Malwarebytes Endpoint Detection & Response (EDR)


Malwarebytes Endpoint Detection & Response integrates Multi-Vector Protection with detection and response capabilities via a single agent.

More details

External warehouse

Order item

59 kr tax excl.

74 kr tax incl.

59 kr per månad


The minimum purchase order quantity for the product is 10

More info

Malwarebytes Endpoint Detection & Response provides visibility, reduces dwell-time of zero-day threats, and offers remediation options beyond alerts. Endpoint Protection & Response eliminates EDR complexity with intuitive endpoint monitoring, detection, and remediation.

Web Protection

Prevents access to malicious websites, ad networks, scammer networks, and bad neighborhoods.

Application Hardening

Reduces vulnerability exploit surface and proactively detects fingerprinting attempts used by advanced attacks.

Exploit Mitigation

Proactively detects and blocks attempts to abuse vulnerabilities and remotely execute code on the endpoint.

Application Behavior Protection

Prevents applications from being leveraged to infect the endpoint.

Anomaly Detection Machine Learning

Proactively identifies viruses and malware through machine learning techniques.

Payload Analysis

Identifies entire families of known and relevant malware with heuristic and behavioral rules.

Ransomware Mitigation

Detects and blocks ransomware via behavioral monitoring technology.

Linking Engine and Remediation

Provides complete and thorough remediation to return the endpoint to a truly healthy state while minimizing the impact to the end-user.

Endpoint Detection and Response (EDR)

Visibility into endpoints for continuous behavioral analysis and forensics. Reduces the dwell-time of zero-day threats. Provides response options beyond alerts

Multi-layered protection

Malwarebytes Multi-Vector Protection (MVP) uses a seven layeredapproach, including both static and dynamic detection techniques that protects against all stages of an attack. This approach provides protection against all types of threats from traditional viruses to tomorrow’s advanced threats.

Visibility into endpoints for continuous monitoring

Flight Recorder provides continuous monitoring and visibility into Windows desktops for powerful insights. You can easily track file system activity, network activity, process activity, and registry activity. Flight Recorder events are stored both locally and in the cloud.

Three modes of endpoint isolation

When an endpoint is compromised, Malwarebytes stops the bleeding by isolating the endpoint. Fast remediation prevents lateral movement. Malware is stopped from phoning home, and remote attackers are locked-out. Endpoint Protection and Response is the first product to offer three ways to isolate an endpoint. Network Isolation to restrict which processes can communicate. Process Isolation to restrict which processes can run and Desktop Isolation to alert the end user and halt interaction.
This safely keeps the system online for detailed analysis.

Complete and thorough remediation

Malwarebytes delivers the industry’s most trusted remediation, as evidenced by 500,000 downloads and remediation of 3 million infections per day around the globe. Malwarebytes Endpoint Protection and Response leverages proprietary Linking Engine technology to remove all traces of infections and related artifacts—not just the primary threat payload. This approach saves time normally spent wiping and re-imaging endpoints.

Ransomware Rollback

Ransomware Rollback technology allows you to wind back the clock to negate the impact of ransomware by leveraging just-in-time backups.
Malwarebytes logs and associates changes with specific processes. Every change made by a process is recorded. If a process does ‘bad’ things you can easily roll back those changes to restore files that were encrypted, deleted, or modified. Data storage is minimized using proprietary dynamic exclusion technology that learns what ‘good’ applications do.

Centralized cloud-based management

Being cloud-based reduces complexity, making it easy to deploy and manage, regardless of the number of endpoints. Additionally, it eliminates the need to acquire and maintain on-premises hardware.

Data sheet

Setting time Ja, 12 månader
Notice period Ja, 3 månader
Features Web Protection, Application Hardening, Exploit Mitigation, Application Behavior Protection, Anomaly Detection Machine Learning, Payload Analysis, Ransomware Mitigation, Linking Engine and Remediation, Endpoint Detection and Response (EDR)
Supported Operating Systems Windows
Mode of delivery Elektronisk distribution (Inom 24h efter signerat avtal)