SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Malwarebytes Endpoint Security is an endpoint protection platform
that uses multiple technologies to proactively protect your computers
against unknown and known threats. Delivering multi-stage attack
protection provides companies of all sizes, across all industries,
around the globe the ability to stop cybercriminals at every step of
the attack chain.
Key benefits
Stops advanced malware and ransomware attacks
Reduces the chances of data exfiltration and saves on IT resources by
protecting against malware that traditional security can miss.
Protects against exploits and ransomware
Protects unsupported programs by armoring vulnerabilities
against exploits. Signature-less behavioral monitoring technology
automatically detects and blocks unknown (zero-hour) ransomware.
Increases productivity
Maintains end-user productivity by preserving system performance
and keeping staff on revenue-positive projects.
Easy management
Simplifies endpoint security management and identifies vulnerable
endpoints. Streamlines endpoint security deployment and maximizes
IT management resources.
Scalable threat prevention
Deploys protection for every endpoint and scales as your company grows.
Detects unprotected systems
Discovers all endpoints and installed software on your network.
Systems without Malwarebytes that are vulnerable to cyberattacks can
be easily secured.
Remediates Mac endpoints
Rapidly detects and removes malware from OS X endpoints,
including adware.*
Malwarebytes Endpoint Security
Advanced threat prevention
DATA SHEET
CORE TECHNOLOGIES
Anti-malware
•	 Advanced malware prevention
Anti-exploit
•	 Four layers of exploit protection
Anti-ransomware
•	 Automatically detects and
blocks ransomware
Management console
•	 Security policies, central
monitoring, and reporting
AWARDS
America's Most
Promising Company
Product of the Year
Security Innovation
of the Year
*The included Mac remediation client is not managed by the management console
and does not offer real-time protection.
SYSTEM REQUIREMENTS
Endpoints
Supported operating systems:
Windows 10, 8.1, 8, 7, Vista, XP
Windows Server 2012, 2008, 2003
Windows Small Business Server 2011
Mac OS X (10.8 and newer)
Hardware:
800 MHz CPU or better
1 GB RAM or higher (2 GB or higher for
Windows Server)
35 MB free disk space
Management Console
Supported operating systems:
Windows Server 2012, 2008
Supported Microsoft SQL Servers:
SQL Server 2014, 2012, 2008
SQL Server 2008 Express
(included with product)
Hardware:
2 GHz CPU (dual-core 2.6 GHz
or faster recommended)
2 GB RAM or higher (4 GB recommended)
10 GB free disk space (20 GB recommended)
Features
•	 Proactive anti-malware/anti-spyware scanning
•	 Three system scan modes (Quick, Flash, Full)
•	 Malicious website blocking
•	 File execution blocking
•	 Malwarebytes Chameleon technology
•	 Delete-on-reboot option
Anti-malware
Features
•	 Protection against operating system security bypasses
•	 Memory caller protection
•	 Application behavior protection
•	 Application hardening
Anti-exploit
Features
•	 Scalable endpoint management with push install functionality
•	 Flexible scan scheduling
•	 Threat view with central reporting
•	 Virtual deployment simulator
•	 Active Directory integration
Management Console
Malwarebytes protects consumers and businesses against dangerous threats such as malware, ransomware, and exploits that escape
detection by traditional antivirus solutions. Malwarebytes Anti-Malware, the company’s flagship product, has a highly advanced heuristic
detection engine that removed more than five billion malicious threats from computers worldwide. More than 10,000 SMBs and enterprise
businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, the company is headquartered in California with offices in
Europe, and a global team of researchers and experts.
malwarebytes.com/business corporate-sales@malwarebytes.com 1.800.520.2796
Copyright © 2016, Malwarebytes. All rights reserved. Malwarebytes and the Malwarebytes logo are trademarks of Malwarebytes. Other marks and brands may be claimed as the property of
others. All descriptions and specifications herein are subject to change without notice and are provided without warranty of any kind.
Features
•	 Dedicated real-time detection and blocking engine
•	 Proprietary ransomware behavioral technology
•	 Signature-less identification of unknown (zero-hour) ransomware
•	 Small system footprint
•	 Compatible with third-party security solutions
Anti-ransomware

Weitere ähnliche Inhalte

Was ist angesagt?

Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!MSHOWTO Bilisim Toplulugu
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceQualys
 
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringSystem Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringAmit Gatenyo
 
How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM AlienVault
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMAlienVault
 
Configuring Data Sources in AlienVault
Configuring Data Sources in AlienVaultConfiguring Data Sources in AlienVault
Configuring Data Sources in AlienVaultAlienVault
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Quick Heal Technologies Ltd.
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsBeyondTrust
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceMSAdvAnalytics
 
Panda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security
 
Presentazione-CyberArk-MDM-v3
Presentazione-CyberArk-MDM-v3Presentazione-CyberArk-MDM-v3
Presentazione-CyberArk-MDM-v3Marco Di Martino
 
IDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDSIDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDSAlienVault
 
Choosing The Right Enterprise Antispyware Solution
Choosing The Right Enterprise Antispyware SolutionChoosing The Right Enterprise Antispyware Solution
Choosing The Right Enterprise Antispyware SolutionMark J. Feldman
 
Malware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmMalware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmAlienVault
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...AlienVault
 
Alienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienVault
 
Mitigating Rapid Cyberattacks
Mitigating Rapid CyberattacksMitigating Rapid Cyberattacks
Mitigating Rapid CyberattacksErdem Erdogan
 
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than EverAlienVault
 

Was ist angesagt? (20)

Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
 
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringSystem Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
 
How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
 
Configuring Data Sources in AlienVault
Configuring Data Sources in AlienVaultConfiguring Data Sources in AlienVault
Configuring Data Sources in AlienVault
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
 
Unit4
Unit4Unit4
Unit4
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
 
Panda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection Plus
 
Presentazione-CyberArk-MDM-v3
Presentazione-CyberArk-MDM-v3Presentazione-CyberArk-MDM-v3
Presentazione-CyberArk-MDM-v3
 
IDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDSIDS for Security Analysts: How to Get Actionable Insights from your IDS
IDS for Security Analysts: How to Get Actionable Insights from your IDS
 
Choosing The Right Enterprise Antispyware Solution
Choosing The Right Enterprise Antispyware SolutionChoosing The Right Enterprise Antispyware Solution
Choosing The Right Enterprise Antispyware Solution
 
Malware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usmMalware detection how to spot infections early with alien vault usm
Malware detection how to spot infections early with alien vault usm
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
 
Alienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworks
 
Mitigating Rapid Cyberattacks
Mitigating Rapid CyberattacksMitigating Rapid Cyberattacks
Mitigating Rapid Cyberattacks
 
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 

Ähnlich wie MBESDatasheet

Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 Cyd Isaak Francisco
 
Hqs abatis hdf general overview
Hqs abatis hdf general overviewHqs abatis hdf general overview
Hqs abatis hdf general overviewNine23Ltd
 
2009 Quick Heal
2009 Quick Heal2009 Quick Heal
2009 Quick HealV.R.RAO
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
Symantec Antivirus Management.pptx
Symantec Antivirus Management.pptxSymantec Antivirus Management.pptx
Symantec Antivirus Management.pptxbemnitekalegn
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesSymantec
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxArrow ECS UK
 
operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3qacaybagirovv
 
Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protectionDavid Waugh
 
Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack ClancyClancy9
 
Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack RaahaugeHerbert0
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfMdZabedHossain2
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Alexander Benoit
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint SecurityBurak DAYIOGLU
 
What are Advantages of Best Antivirus Software Protection_.pdf
What are Advantages of Best Antivirus Software Protection_.pdfWhat are Advantages of Best Antivirus Software Protection_.pdf
What are Advantages of Best Antivirus Software Protection_.pdfDigitals Good
 

Ähnlich wie MBESDatasheet (20)

MBESProductSheet (1)
MBESProductSheet (1)MBESProductSheet (1)
MBESProductSheet (1)
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
Hqs abatis hdf general overview
Hqs abatis hdf general overviewHqs abatis hdf general overview
Hqs abatis hdf general overview
 
2009 Quick Heal
2009 Quick Heal2009 Quick Heal
2009 Quick Heal
 
Top 10 antiviruses
Top 10 antivirusesTop 10 antiviruses
Top 10 antiviruses
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Symantec Antivirus Management.pptx
Symantec Antivirus Management.pptxSymantec Antivirus Management.pptx
Symantec Antivirus Management.pptx
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
 
operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3
 
SanerNow platform-datasheet
SanerNow platform-datasheetSanerNow platform-datasheet
SanerNow platform-datasheet
 
