Is webroot.com Safe? Security Analysis for Webroot
http://webroot.comCheck if webroot.com is a scam or legitimate. Free security scan and reviews.

Unlock the complete security report for webroot.com
Get full access to AI recommendations, compliance evidence, vulnerability remediation steps, and downloadable PDF reports. Upgrade once for lifetime access to this scan.
Full Report Access
All modules, AI insights, PDF download
Marketing Intelligence
Contact emails, phone numbers & warm leads
How it works
- Enter your email to receive the unlocked report.
- Complete the secure EveryPay checkout (cards & local methods supported).
- You’ll receive an email with your unique unlock code and the PDF export.
Already purchased?
Order summary
Digital reports are delivered immediately after payment. By continuing you acknowledge the withdrawal waiver described in our Returns & Refunds policy.
Secure payments processed via EveryPay. Prices in EUR; Incl. 21% VAT.
SEQ SIA
Lastadijas 12 k-3, Riga, Latvia, LV-1050
Reg. No. 40203410806 • VAT LV40203410806
Support: guard@offseq.com • +371 2256 5353
AI Summary
Webroot, a subsidiary of Open Text Corporation, is a well-established cybersecurity company founded in 2004, providing multi-vector protection solutions for endpoints, networks, and identity protection. The company targe… Unlock the full Guard report to read the complete analysis.
Detected Technologies
Keep webroot.com under constant watch
Guard tracks your live infrastructure daily: certificate expiry, DNS & mail authentication drift, uptime changes, subdomain inventory, and unexpected tracker or content shifts. A full timeline captures every diff so you can prove remediation and spot regressions instantly.
Security drift alerts
Risk score drops, new high-severity issues, and header hardening gaps
Compliance watch
GDPR / NIS2 posture changes with governance evidence snapshots
Infrastructure surface
Unexpected open services, SSL expiry, DNS & email authentication changes
Content & tracker intelligence
Marketing tech shifts, analytics drift, and AI recommendation updates
Cancel anytime. Alerts sent to the contacts you choose. Unlock the full report to view historical timelines and alerts.
Security Headers
7 findings
20/100
GDPR Compliance
5 findings
15/100
NIS2 Compliance
8 findings
5/100
Email Security
1 finding
50/100
🧠AI Business Intelligence
Technology stack, business insights, and market analysis powered by AI.
Snapshot shown below. Unlock the full AI report for complete market insights, audience profiling, and step-by-step recommendations.
Business Intelligence
Market & Strategic Analysis
Webroot operates in the cybersecurity technology sector, serving a diverse customer base including individual consumers, families, small to medium businesses, managed service providers, and technology partners. The company leverages a subscription-based business model offering various tiers of endpoint protection, identity theft protection, and cloud services. Its market position is strengthened by its parent company Open Text, extensive industry certifications, and a large installed base of over 285 million protected devices. The company maintains a robust partner ecosystem and provides resources such as trials, product comparisons, and support to facilitate customer acquisition and retention. Growth indicators include new product launches, continuous updates, and active community engagement. The website's integration with Open Text's broader infrastructure and branding enhances its credibility and reach. However, the lack of direct contact emails and phone numbers on the site may limit immediate customer engagement channels. The company’s strategic focus on both home and business cybersecurity markets positions it well for sustained growth amid increasing cyber threats.
Extracted Contact Information
Marketing Intelligence Data
Physical Addresses (1)
Security Posture Analysis
Comprehensive Security Assessment
The current security posture of the website is moderate to poor due to the absence of a valid SSL certificate and lack of HTTPS support, which is a critical security flaw. While the site employs secure cookie flags and avoids known SSL/TLS vulnerabilities like Heartbleed and POODLE, the missing encryption layer exposes all data transmissions to risk. Security headers are present but incomplete, lacking HSTS and OCSP stapling, which are important for preventing downgrade attacks and improving certificate validation. No dedicated security policy or incident response contact information is found, which could hinder transparency and responsiveness in case of security incidents. The DNS configuration shows malformed CAA records, which could affect certificate issuance security. Overall, the site needs urgent remediation of its SSL/TLS configuration and enhancement of security policies to meet industry standards and regulatory compliance such as GDPR and NIS2.
Strategic Recommendations
Priority Actions for Security Improvement
Upgrade to the full Guard report to access tailored remediation steps.
🛡️Security Headers
HTTP security headers analysis and recommendations.
Some header findings are shown. Unlock to see the full checklist, impacted endpoints, and remediation guidance.
Security Headers
HTTP security headers analysis
Missing Strict-Transport-Security header
HIGHForces HTTPS connections Unlock the full report to read the complete fix.
Missing X-Frame-Options header
HIGHPrevents clickjacking attacks Unlock the full report to read the complete fix.
