Malwarebytes Endpoint Protection & Response

Enterprise level cloud-based single management console with multi-vector protection & response via a single agent. Contact us for pricing.

  • Industry-Leading Protection & Remediation Technologies

    Malwarebytes Endpoint Protection & Response is a cloud based single management console that brings all of the Malwarebytes technologies into one single agent. This makes it possible to scan your network remotely. It includes a multi-vector protection (MVP) that uses a seven-layered approach, which includes both static and dynamic detection techniques. These techniques protect against all known and unknown threat types, from traditional viruses to tomorrow’s advanced threats.

    Malwarebytes Endpoint Protection & Response leverages proprietary Linking Engine technology to remove all traces of infections and related artefacts—not just the primary threat payload. This approach saves time normally spent wiping and re-imaging endpoints.

    Organisations can proactively hunt for malware across all of their endpoints without the need for a dedicated resource. This increases the efficacy of protection and provides a lower total cost of ownership. The single console delivers significantly greater security, visibility and direct drill-downs to explore and instantly manage all security events. All this is accomplished with reduced hardware cost and a reduced server footprint.

    Please see the Media Tab for a detailed Malwarebytes product specification and case studies.

    Check your Anti-Virus Free Network Health Check Request a Free Trial


    Multi-Vector Protection
    Malwarebytes Multi-Vector Protection (MVP) uses a seven layered approach, including both static and dynamic detection techniques, to protect against all stages of an attack.

    Flight Recorder
    Continuously monitors and stores endpoint events in the cloud. Administrators can track file system events, network connections, process events and registry activities, and can view full command line details of executed processes on the endpoint. Automatically displays suspicious activity in cloud console.

    Three Modes of Endpoint Isolation
    When an endpoint is compromised, Malwarebytes stops the bleeding by isolating the endpoint. Endpoint Protection and Response is the first product to offer three ways to isolate an endpoint. Network isolation restricts which processes can communicate. Process isolation controls which processes are allowed to keep functioning. Desktop isolation alerts the end user and halts further interaction to limit damage. With these three controls, malware is rendered incommunicado and remote attackers are locked out.

    Suspicious Activity
    An added Suspicious Activity page in the cloud console displays suspicious activities on endpoints across the network. Administrators can see the location, severity, affected endpoint, status, date and time, the detection rules that triggered for the detection verdict, and available actions—including the ability to view additional details, remediate/rollback an item, or mark an item as a false positive:

    Ransomware Rollback
    Every change made by a process is recorded. If a process does ‘bad’ things you can easily roll back those changes to restore files that were encrypted, deleted, or modified. This provides administrators with the capability to roll back changes and restore files that were encrypted, deleted, or modified in an attack for up to 72 hours (default 48 hours). Administrators can expand protection by adjusting two options that trade off disk space for additional storage—rollback time and maximum file size.


    This map shows when Malwarebytes’ remediation products clean up malware on devices, as they’re happening around the globe, in real time.

    It’s also important to note that this map does not show remediation results for any potentially unwanted programs. Including these would more than double the number of detections.



    For pricing and more information on Malwarebytes please contact us.


  • Features

    • Supports Windows
      • Windows 10® (32-bit, 64-bit) ;Windows 8.1® (32-bit, 64-bit) ; Windows 8® (32-bit, 64-bit); Windows 7® (32-bit, 64-bit); Windows Vista® (32-bit, 64-bit); Windows XP® with SP3 (32-bit only); *Windows Server 2016® (32-bit, 64-bit); *Windows Server 2012/2012R2® (32-bit, 64-bit); *Windows Small Business Server 2011; *Windows Server 2008/2008R2® (32-bit, 64-bit); *Windows Server 2003® (32-bit only)
    • Only supports mac through a manual scan and clean up process in Incident Response
    • Superior protection with multiple layers in a single platform
    • Reduced cost and complexity
    • Collaborative protection with cross-layer shared intelligence
    • Best incident response throughout the entire attack lifecycle



    Reduces the vulnerability surface, making the endpoint more resilient. Proactively detects fingerprinting attempts made by advanced exploit attacks.


    Prevents access to command and control (C&C) servers and malicious websites.


    Proactively detects and blocks attempts to compromise application vulnerabilities and remotely execute code on the endpoint.


    Ensures applications behave as intended, preventing them from being leveraged to infect endpoints.


