- Aug 5, 2012
- 473
This review has been a long time coming (and quite an interesting one to plan out). Starting in mid-2013 I began contemplating how I would go about testing Webroot but at the same time keeping in mind their rollback feature. Sure I could make this review just like any other av test. If I did it this way someone could (and I mean would) say that Webroot does not work like a traditional antivirus and I did not make a fair test. I agree with these people. If Webroot was designed more so to roll-back malware infections than to block known malicious threats that is how I should test their product. Personally I have little complaints about this system (default-deny is a much better policy than default-allow for unknown files). There is however one big issue: it makes conducting a test of their product difficult. How do you test an antivirus that will supposedly detect ALL unknown files eventually (but score poorly on zero-day test). It is for this reason that Webroot test are becoming more and more hard to find.
I have long-since noticed that AV-Test no longer releases test of Webroot (found this interesting discussion on the Wilders Forum: http://www.wilderssecurity.com/threads/why-is-webroot-no-longer-on-the-av-test-tests.360667/
I figure testing Webroot over an extended period of time is the absolute best way to test their antivirus like they claim it supposedly works (to find out once and for all if their claims are valid). Basically Webroot will be given final remarks after a given amount of time has passed (and at which point this series will end). Rather than just release one big compiled video I have decided to break up the review into smaller parts that will be released following each daily evaluation of Webroot.
Please share your comments, feedback and suggestions below.