Missing X-Content-Type-Options header
MEDIUMPrevents MIME type sniffing Unlock the full report to read the complete fix.
Missing Content-Security-Policy header
HIGHControls resources the browser is allowed to load Unlock the full report to read the complete fix.
Missing X-XSS-Protection header
MEDIUMLegacy XSS protection (deprecated but still recommended) Unlock the full report to read the complete fix.
Missing Referrer-Policy header
LOWControls referrer information sent with requests Unlock the full report to read the complete fix.
Missing Permissions-Policy header
MEDIUMControls browser features and APIs Unlock the full report to read the complete fix.
👤GDPR Compliance
Privacy and data protection assessment under GDPR regulations.
Preview of GDPR checkpoints is visible. Unlock to reveal full evidence, policy excerpts, and DPIA guidance.
GDPR Compliance
Privacy and data protection assessment
No Privacy Policy found
HIGHGDPR requires a clear and accessible privacy policy Unlock the full report to read the complete fix.
No Cookie Consent Banner found
HIGHGDPR requires explicit consent for non-essential cookies Unlock the full report to read the complete fix.
Insufficient contact information
MEDIUMGDPR requires organizations to provide clear contact details Unlock the full report to read the complete fix.
Third-party services without privacy policy
HIGHDetected services: Google Analytics, Facebook, Twitter, LinkedIn, YouTube, Google APIs Unlock the full report to read the complete fix.
No HTTPS encryption
CRITICALGDPR requires appropriate security measures for personal data Unlock the full report to read the complete fix.
GDPR Compliance Analysis
🛡️NIS2 Compliance
Network & Information Security Directive compliance assessment.
You can see headline NIS2 checks. Upgrade to access the full control mapping, severity breakdown, and remediation plan.
NIS2 Compliance
Network & Information Security Directive
No HTTPS encryption
CRITICALNIS2 requires appropriate technical measures including encryption Unlock the full report to read the complete fix.
No information security framework found
HIGHNIS2 requires documented cybersecurity and information security measures Unlock the full report to read the complete fix.
No vulnerability disclosure policy
MEDIUMNIS2 encourages coordinated vulnerability disclosure Unlock the full report to read the complete fix.
No security policy documentation found
HIGHNIS2 requires documented cybersecurity governance and risk management Unlock the full report to read the complete fix.
No incident response procedures found
HIGHNIS2 requires documented incident response and business continuity plans Unlock the full report to read the complete fix.
No business continuity planning found
MEDIUMNIS2 emphasizes operational resilience and business continuity Unlock the full report to read the complete fix.
No security contact information
HIGHNIS2 requires clear incident reporting channels Unlock the full report to read the complete fix.
No NIS2 reference found
LOWConsider explicitly mentioning NIS2 compliance efforts Unlock the full report to read the complete fix.
📧Email Security
SPF, DKIM, and DMARC validation and email security assessment.
Quick view of email authentication checks is provided. Unlock to uncover full DNS evidence, record diffs, and fix scripts.
Email Security
SPF, DKIM, and DMARC validation
Email Security Check Incomplete
MEDIUMSome email security checks timed out Unlock the full report to read the complete fix.
🏆SSL/TLS Security
Certificate validity and encryption analysis.
This is a teaser of the TLS audit. Unlock to view certificate chains, cipher support tables, and remediation steps.
SSL/TLS Security
Certificate validity and encryption analysis
No HTTPS Encryption
CRITICALWebsite does not use HTTPS encryption, making all data transmission vulnerable to interception Unlock the full report to read the complete fix.
OCSP Status
📊DNS Health
DNS configuration and security assessment.
Unlock the full DNS posture audit to reveal misconfigurations, zone records, and actionable fixes.
DNS Health
DNS configuration and security assessment
DNSSEC Not Enabled
MEDIUMDNSSEC is not configured for this domain Unlock the full report to read the complete fix.
DNS Records
DNSSEC Status
SPF Analysis
⚡Network Security
Port scanning and network exposure analysis.
See a glimpse of exposed services. Unlock to access full port inventories, CVE lookups, and mitigation priorities.
Network Security
Port scanning and network exposure analysis
Good Network Security Posture
LOWNo unnecessary services detected on common risky ports Unlock the full report to read the complete fix.
🔧Technical Analysis
Detailed technical findings and analysis from AI assessment.
Unlock to view the complete technical breakdown, stack fingerprinting, and hardening checklist.
Technical Analysis
Comprehensive security assessment findings
Additional Findings
How did we do?
Your feedback directly shapes our roadmap. Rate the quality of this report, leave an optional comment, and let us know if you want our security specialists to follow up.
What others say about webroot.com
Share your experience to help others make informed decisions. We verify every review by email and publish it once our moderation team approves it.
Community rating
—out of 5
0 reviews published