We all know the saying “safety first” but many software vendors don’t adhere to it.

 

But with patch management software that can help tackle security vulnerabilities and help with patch deployment, putting safety first doesn’t have to be difficult.

Keep your Customers Safe

 

The main thing your customers want is peace of mind. They want to know their business is safe and secure from all the cyberattacks they read about in the news and they want to know that you are on top of things.

 

In order for you to provide your customers with this peace of mind, Atera has a number of proprietary and integrated software tools that it recommends using to fully secure and guard their site against all potential threats.

 

In this blog, we are going to look at why having necessary software and tools are crucial for each of your customers and how to implement them using Atera RMM software. We will be focusing on Webroot AntiVirus software, Webroot Web browsing software and Atera Patch Management tools.

 

Importance of AntiVirus Software

Good AntiVirus protection can recognize — and warn against — even previously unknown malware threats, based on technical features (such as attempting to “hide” on a computer) that are characteristic of malware.

 

In addition, robust antivirus software detects and warns against suspicious websites, especially those that may be designed for “phishing” (a technique that tricks users into entering passwords or account numbers).

 

Why choose Webroot AntiVirus?

Webroot AntiVirus software is fully integrated with the Atera Portal.  For a small monthly fee, you can install the AV software directly onto your client’s endpoints. Webroot AV is considered as one of the best in the industry and one of the most powerful. Read more about Webroot AntiVirus here.

 

It provides complete protection against threats from email, web browsers, files, URLs, ads, apps, and more in real time; It also protects your customers from identity theft by keeping all their personal information secure.

 

Webroot AV has lightning fast scanning skills that won’t slow down your end user from their work. In fact, it is demonstrably quicker than other leading AntiVirus manufacturers. It also boasts revolutionary rollback technology which can unlock and restore various files that have been infected and held for ransom.

 

NOTE: Atera can also work with any other AntiVirus vendor of your choice.

 

Securing your Customer’s Site with Antivirus

Importance of Secure Web Browsing

Internet safety can be deceiving. Seemingly reputable sites may contain spyware traps, or the sites themselves may be counterfeit — phishing sites posing as the real thing to lure you into their scams and debacles. The path away from Internet safety often begins innocently enough; however, certain sites are more prone to be a source of spyware, including: Adult sites, File sharing sites, Social networking sites.

 

Many companies are making the switch to enforcing a secure Web Browsing policy on their employees to try and stop Spyware and Malware from downloading viruses or stealing private information.

 

Why choose Webroot Secure Web Browsing?

Atera, together with Webroot, offer full Web browsing protection on all your customer’s endpoints in the site for a small monthly fee. With Webroot’s SecureAnywhere DNS Protection you can finely tune web access policies to prevent everyday web usage from becoming a major security risk. Because the browsing is implemented in the Server, it protects all the customer’s endpoints – even those without a specific license.

 

Webroot SecureAnywhere lets you configure the following areas:

 

DNS Policies: In addition to a default DNS policy provided by Webroot, you can use or create other DNS Protection policies offering differing levels of security. Together with your end customer, you can make the decision together as to how much freedom versus how much restriction they want their employees to have.

 

Web Overrides: Here you can define websites, including domains and subdomains, to be blocked or allowed according to your customer’s needs. You can also customize the blocked page settings to display your customer’s own branded message to their employees who try to navigate to restricted websites.

 

Site DNS Settings: Configure site wide DNS Settings.

 

Full information on configuring and understanding Webroot SecureAnywhere DNS Protection can be found here.

 

Atera’s Patch Management

 

The next crucial stage in securing your customer’s site is to ensure that every machine in the environment has the latest patches installed. If even one computer in the environment is not patched, it can threaten the stability of the entire environment and possibly inhibit normal functionality.

 

To this end, Atera’s agent is deployed on all your client’s workstations and is constantly and consistently monitoring each workstation to detect missing patches and potential software vulnerabilities and allows you to install missing patches in one click.

 

To speed up performance and provide ease of use, Atera offers a complete and intuitive platform for either manually installing patches or automating Patch Management in a simple and quick to implement methodology. Patch Management can be applied on individual devices and groups, including:

 

  • Run Windows Update: All / Critical / Important / Security.
  • Run Windows Update: Service Pack
  • Install Microsoft Office Updates
  • Install Driver Updates (Hardware)
  • Install Java updates
  • Install Adobe updates

 

Atera’s Patch Management and IT Automation capability allows you to create and schedule daily, weekly and monthly patch management deployment so you can stay ahead of the game and have patches installed as and when they are released.

Safety First and Last

 

By following Atera’s recommended protocols in securing your customer’s site, you create a secure and protected environment, building lasting trust and loyalty between you and your customers.

Was this helpful?

Related Articles

Atera secures SOC 2 certification!

Read now

How to prevent food sector cyberattacks

Read now

Endpoint management: How to bulletproof your IT cybersecurity strategies

Read now

What is pentesting? Should you handle it as an IT professional?

Read now

The exponential impact of AI-powered IT

Achieve 10X operational efficiency, cut down time-to-resolution, and deliver better outcomes faster.