ThreatDown, powered by MalwarebytesFormerly Malwarebytes for Business
Overview
What is ThreatDown, powered by Malwarebytes?
ThreatDown replaces the former Malwarebytes for Business product suite, combining Malwarebytes' endpoint security capabilities in four bundles. The basic Core tier includes incident response, Next-gen AV, device control, vulnerability assessments, and the ability to block unwanted application. Higher tiers include…
TrustRadius Insights
Great product! Definitely should be in your list to consider.
Malwarebytes is a great and affordable corporate antivirus solution
Malwarebytes Endpoint Protection Delivers Safety in the Dangerous World of Data Technology
Malwarebytes increased our IT security protection level
Effective add-on for a Defense-in-Depth Strategy
Carefree Malware Protection
The best tool to protect against Ransomware, Malware and Spyware
A great safety net for your network.
How Malwarebytes Endpoint Protection saves us time and BIG $$ each year.
Malwarebytes will give you the piece of mind you have been searching for!
Great product for the security paranoid
Popular Features
- Malware Detection (12)8.383%
- Endpoint Detection and Response (EDR) (12)8.383%
- Centralized Management (12)8.383%
- Anti-Exploit Technology (11)8.383%
Reviewer Pros & Cons
Pricing
Core
$69
Advanced
$79
Elite
$99
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Starting price (does not include set up fee)
- $207 per year 3 devices (minimum)
Features
Endpoint Security
Endpoint security software protects enterprise connected devices from malware and cyber attacks.
- 8.3Anti-Exploit Technology(11) Ratings
In-memory and application layer attack blocking (e.g. ransomeware)
- 8.3Endpoint Detection and Response (EDR)(12) Ratings
Continuous monitoring and response to advanced internet threats by endpoint agents.
- 8.3Centralized Management(12) Ratings
Centralized management supporting multi-factor authentication, customized views, and role-based access control.
- 9.9Hybrid Deployment Support(7) Ratings
Administrators should be able to choose endpoint security on-premise, cloud, or hybrid.
- 9.9Infection Remediation(11) Ratings
Capability to quarantine infected endpoint and terminate malicious processes.
- 8.3Vulnerability Management(10) Ratings
Vulnerability prioritization for fixes.
- 8.3Malware Detection(12) Ratings
Detection and blocking of zero-day file and fileless malware.
Product Details
- About
- Integrations
- Tech Details
- FAQs
What is ThreatDown, powered by Malwarebytes?
ThreatDown, powered by Malwarebytes Integrations
ThreatDown, powered by Malwarebytes Technical Details
Deployment Types | On-premise, Software as a Service (SaaS), Cloud, or Web-Based |
---|---|
Operating Systems | Windows, Linux, Mac |
Mobile Application | No |
Frequently Asked Questions
Comparisons
Compare with
Reviews and Ratings
(56)Community Insights
- Business Problems Solved
- Pros
- Cons
Malwarebytes Endpoint Protection is highly valued by organizations as a reliable solution for protecting end user machines against malware, ransomware, and other invasive threats. Users find the product dependable and appreciate its ease of deployment and policy management through the web portal. It effectively addresses the issue of malware slipping through the cracks of initial antivirus solutions by detecting and eradicating threats that are missed by traditional antivirus software. The product offers both anti-malware and anti-ransomware features, providing protection for all Windows-based equipment, workstations, and servers. Many users have found it beneficial to augment their existing antivirus solutions with Malwarebytes Endpoint Protection, which catches malware that may have been missed by those solutions. The centralized management system and detailed reports on access attempts that were blocked have proven to be valuable features. Moreover, the software performs above expectations in providing endpoint security and protecting against common threats like malware, spyware, and ransomware attacks. Users also appreciate the intelligent anti-ransomware capabilities and detailed reporting feature, which have been particularly useful in identifying and addressing malicious software. Additionally, the product's light footprint ensures minimal resource usage while delivering reliable performance. Furthermore, remote remediation has proven to be highly effective in resolving issues. In summary, Malwarebytes Endpoint Protection offers comprehensive protection against various forms of malware and provides a robust solution for organizations seeking reliable endpoint security.
Intuitive User Interface: Users have consistently found the user interface of Malwarebytes Endpoint Protection intuitive and easy to navigate. They appreciate the software's seamless design, allowing for easy access to all features without any confusion.
Convenient Scheduling Interface: Many reviewers appreciate the convenience of the scheduling interface provided by Malwarebytes Endpoint Protection. This feature allows for customized scans on multiple levels, making it easier to ensure comprehensive protection while minimizing disruptions during busy work hours.
Effortless Reporting via Management Web Portal: Reviewers commend the management web portal of Malwarebytes Endpoint Protection for its effortless reporting capabilities. Users can easily report malicious items through this portal, even accessing it from their cell phones if needed. This feature streamlines the process of managing and addressing security threats efficiently.
Cons:
- Difficulty in Updating Software: Some users have found the process of updating Malwarebytes from one version to another challenging, requiring extra effort and time. They have mentioned that the update process could be more seamless and user-friendly.
