IBM Security QRadar EDR vs. Webroot Antivirus + Internet Security Complete (SecureAnywhere)

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
IBM Security QRadar EDR
Score 7.6 out of 10
N/A
IBM Security QRadar EDR (formerly ReaQta) combines automation and dashboards to minimize analyst workloads, detect anomalous endpoint behavior and remediate threats in near real time. With visibility across endpoints, it combines expected features, like MITRE ATT&CK mapping and attack visualizations, with dual-engine AI and automation. For teams that need extended support, managed detection and response (MDR) services offers 24/7 monitoring and response to help keep users…N/A
Webroot Antivirus + Internet Security Complete (SecureAnywhere)
Score 9.3 out of 10
N/A
Webroot Security Complete (formerly under the brand name SecureAnywhere) is a suite of antivirus, multi-endpoint security and Internet security solutions available for home offices, and possibly small businesses with limited security needs.
$30
per seat/per year
Pricing
IBM Security QRadar EDRWebroot Antivirus + Internet Security Complete (SecureAnywhere)
Editions & Modules
No answers on this topic
Webroot Business Endpoint Protection
$30
per seat/per year
Offerings
Pricing Offerings
IBM Security QRadar EDRWebroot Antivirus + Internet Security Complete (SecureAnywhere)
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeOptionalNo setup fee
Additional Details
More Pricing Information
Community Pulse
IBM Security QRadar EDRWebroot Antivirus + Internet Security Complete (SecureAnywhere)
Features
IBM Security QRadar EDRWebroot Antivirus + Internet Security Complete (SecureAnywhere)
Endpoint Security
Comparison of Endpoint Security features of Product A and Product B
IBM Security QRadar EDR
7.9
9 Ratings
8% below category average
Webroot Antivirus + Internet Security Complete (SecureAnywhere)
-
Ratings
Anti-Exploit Technology8.08 Ratings00 Ratings
Endpoint Detection and Response (EDR)8.39 Ratings00 Ratings
Centralized Management8.09 Ratings00 Ratings
Hybrid Deployment Support7.38 Ratings00 Ratings
Infection Remediation7.99 Ratings00 Ratings
Malware Detection7.99 Ratings00 Ratings
Best Alternatives
IBM Security QRadar EDRWebroot Antivirus + Internet Security Complete (SecureAnywhere)
Small Businesses
ThreatLocker
ThreatLocker
Score 9.4 out of 10
Malwarebytes
Malwarebytes
Score 8.2 out of 10
Medium-sized Companies
BlackBerry Protect (CylancePROTECT)
BlackBerry Protect (CylancePROTECT)
Score 9.1 out of 10
BlackBerry Protect (CylancePROTECT)
BlackBerry Protect (CylancePROTECT)
Score 9.1 out of 10
Enterprises
BeyondTrust Endpoint Privilege Management
BeyondTrust Endpoint Privilege Management
Score 9.8 out of 10
BlackBerry Protect (CylancePROTECT)
BlackBerry Protect (CylancePROTECT)
Score 9.1 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
IBM Security QRadar EDRWebroot Antivirus + Internet Security Complete (SecureAnywhere)
Likelihood to Recommend
8.2
(9 ratings)
8.0
(24 ratings)
Likelihood to Renew
-
(0 ratings)
10.0
(5 ratings)
Availability
-
(0 ratings)
10.0
(1 ratings)
Performance
-
(0 ratings)
10.0
(2 ratings)
Support Rating
-
(0 ratings)
8.0
(2 ratings)
Product Scalability
-
(0 ratings)
10.0
(1 ratings)
User Testimonials
IBM Security QRadar EDRWebroot Antivirus + Internet Security Complete (SecureAnywhere)
Likelihood to Recommend
IBM
IBM Security QRadaar EDR provides all the security features at one place with a reasonable price. Though for smaller organizations, the price may be quite high. Plus since it can detect threats and malwares in real time, every business should try them out.
Read full review
Webroot, an OpenText company
Webroot can be great if you have many employees using computers. Sensitive business information can be accessed by malicious threats online if your employees are not trained to avoid these problems. In this case, I think it's important to have software to protect you. If working with a smaller team (and not doing any sort of video production or other intensive software/applications) I can't see a need for anything like Webroot. Learning how to use the internet safely and protecting your file storage are things to be done on the cheap and with smarts.
Read full review
Pros
IBM
  • Detect known and unknown endpoint security threats
  • Remediate these threats near real time
  • Automation in threat detection
  • Threat attack attack visualization storyboards
  • Alert management authomation
Read full review
Webroot, an OpenText company
  • Webroot provides a very easy to use web interface with GSM. From a single dashboard we can control all of our endpoints that are currently using Webroot services. This is extremely helpful for central management for my engineers.
  • Webroot's new (2.0) plugin for Automate (formerly LabTech) provides us with integration into our RMM platform that allows for a large majority of the daily operational tasks to be completed without ever having to move to a different application and/or the web dashboard. The integration is key for engineers to make changes on the fly and quickly. They have done a good job with the 2.0 plugin after coming from the 1st iteration.
