Guest: You want to know about the Identity Shield
Webroot:Based on what you told me I understand that:
  • You want help with Endpoint & Mobile Protection
  • You want to use SecureAnywhere Endpoint Protection
  • You want to manage Policies
  • You want to know about the policy settings
  • You want to know about the Identity Shield
Webroot:This solution addresses Webroot SecureAnywhere Business – Endpoint Protection

The Identity Shield protects sensitive data that might be exposed during online transactions on your managed endpoints. You can change the behavior of the Identity Shield and control what it blocks.

Identity shield settings
Identity Shield Enabled Turns the Identity shield on and off.
Look for identity threats online Analyzes websites as users browse the Internet or open links. If the shield detects malicious content, it blocks the site and opens an alert.
Analyze websites for phishing threats Analyzes websites for phishing threats as users browse the Internet or open links. If the shield detects a phishing threat, it blocks the site and opens an alert.
Verify websites when visited to determine legitimacy Analyzes the IP address of each website to determine if it has been redirected or is on our blacklist. If the shield detects an illegitimate website, it blocks the site and opens an alert.
Verify the DNS/IP resolution of websites to detect Man-in-the-Middle attacks Looks for servers that could be redirecting users to a malicious website (man-in-the-middle attack). If the shield detects a man-in-the-middle attack, it blocks the threat and opens an alert.
Block websites from creating high risk tracking information Blocks third-party cookies from installing on your managed endpoints if the cookies originate from malicious tracking websites.
Prevent programs from accessing protected credentials Blocks programs from accessing login credentials (for example, when you type your name and password or when you request a website to remember them).
Warn before blocking untrusted programs from accessing protected data Opens an alert any time malware attempts to access data, instead of blocking known malware automatically.
Allow trusted screen capture programs access to protected screen contents Allows screen capture programs, no matter what content is displayed on the screen.
Enable Identity Shield compatibility mode Allows certain applications to run that the Identity shield might block during normal operations. You can enable this option if you notice problems with an application's functions after SecureAnywhere was installed on the endpoint. With this compatibility mode enabled, the endpoint is still protected by the Identity shield's core functionality.
Enable keylogging protection in non-Latin systems Allows endpoints with non-Latin systems (such as Japanese and Chinese) to be protected from keyloggers.


Webroot: Did I answer your question?
Ask your question: Restart your session
Powered by noHold, Inc. U.S. Patent No. 6,604,141