- Poor Customer Support: Industry publications have reported negative reviews on Malwarebytes' customer support, indicating that some users have experienced slow response times and dissatisfaction with the level of assistance provided. Users have expressed frustration over delayed resolutions and a lack of effective communication.
- Limited End-User Functionality: Users have expressed that they find the end-user functionality of Malwarebytes to be limited, wishing for additional features to enhance their experience with the software. They would like to see improvements in customization options and advanced settings to meet their specific needs better.
Attribute Ratings
Reviews
(1-6 of 6)- Ease of administration
- Visibility
- Ease of implementation
- Detection and removal of threats
- Malwarebytes blocks access to malicious URL's, but the access isn't always user generated. It would be nice if Malwarebytes could help identify the source better.
- Once in a great while, an endpoint that uses Malwarebytes disconnects from the Nebula console. This has only happened twice in the last 4 years, but it is inconvenient and not realized until a manual audit is done.
- It would be nice if Malwarebytes would integrate with our RMM solution.
- Light footprint
- Affordable
- Can be used in conjunction with Windows Defender or other third-party antivirus solutions
- End user functionality is limited--can only launch scans. Would be nice to offer more features for the end user.
- Some updates must be done or at least approved manually, instead of automatic updating.
- It catches some false positives, so they need to tone down the aggressiveness somewhat.
Malwarebytes Endpoint Protection Delivers Safety in the Dangerous World of Data Technology
Malwarebytes addresses the issues of malware and ransomware by doing an excellent job of protecting all systems within our network as well as users' portable laptops. In a world where ransomware is becoming a daily issue for mid to large-sized companies, this is an insurance policy that every company needs to have.
- Protects against malware - No matter how much training you give end users on social hacking, there is always a breach at some point.
- Protects against ransomware - Ransomware could spell disaster for a company...it could literally shut the doors for good.
- Centralized administration - Without a terrific centralized method to manage all the systems being protected, it would require an extra position just to maintain all endpoints.
- The main con for me is trying to find a con to complain about. I simply cannot think of anything negative I have to say about MalwareBytes in the experience I have had with them to date.
The only place Malwarebytes Endpoint Protection may not be AS appropriate would be one where there is near zero reliance on computers, networks and data.
A great safety net for your network.
- Anti-ransomware; the rollback feature, and the ability to stop ransomware in it's tracks would be highly valuable in the event of a ransomware infection reaching a machine. It can block a machine from communicating on the network, prevent the infection from modifying any more files, and allows for a full machine rollback to prior to the infection if required.
- The management console gives you a lot of information on the target machine, including general asset details, as well as infection details. It also has very effective remote management and remediation tools.
- The remote deployment tool could do with a little work; occasionally there would be errors deploying it to a remote asset, and the errors were not especially clear on what the issue was. The deployment tool also requires the install files to be downloaded onto the machine you are running the tool from, rather than being able to pull from a server location. The installer is also just an executable that you launch each time you want to install.
- Firewall capability isn't really present in the product as it stands, which is why it's running in tandem with our current solution.
- The initial setup with Malwarebytes Endpoint Protection is speedy and straightforward since you do not have to dedicate a server for the management side of it - it is cloud-based!
- Reporting of malicious items is a breeze from the management web portal. I can quickly review items from my cell phone as I walk through the office, from home or wherever I am and need to check on these items. Other systems require you to VPN to your office, open software, log in, and start reviewing. But being cloud-based makes this so much simpler!
- I would like to see Malwarebytes Endpoint Protection create the ability to setup other admins of the system with restrictive access to only review items, but not be able to deploy machines or change the policies.
- There is an area in the admin center when you are reviewing deployed machines. You are unable to sort or search by Computer Name/Host Name. This would help to quickly locate specific devices since we do not try to memorize IP addresses used by workstations.
Great product for the security paranoid
- Great protection for end points.
- Automatic definition updates without the need to contact the management server.
- Anti-exploit program self updates without the need to contact the management server.
- Supports group policy deployment.
- Supports email alerts.
- Works alongside anti-virus programs without issues.
- Usable on Windows servers and Windows workstations.
- Limited Apple support (remediation only).
- Premise based management tool no longer the focus of development in favor of new cloud based protection.
- Can't migrate to cloud based protection easily and requires different licensing.
- They released a definition package last year that caused all systems that received it to block all network access, inbound and outbound. The repair process was manual and took 15 minutes per machine to fix. The only way to learn about it was from their website and it was not easy to determine that Malwarebytes was the cause.
- Management tool does not auto-update client programs. You need to either perform a push update or update your GPO program deployment for the new package.
- Email alerts about clients only come in after the workstation has sent an update to the management server. The management server is not accessible over the internet, so reports from remote users can take days after the incident.
- The anti-exploit module does not like any JAVA programs. Barracuda JAVA VPN and Supermicro SuperDoctor get blocked. There is no exception list, so you have to disable protection.
- You can not make exclusions for programs you need protection to be disabled for.
- Some programs can be disabled by end users.
- No notification process to inform you of new updates for end user applications or the management system.