Webroot™ Business DNS Protection

Secure your DNS connection against cyberattacks

  • Get total visibility into web usage

  • Enforce acceptable web usage policies to reduce security risk

Skip the hardware and software

This fully cloud-based, secure, and resilient service takes just minutes to set up. Protect your DNS connection, network, and users from cyberattacks.

Get detailed reports on-demand

Drill down into reports on all threats the business would've been susceptible to without DNS Protection in place, and get full visibility into risk and usage.

Enable policies by group, device, IP

Control internet usage for your users using pre-configured and custom policies by group, device or network.

Block threats at the domain level

Over 80 URL categories give you granular, policy-based control to automatically block dangerous and questionable sites (such as Malware and Adult) or unwanted sites (such as streaming media).

Reduce costs relating to infections

DNS filtering stops up to 88% of known malware at the domain layer, so it never reaches your network. It saves you time and money, while also minimizing unproductive web usage.

Apply leading web classification

Webroot® threat intelligence backs all Webroot products, and is trusted by over 100 leading technology vendors to enhance their services.

Powerful protection. Easy recovery. That’s cyber resilience

What is DNS Protection?

In the digital landscape, the Domain Name System (DNS) acts as the internet’s phone book, translating user-entered text into unique internet protocol (IP) addresses that allow browsers to access desired websites. However, traditional DNS protocols were not crafted with security in mind, leaving them susceptible to a myriad of cyber threats, including cache poisoning, DDoS attacks, DNS hijacking, botnets, command and control (C&C) attacks, man-in-the-middle exploits, and more.

Enter DNS Security Solutions: A Cloud-Based Fortress Against Cyber Threats

Embracing a cloud-based DNS security solution redirects users’ web traffic through a fortified gateway, providing businesses with the ability to finely tune and enforce web access policies. This not only ensures regulatory compliance but also acts as a robust defense mechanism at the network’s edge. By halting 88% of threats before they can breach the network or endpoints, DNS protection becomes a pivotal shield against a spectrum of potential cyberattacks.

Why businesses need DNS protection

Managing the risks associated with internet access is a critical concern for businesses of all sizes. In the face of increasingly sophisticated cyber threats, relying solely on endpoint security is no longer sufficient to ensure protection against modern cybercrime. A recent study by EfficientIP revealed that a staggering 90% of businesses globally fell victim to at least one DNS cyberattack in 2023. What’s even more alarming is that, on average, businesses experienced up to seven attacks throughout the year.

According to the same report, the average cost of a single attack amounted to $1.1m USD. When considering these figures, it becomes evident that investing in DNS Protection for servers, endpoints, and other networked devices is not just a security measure but a strategic decision that could profoundly impact a business’s success and, ultimately, its survival.


Frequently Asked Questions about Business DNS Protection

Question 1

Files & Folders Protected Item type backs up files and folders on the device. For full system recovery, we recommend using our Disk Image addon to create a bootable disk image backup of the entire system.


Question 2

Our backups deduplicates all data that is backed up to the same Storage Vault. If you run a Disk Image backup and a Files & Folders backup to the same storage location, there is a very high amount of overlap that will be deduplicated together, reducing your total storage requirements.

Question 3

Yes, if you enable the “Take filesystem snapshot” checkbox. This checkbox is enabled by default, and takes a VSS snapshot that allows it to back up open and in-use files, from a consistent point-in-time snapshot of your disk.

On macOS and Linux, Comet will back up open files without any special configuration.

Question 4

You can backup to you own local drive storage and our cloud storage.

Question 5

Protect against ransomware or accidental deletions with free storage immutability. Backups are a favorite target of cybercriminals because encrypting both your primary systems and secondary backups increases the odds that you’ll pay their ransom. Our immutable storage makes it impossible for anyone to access, alter or delete your data stored for a set retention period (minimum 30 days), adding failsafe protection to your multilayered approach to cybersecurity.

Question 6

There are no additional fees for egress of API calls, so you get straightforward pricing that eliminates the guesswork associated with using AWS S3 and other hyperscale storage services. Test and restore your backups without fear of egress fees

Scroll to Top