Industry-Leading Protection & Remediation Technologies
Malwarebytes Endpoint Protection & Response is a cloud based single management console that brings all of the Malwarebytes technologies into one single agent. This makes it possible to scan your network remotely. It includes a multi-vector protection (MVP) that uses a seven-layered approach, which includes both static and dynamic detection techniques. These techniques protect against all known and unknown threat types, from traditional viruses to tomorrow’s advanced threats.
Malwarebytes Endpoint Protection & Response leverages proprietary Linking Engine technology to remove all traces of infections and related artefacts—not just the primary threat payload. This approach saves time normally spent wiping and re-imaging endpoints.
Organisations can proactively hunt for malware across all of their endpoints without the need for a dedicated resource. This increases the efficacy of protection and provides a lower total cost of ownership. The single console delivers significantly greater security, visibility and direct drill-downs to explore and instantly manage all security events. All this is accomplished with reduced hardware cost and a reduced server footprint.
Please see the Media Tab for a detailed Malwarebytes product specification and case studies.
Check your Anti-Virus Free Network Health Check Request a Free Trial
MALWAREBYTES ENDPOINT PROTECTION & RESPONSE IS A CLOUD-BASED PLATFORM WITH 7 LAYERS
Malwarebytes Multi-Vector Protection (MVP) uses a seven layered approach, including both static and dynamic detection techniques, to protect against all stages of an attack.
Continuously monitors and stores endpoint events in the cloud. Administrators can track file system events, network connections, process events and registry activities, and can view full command line details of executed processes on the endpoint. Automatically displays suspicious activity in cloud console.
Three Modes of Endpoint Isolation
When an endpoint is compromised, Malwarebytes stops the bleeding by isolating the endpoint. Endpoint Protection and Response is the first product to offer three ways to isolate an endpoint. Network isolation restricts which processes can communicate. Process isolation controls which processes are allowed to keep functioning. Desktop isolation alerts the end user and halts further interaction to limit damage. With these three controls, malware is rendered incommunicado and remote attackers are locked out.
An added Suspicious Activity page in the cloud console displays suspicious activities on endpoints across the network. Administrators can see the location, severity, affected endpoint, status, date and time, the detection rules that triggered for the detection verdict, and available actions—including the ability to view additional details, remediate/rollback an item, or mark an item as a false positive:
Every change made by a process is recorded. If a process does ‘bad’ things you can easily roll back those changes to restore files that were encrypted, deleted, or modified. This provides administrators with the capability to roll back changes and restore files that were encrypted, deleted, or modified in an attack for up to 72 hours (default 48 hours). Administrators can expand protection by adjusting two options that trade off disk space for additional storage—rollback time and maximum file size.
This map shows when Malwarebytes’ remediation products clean up malware on devices, as they’re happening around the globe, in real time.
It’s also important to note that this map does not show remediation results for any potentially unwanted programs. Including these would more than double the number of detections.
For pricing and more information on Malwarebytes please contact us.
GET IN TOUCH