  • Webroot interface on the machines is a simple and easy UI to follow and understand. Seeing what the product is doing and how it is configured is very straightforward and doesn't require much hunting with the local interface on machines.
Read full review
Cons
IBM
  • use AI to review previous false negatives that contributed wrongly in the AI suggestion on the follow alerts
  • easily run a script based on values from an hash, ips, path inside the boxes on the behavioral tree
  • apply the remediation to a range of endpoint instead to only the endpoint of the current alert
  • use ajax for example to update the alert page automatically while actions are happening
  • for api have profiles that allow only get actions, or just post on some actions
  • create users in bulk
Read full review
Webroot, an OpenText company
  • It would be nice if there was a notification when Webroot blocked something. Power users may need to legitimately edit things like their hosts file, but they dont know Webroot is preventing them from doing so. They could easily temporarily disable it to do what they need to do if they were aware. Same thing goes for files that get quarantined without notice, it leaves the user wondering why their legitimate file keeps disappearing.
  • While the web based console is nice and easy to use, it could use a little better reporting.
  • If an administrator disabled a feature (like the firewall, for example) then the Webroot GUI should not alert the end user about whenever they open it. The software should be aware it is being administratively controlled.
Read full review
Likelihood to Renew
IBM
No answers on this topic
Webroot, an OpenText company
It's easy to renew with Webroot, their support is very attentive and highly available. However if you do choose to change products, they even provide means of removing the software from your endpoints via the admin portal which is very convenient.
Read full review
Support Rating
IBM
No answers on this topic
Webroot, an OpenText company
We have not had to use Webroot support much over the years. The one or two times we did we were referred to online documentation and in a somewhat condescending manner in one case and in another case, the support person did not demonstrate much knowledge of their product and referred us to the user community for support.
Read full review
Alternatives Considered
IBM
Bitdefender GravityZone combines multiple security services into a single platform to reduce the cost of building a trusted environment for endpoints. bit the IBM provides a vast support and always there to guide when in need With the majority of our users working in hybrid mode we needed a strong security control that could provide top-class protection with the minimum amount of False Positives (and, of course, of True Positives).
Read full review
Webroot, an OpenText company
As previously mentioned, Webroot is struggling to compete. Specifically, it is struggling to show value when similar products are catching more and offer more complete packages for remediation as well. We have discontinued the use of Webroot in favor of offering more advanced protection tools by default to our contracted clients.
Read full review
Scalability
IBM
No answers on this topic
Webroot, an OpenText company
Ease of implementation across various devices is easy and efficient regardless of scale. Whether it is 5 devices or 500 the product continually proves its the best in its class.
Read full review
Return on Investment
IBM
  • NOCs and SOCs heavily use IBM Security QRadar EDR and IBM Security QRadar EDR reduced labor costs to identify endpoint security threats and the treat remediation
  • IBM Security QRadar EDR offers a consistent approach to endpoint threat identification and resolution, reduces enterprise security operations support costs
  • In general, IBM Security QRadar EDR enhances enterprise security posture
Read full review
Webroot, an OpenText company
  • It has had a mostly positive impact as we have not had any breaches.
  • The only negative impact has been when Webroot Antivirus + Internet Security Complete (SecureAnywhere) changed something on their end that caused one of our business applications to not be usable by end-users. That cost our business a fair amount as it took 4 days before it could be used again.
Read full review
ScreenShots

IBM Security QRadar EDR Screenshots

Screenshot of Behavioral tree: 
A behavioral tree provides full alert and attack visibility.Screenshot of Behavioral tree storyline: 
A visual storyline is automatically created as an attack unfolds, including mapping to MITRE ATT&CK, for full visibility.Screenshot of Cyber Assistant alerts: 
The Cyber Assistant, an AI-powered alert management system, can autonomously handle alerts, reducing analysts’ workloads.Screenshot of Cyber Assistant recommends:
The Cyber Assistant learns from analyst decisions, then retains the intellectual capital and learned behaviors to make recommendations and help reduce false positives.Screenshot of Custom detection strategies: 
Detection Strategy (DeStra) scripting allows users to build custom detection strategies — beyond preconfigured models — to address compliance or company-specific requirements without the need to reboot the endpoint.