Webroot DNS Protection is a comprehensive solution that offers protection for DNS connection against cyberattacks, provides total visibility into web usage, and enforces acceptable web usage policies to reduce security risk.
The domain name system (DNS) works like a phone book for the internet: every time a user types an address into a browser, DNS servers take that input and translate it into the unique internet protocol (IP) address that lets the browser access the desired site. But DNS protocols were never designed with security in mind and are highly vulnerable to cyberattacks, such as cache poisoning, DDoS, DNS hijacking, botnets, C&C, man-in-the-middle, and more.
Webroot DNS Protection works at the DNS layer to prevent malicious traffic and block malware before it infiltrates your networks, endpoints, and end-users. Plus, it is the first DNS filtering product on the market to combine privacy and security by handling DNS over HTTPS (DoH) requests.
What is Webroot DNS Protection?
Who might be interested?
All Managed Service Providers (MSPs), medium and large-sized organizations looking for strong threat protection and security policies with easy deployment.
Uncontrolled internet access is a high-risk activity for any business, regardless of size. Faced with today’s sophisticated attacks, endpoint security alone is no longer enough to stay safe from modern cybercrime.
A recent report from EfficientIP found that 77% of businesses worldwide suffered at least one DNS cyberattack in 2018, while on average, businesses got hit with as many as seven attacks throughout the year.

Why should you resell Carbonite Backup for Microsoſt 365?
One of the biggest challenges for IT organizations is the varied and ever-changing options for DNS attacks.
Common attacks include:
Why should you resell Carbonite Backup for Microsoſt 365?
One of the biggest challenges for IT organizations is the varied and ever-changing options for DNS attacks.
Common attacks include:

Uncontrolled internet access

Sophisticated attacks

Cyberattacks on DNS

TCP SYN Flood Attacks

UDP Flood Attack

Spoofed Source
Address/ LAND Attacks
Cache Poisoning Attacks
Man in the Middle Attacks
Which are the most popular case of offering Webroot DNS Protection
1. Roaming and VPN Users
DNS Protection secures
your customers’ mobile
workforce without interfering
with the VPNs, firewalls,
and other security tools
they already use.
DNS Protection and their VPN work together to:
Protect end-users on any network, anywhere
Provide a secure encrypted connection
Never slow down DNS requests
Stop malicious inbound web traffic and threats
Provide full visibility into users’ internet activity
2. WiFi Hotspots
Secure WiFi hotspots with
DNS Protection for Guest
WiFi to keep any business’
guests, customers, and reputation safe against:
man-in-the-middle attacks
unencrypted networks
malware distribution
snooping and sniffing
malicious hotspots
USE CASE

The “Grow your business” consulting firm faced a significant challenge when one of its 20 employees received an email from the CEO, asking them to purchase some Visa gift cards and email them so that they can be distributed by the end of the week. It was a phishing attack that could have potentially cost them a good amount of money. Soon, they realized that the firm needed a resilient solution that gives them peace of mind against the intensifying sophisticated attacks.

The firm consulted with Mario, their IT business partner, who recommended that Webroot DNS Protection is the solution that best fits their needs. With DNS-layer security their outbound network/user traffic is accurately filtered. On top of that, the deployment from the cloud-based Webroot management console is fast, easy, and straightforward, whether on network or roaming devices.

Webroot DNS Protection was the direct response to the consulting firm’s needs that adopted improved privacy, security, and overall resilience against cyber threats. Now, they leverage full internet usage visibility with complete insight into all requests made to the internet, so admins can make better-informed access policy decisions. On top of that, granular and enforceable access policies enable admins to address staff productivity, employer duty of care, and HR and compliance requirements through advanced, customizable policy controls by individual, group, or IP address.