Carefree Malware Protection
January 13, 2021

Carefree Malware Protection

Eric Milles | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Malwarebytes Endpoint Protection

While we use Webroot Enpoint Protection on our MSP clients, we augment that protection with Malwarebytes. If Webroot allows any malware through, Malwarebytes catches most everything else. We routinely run sweeps/scans with Malwarebytes as our final authority on the cleanliness of our machines.
  • Scan can be customized on many levels.
  • Convient scheduling interface.
  • GUI is very intuitive an easy to use.
  • Updates from one version to another can be challenging. Regular updates are a must.
  • We have not had any issues, but Malwarebytes has gotten some poor reviews on their support in industry publications.
  • We have been able to mitigate any malware that has created any problem for our clients.
  • The potential for catastrophic failure of a system has been reduced to the insignificant because of this product.
We have not used any other product consistently. We occasionally have used SuperAntiSpyware as an added scanning too, but do rely on or install it on our machines.

Do you think ThreatDown, powered by Malwarebytes delivers good value for the price?

Yes

Are you happy with ThreatDown, powered by Malwarebytes's feature set?

Yes

Did ThreatDown, powered by Malwarebytes live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of ThreatDown, powered by Malwarebytes go as expected?

I wasn't involved with the implementation phase

Would you buy ThreatDown, powered by Malwarebytes again?

Yes

For environments where users have significant interaction with web-based applications and resources, it is ideal to reinforce your AV solution with Malwarebytes. For largely internal resources, it is not as impactful, but still provides added insurance against infection.

ThreatDown, powered by Malwarebytes Feature Ratings

Anti-Exploit Technology
9
Endpoint Detection and Response (EDR)
9
Centralized Management
7
Hybrid Deployment Support
5
Infection Remediation
10
Vulnerability Management
9
Malware Detection
10