Effective add-on for a Defense-in-Depth Strategy
April 14, 2021

Effective add-on for a Defense-in-Depth Strategy

Sizwe Mlotshwa, CSAE | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Malwarebytes Endpoint Protection

Initially we had a lot of malware slipping through the cracks of our initial antivirus solution. After trialing Malwarebytes, we were satisfied with the results and proceeded to make the purchase. We found that Malwarebytes detects and eradicates threats that are missed by traditional antivirus solution.
  • Simple Licensing scheme
  • Ease of setup
  • Ease of management
  • Reporting
  • Threat remediation
  • Deep Scanning
  • Reporting
  • We saved a lot of time no longer having to hunt malware that was missed by traditional antivirus software
  • Endpoint Management could be better
  • Lack of detail in the reports needs work
In my experience, Malwarebytes doesn't compete with other endpoint protection products but it complements them for a more effective defense in depth strategy. While it is possible to run Malwarebytes as your only endpoint protection solution, I have found it best to use it in the above-mentioned manner.

Do you think ThreatDown, powered by Malwarebytes delivers good value for the price?

Yes

Are you happy with ThreatDown, powered by Malwarebytes's feature set?

No

Did ThreatDown, powered by Malwarebytes live up to sales and marketing promises?

Yes

Did implementation of ThreatDown, powered by Malwarebytes go as expected?

Yes

Would you buy ThreatDown, powered by Malwarebytes again?

Yes

Malwarebytes Endpoint Protection proved to be near ideal for a secondary solution. Running it in conjunction with a traditional antivirus solution provides the best endpoint protection in my experience. Also, even though the reports are a bit lacking in detail, they still make a good starting point when investigating incidents.

ThreatDown, powered by Malwarebytes Feature Ratings

Anti-Exploit Technology
9
Endpoint Detection and Response (EDR)
7
Centralized Management
7
Hybrid Deployment Support
8
Infection Remediation
9
Vulnerability Management
9
Malware Detection
10

Using Malwarebytes Endpoint Protection

130 - Every end user in the organization. From production to administration.
1 - Being the sole administrator of the product, I have found that security analytics skills are more important than security engineering skills when it come to the effective support of this product. Therefore, I would reccomend someone who holds a CompTIA CySA+ or Cisco CyberOps Associate certification rather than someone who holds CISSP, etc.
  • Malware Protection
  • Security Reporting
  • Incident Triage
  • Partial Endpoint Auditing
The renewal decision is not up to me and also, the current economic situation might not allow renewal