Comodo advanced endpoint protection
Comodo advanced endpoint protectionComodo advanced endpoint protection
Comodo advanced endpoint protection
 
Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack
 
Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
What are Advantages of Best Antivirus Software Protection_.pdf
What are Advantages of Best Antivirus Software Protection_.pdfWhat are Advantages of Best Antivirus Software Protection_.pdf
What are Advantages of Best Antivirus Software Protection_.pdf
 

MBESDatasheet

  • 1. Malwarebytes Endpoint Security is an endpoint protection platform that uses multiple technologies to proactively protect your computers against unknown and known threats. Delivering multi-stage attack protection provides companies of all sizes, across all industries, around the globe the ability to stop cybercriminals at every step of the attack chain. Key benefits Stops advanced malware and ransomware attacks Reduces the chances of data exfiltration and saves on IT resources by protecting against malware that traditional security can miss. Protects against exploits and ransomware Protects unsupported programs by armoring vulnerabilities against exploits. Signature-less behavioral monitoring technology automatically detects and blocks unknown (zero-hour) ransomware. Increases productivity Maintains end-user productivity by preserving system performance and keeping staff on revenue-positive projects. Easy management Simplifies endpoint security management and identifies vulnerable endpoints. Streamlines endpoint security deployment and maximizes IT management resources. Scalable threat prevention Deploys protection for every endpoint and scales as your company grows. Detects unprotected systems Discovers all endpoints and installed software on your network. Systems without Malwarebytes that are vulnerable to cyberattacks can be easily secured. Remediates Mac endpoints Rapidly detects and removes malware from OS X endpoints, including adware.* Malwarebytes Endpoint Security Advanced threat prevention DATA SHEET CORE TECHNOLOGIES Anti-malware • Advanced malware prevention Anti-exploit • Four layers of exploit protection Anti-ransomware • Automatically detects and blocks ransomware Management console • Security policies, central monitoring, and reporting AWARDS America's Most Promising Company Product of the Year Security Innovation of the Year *The included Mac remediation client is not managed by the management console and does not offer real-time protection.
  • 2. SYSTEM REQUIREMENTS Endpoints Supported operating systems: Windows 10, 8.1, 8, 7, Vista, XP Windows Server 2012, 2008, 2003 Windows Small Business Server 2011 Mac OS X (10.8 and newer) Hardware: 800 MHz CPU or better 1 GB RAM or higher (2 GB or higher for Windows Server) 35 MB free disk space Management Console Supported operating systems: Windows Server 2012, 2008 Supported Microsoft SQL Servers: SQL Server 2014, 2012, 2008 SQL Server 2008 Express (included with product) Hardware: 2 GHz CPU (dual-core 2.6 GHz or faster recommended) 2 GB RAM or higher (4 GB recommended) 10 GB free disk space (20 GB recommended) Features • Proactive anti-malware/anti-spyware scanning • Three system scan modes (Quick, Flash, Full) • Malicious website blocking • File execution blocking • Malwarebytes Chameleon technology • Delete-on-reboot option Anti-malware Features • Protection against operating system security bypasses • Memory caller protection • Application behavior protection • Application hardening Anti-exploit Features • Scalable endpoint management with push install functionality • Flexible scan scheduling • Threat view with central reporting • Virtual deployment simulator • Active Directory integration Management Console Malwarebytes protects consumers and businesses against dangerous threats such as malware, ransomware, and exploits that escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware, the company’s flagship product, has a highly advanced heuristic detection engine that removed more than five billion malicious threats from computers worldwide. More than 10,000 SMBs and enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, the company is headquartered in California with offices in Europe, and a global team of researchers and experts. malwarebytes.com/business corporate-sales@malwarebytes.com 1.800.520.2796 Copyright © 2016, Malwarebytes. All rights reserved. Malwarebytes and the Malwarebytes logo are trademarks of Malwarebytes. Other marks and brands may be claimed as the property of others. All descriptions and specifications herein are subject to change without notice and are provided without warranty of any kind. Features • Dedicated real-time detection and blocking engine • Proprietary ransomware behavioral technology • Signature-less identification of unknown (zero-hour) ransomware • Small system footprint • Compatible with third-party security solutions Anti-ransomware