    Identifies entire families of known malware by using a combination of heuristic and behavioural rules.


    Detects and blocks ransomware from encrypting files using a behavioural monitoring technology.


    Proactively identifies malware using machine learning technology.


    Visibility into endpoints for continuous behavioural analysis and forensics. Reduces the dwell-time of zero-day threats. Provides response options beyond alerts.


    Signature-less technology that identifies and thoroughly removes all threat artefacts linked with the primary threat payload.

  • Malwarebytes End of March Cloud Platform Update

    Malwarebytes is performing a maintenance update to their cloud platform on: March 21, 2019 at 8:00PM EST / 5:00PM PST. Malwarebytes anticipates less than 3 hours of downtime while they perform this update. Your endpoints will continue to receive updates and be 100% protected during this time. New Features: Policy-level exclusion options. Exclusions can now be […]


    Malwarebytes End of January Cloud Update

    Malwarebytes is performing a maintenance update to their cloud platform on: January 31, 2019 at 8:00PM EST / 5:00PM PST. Malwarebytes anticipates less than 3 hours of downtime while they perform this update. Your endpoints will continue to receive updates and be 100% protected during this time. New Features: Malwarebytes cloud console now features adjustable startup […]


    You can now export your Malwarebytes data directly to Microsoft Excel

    Malwarebytes truly is a conquering cybersecurity provider and continues to add to their warrior-like strategies. But, doesn’t every cybersecurity provider consider themselves hero’s? How can we be sure to put our trust in Malwarebytes? Malwarebytes gives triallists an opportunity Triallists of Malwarebytes can now generate summary reports that demonstrate exactly how Malwarebytes has protected your […]


    Malwarebytes January Cloud Update: New Features & Improvements

    Malwarebytes is performing a maintenance update to their cloud platform on: January 10, 2019 at 8:00PM EST / 5:00PM PST. Malwarebytes anticipates the cloud console will be offline for 60 minutes while they perform this update. Your endpoints will continue to receive updates and be 100% protected during this time. New Features: Single-Sign-On (SSO) support […]


    Malwarebytes October Cloud Update: Enhancements for Administrators

    Malwarebytes schedule cloud platform update for 8:00PM EST / 5:00PM PST on October 18th 2018 with less than 3 hours of down time anticipated to complete. This update includes enhanced administrators’ visibility providing additional insight. Customers will also benefit by seeing the exact behaviours and rule(s) which triggered a cloud sandbox detection. One of the main […]


    Malwarebytes alert: sudden spike in detections of Emotet Trojan

    Emotet Malware attacks have increased significantly in the past 24 hours Over the past 24 hours, specifically in the UK, Malwarebytes have seen an increase of more than 200% in detections of the Emotet Trojan from users deploying our free remediation tool. Emotet is being used to deliver other malware payloads to endpoints so has […]


    Malwarebytes Cloud Platform scheduled update

    Malwarebytes is scheduled to update its cloud platform on September 13, 2018 at 3pm BST. They anticipate less than 3 hours of downtime to complete this update. The update fixes a few usability issues, and adds some improvements: For Malwarebytes Endpoint Protection and Response only: Added granular Endpoint Isolation options, enabling administrators to specify one […]


    Malwarebytes Cloud Platform Update

    Malwarebytes is scheduled to update our cloud platform on August 16, 2018 at 8:00PM EST / 5:00PM PST. They anticipate less than 3 hours of downtime to complete this update. New Features Malwarebytes cloud platform now supports role-based access control (RBAC). They’ve made RBAC extremely easy, enabling administrators to rapidly protect console access and data […]


    Idency launch Malware vs. Antivirus campaign

    With Malware & Ransomware heavily on the increase you need to make sure you are protected against multiple types of threats! As an authorised Malwarebytes partner Idency can provide you with a free competitive analysis report that shows all of the recognised threats that your current Antivirus provider has missed but Malwarebytes have picked up. “The threat environment […]


    Malwarebytes launch Endpoint Protection & Response

    Malwarebytes are constantly evolving to ensure their end users are protected from the latest threats. Their latest solution has just launched with Idency – Malwarebytes Endpoint Protection & Response Endpoint Detection and Response (EDR) capabilities aim to accelerate threat detection and reduce dwell time. The faster a data breach can be identified and contained, the […]