware and those of their ilk, and Webroot lets them trash the system with no way to rollback. Webroot has known about it for at least a decade because I reported it so many times.
The underlined pretty much sums it up. As i stated above, im not behind this product nor am i recommending anyone to use it, im just merely stating the methodologies of these test are so misleading how they are implemented. I want to see a product fail, because it does indeed suck, not because some half-baked test was labeled professional.People cannot figure out how to use Webroot. There's stuff in it that most Average Joes are like... wut ? And Webroot's reply is always "Oh, you just don't understand how the product works." They're liars in my experience.
Randomizing WRSA filename doesn't protect from that?I just analyzed an Evil Locker that kills the Webroot (WSRA) service. LOL...
They have been working with adding script protection and anti-exploit. So, they haven't stopped.Boy Webroot continues to take a dump to the point it's useless now.
Did they basically stop working on it? I suspect their major snafu's with damaging millions of systems harmed them irreparably. I haven't run into anyone using Webroot in almost a year now, and the only major MSP's I know using it, stopped.
Did manually clicking block the process stop them?
My point was simply that a user could block the active process manually, i have yet to see this in a test from any of them. If it failed to block the samples, then so be it.I like that SE Labs does not charge for participation.... or give the 'opportunity' for vendors to pay so that their results are not shown.
I'm not surprised that Norton is on top. Norton finishes at or near the top of the majority of tests in which it is included.
And I'm not surprised that Webroot is at the bottom. At least 5 years ago... AV-C developed a fair methodology to test Webroot with the roll-back feature and all...
And.... Webroot still finished poorly. So they basically tried to quit being tested.
The Webroot propaganda machine launched into overdrive. "Most advanced... best protection.... blah blah blah...."
Oh, and "all testing is unfair because the testers don't understand Webroot....roll-back..... active threat.... blah blah blah..",,,
Except.... that the testing organizations understood Webroot perfectly. And could test it fairly and effectively.
Webroot just didn't like the results.
In the meantime, somebody I'll nickname 'Triple Hernia' at another website pushed the Webroot propaganda machine hard, and did manage to develop a group of kool-aid drinking followers. But most of them.... some faster some slower.... eventually realized that Webroot is just not that great.
Great at excuses... not that great at protection.
Randomizing WRSA filename doesn't protect from that?
My point was simply that a user could block the active process manually, i have yet to see this in a test from any of them. If it failed to block the samples, then so be it.
Even though i do not use the product, i will not resort to product bashing and calling out users and creating more drama, it was a simple statement of the testing procedure that i have yet to see.
This was all i was trying to point out, so basically the testing method is not wrapped around the product design, so how accurate can it be.They're not gonna testing anything manual... involving HIPS or HIPS-like protections. It has to be automated for the people who don't know what they're doing, don't know how anything works, basically... the clueless.
This was all i was trying to point out, so basically the testing method is not wrapped around the product design, so how accurate can it be.