Malwarebytes Endpoint Protection & Response

Malwarebytes Endpoint Protection & Response integrates Multi-Vector Protection with detection and response capabilities via a single agent. It provides visibility, reduces dwell-time of zero-day threats, and offers remediation options beyond alerts.

Please contact us for pricing.

  • Industry-Leading Protection & Remediation Technologies

    Malwarebytes Endpoint Protection & Response is a cloud based single management console that brings all of the Malwarebytes technologies into one single agent. This makes it possible to scan your network remotely. It includes a multi-vector protection (MVP) that uses a seven-layered approach, which includes both static and dynamic detection techniques. These techniques protect against all known and unknown threat types, from traditional viruses to tomorrow’s advanced threats.

    Malwarebytes Endpoint Protection & Response leverages proprietary Linking Engine technology to remove all traces of infections and related artefacts—not just the primary threat payload. This approach saves time normally spent wiping and re-imaging endpoints.

    Organisations can proactively hunt for malware across all of their endpoints without the need for a dedicated resource. This increases the efficacy of protection and provides a lower total cost of ownership. The single console delivers significantly greater security, visibility and direct drill-downs to explore and instantly manage all security events. All this is accomplished with reduced hardware cost and a reduced server footprint.

    Please see the Media Tab for a detailed Malwarebytes product specification and case studies.

    Check your Anti-Virus Free Network Health Check Request a Free Trial

    MALWAREBYTES ENDPOINT PROTECTION & RESPONSE IS A CLOUD-BASED PLATFORM WITH 7 LAYERS

    Multi-Vector Protection
    Malwarebytes Multi-Vector Protection (MVP) uses a seven layered approach, including both static and dynamic detection techniques, to protect against all stages of an attack.

    Flight Recorder
    Continuously monitors and stores endpoint events in the cloud. Administrators can track file system events, network connections, process events and registry activities, and can view full command line details of executed processes on the endpoint. Automatically displays suspicious activity in cloud console.

    Three Modes of Endpoint Isolation
    When an endpoint is compromised, Malwarebytes stops the bleeding by isolating the endpoint. Endpoint Protection and Response is the first product to offer three ways to isolate an endpoint. Network isolation restricts which processes can communicate. Process isolation controls which processes are allowed to keep functioning. Desktop isolation alerts the end user and halts further interaction to limit damage. With these three controls, malware is rendered incommunicado and remote attackers are locked out.

    Suspicious Activity
    An added Suspicious Activity page in the cloud console displays suspicious activities on endpoints across the network. Administrators can see the location, severity, affected endpoint, status, date and time, the detection rules that triggered for the detection verdict, and available actions—including the ability to view additional details, remediate/rollback an item, or mark an item as a false positive:

    Ransomware Rollback
    Every change made by a process is recorded. If a process does ‘bad’ things you can easily roll back those changes to restore files that were encrypted, deleted, or modified. This provides administrators with the capability to roll back changes and restore files that were encrypted, deleted, or modified in an attack for up to 72 hours (default 48 hours). Administrators can expand protection by adjusting two options that trade off disk space for additional storage—rollback time and maximum file size.

    REMEDIATION MAP

    This map shows when Malwarebytes’ remediation products clean up malware on devices, as they’re happening around the globe, in real time.

    It’s also important to note that this map does not show remediation results for any potentially unwanted programs. Including these would more than double the number of detections.

    Awards

     

    For pricing and more information on Malwarebytes please contact us.

    GET IN TOUCH

  • Features

    • Supports Windows
      • Windows 10® (32-bit, 64-bit) ;Windows 8.1® (32-bit, 64-bit) ; Windows 8® (32-bit, 64-bit); Windows 7® (32-bit, 64-bit); Windows Vista® (32-bit, 64-bit); Windows XP® with SP3 (32-bit only); *Windows Server 2016® (32-bit, 64-bit); *Windows Server 2012/2012R2® (32-bit, 64-bit); *Windows Small Business Server 2011; *Windows Server 2008/2008R2® (32-bit, 64-bit); *Windows Server 2003® (32-bit only)
    • Only supports mac through a manual scan and clean up process in Incident Response
    • Superior protection with multiple layers in a single platform
    • Reduced cost and complexity
    • Collaborative protection with cross-layer shared intelligence
    • Best incident response throughout the entire attack lifecycle

    Technology

    APPLICATION HARDENING

    Reduces the vulnerability surface, making the endpoint more resilient. Proactively detects fingerprinting attempts made by advanced exploit attacks.

    WEB PROTECTION

    Prevents access to command and control (C&C) servers and malicious websites.

    EXPLOIT MITIGATION

    Proactively detects and blocks attempts to compromise application vulnerabilities and remotely execute code on the endpoint.

    APPLICATION BEHAVIOUR

    Ensures applications behave as intended, preventing them from being leveraged to infect endpoints.

    PAYLOAD ANALYSIS

    Identifies entire families of known malware by using a combination of heuristic and behavioural rules.

    RANSOMWARE MITIGATION

    Detects and blocks ransomware from encrypting files using a behavioural monitoring technology.

    ANOMALY DETECTION ENGINE

    Proactively identifies malware using machine learning technology.

    ENDPOINT DETECTION AND RESPONSE (EDR)

    Visibility into endpoints for continuous behavioural analysis and forensics. Reduces the dwell-time of zero-day threats. Provides response options beyond alerts.

    LINKING ENGINE

    Signature-less technology that identifies and thoroughly removes all threat artefacts linked with the primary threat payload.

  • Malwarebytes alert: sudden spike in detections of Emotet Trojan

    Emotet Malware attacks have increased significantly in the past 24 hours Over the past 24 hours, specifically in the UK, Malwarebytes have seen an increase of more than 200% in detections of the Emotet Trojan from users deploying our free remediation tool. Emotet is being used to deliver other malware payloads to endpoints so has […]

    read more...

    Malwarebytes Cloud Platform scheduled update

    Malwarebytes is scheduled to update its cloud platform on September 13, 2018 at 3pm BST. They anticipate less than 3 hours of downtime to complete this update. The update fixes a few usability issues, and adds some improvements: For Malwarebytes Endpoint Protection and Response only: Added granular Endpoint Isolation options, enabling administrators to specify one […]

    read more...

    Malwarebytes Cloud Platform Update

    Malwarebytes is scheduled to update our cloud platform on August 16, 2018 at 8:00PM EST / 5:00PM PST. They anticipate less than 3 hours of downtime to complete this update. New Features Malwarebytes cloud platform now supports role-based access control (RBAC). They’ve made RBAC extremely easy, enabling administrators to rapidly protect console access and data […]

    read more...

    Idency launch Malware vs. Antivirus campaign

    With Malware & Ransomware heavily on the increase you need to make sure you are protected against multiple types of threats! As an authorised Malwarebytes partner Idency can provide you with a free competitive analysis report that shows all of the recognised threats that your current Antivirus provider has missed but Malwarebytes have picked up. “The threat environment […]

    read more...

    Malwarebytes launch Endpoint Protection & Response

    Malwarebytes are constantly evolving to ensure their end users are protected from the latest threats. Their latest solution has just launched with Idency – Malwarebytes Endpoint Protection & Response Endpoint Detection and Response (EDR) capabilities aim to accelerate threat detection and reduce dwell time. The faster a data breach can be identified and contained, the […]

    read more...