Latest Research


This content is currently locked.

Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
1-888-670-8889 (US/CAN) or
+1-519-432-3550 (International)
ThreatDown Logo Award Winner Product Badge
ThreatDown Logo Award Winner Product Badge
Malwarebytes

ThreatDown

9.0 /10
Category
ThreatDown
9.0 /10

What is ThreatDown?

Industry-proven through award-winning protection, ThreatDown powered by Malwarebytes (Formerly Malwarebytes Endpoint Detection and Response) stops attacks against workstations and servers with security that catches what other solutions miss. ThreatDown provides organizations complete, integrated protection through a single, lightweight agent that is incredibly fast to install and easy to manage.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

ThreatDown won the following awards in the Endpoint Detection & Response category

Filter By

ThreatDown Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on ThreatDown.

91 Likeliness to Recommend

100 Plan to Renew

88 Satisfaction of Cost Relative to Value

2
Since last award


{y}
{name}

Emotional Footprint Overview

+96 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love ThreatDown?

0% Negative
2% Neutral
98% Positive

Pros

  • Reliable
  • Effective Service
  • Saves Time
  • Respectful

Feature Ratings

Average 88

Whitelisting Blacklisting

90

Task Prioritization

89

Continuous Monitoring

89

Intrusion Detection Prevention

88

Malware Identification Accuracy

87

Behavioural Analytics

86

Automated Threat Response

86

Machine Learning

85

Agent Efficiency

85

IOC Consumption

83

IOC Tools

83

Vendor Capability Ratings

Average 84

Business Value Created

87

Ease of Data Integration

86

Ease of IT Administration

85

Ease of Implementation

85

Product Strategy and Rate of Improvement

85

Quality of Features

84

Usability and Intuitiveness

83

Breadth of Features

83

Availability and Quality of Training

83

Vendor Support

81

Ease of Customization

81

ThreatDown Screenshots

ThreatDown Downloads

ThreatDown Reviews

Abhijit S.

  • Role: Information Technology
  • Industry: Other
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Apr 2024

Amazing item

Likeliness to Recommend

10 /10

What differentiates ThreatDown from other similar products?

Both efficacy and ease of implementation

What is your favorite aspect of this product?

extremely powerful against malware

What do you dislike most about this product?

Not in a true sense. The product is good.

What recommendations would you give to someone considering this product?

It is not necessary to engage a consultant. Very simple to put into practice.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Sonali P.

  • Role: Information Technology
  • Industry: Other
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Apr 2024

Malwarebytes just rock antimalware industry.

Likeliness to Recommend

8 /10

What differentiates ThreatDown from other similar products?

EDR features and the way it shows the details on detected viruses.

What is your favorite aspect of this product?

Endpoint detect and response & not much user intervention is required.

What do you dislike most about this product?

Pretty much all good to me.

What recommendations would you give to someone considering this product?

keep improving and adding new features.

Pros

  • Helps Innovate
  • Fair
  • Continually Improving Product
  • Reliable

Dustin S.

  • Role: Information Technology
  • Industry: Consulting
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Apr 2024

Fortifying Security with Proactive Monitoring

Likeliness to Recommend

8 /10

What differentiates ThreatDown from other similar products?

The software has a robust endpoint detection and response capabilities. It continuously monitors and analyzes system activities, network connections, and user behaviors for signs of malicious activity. This comprehensive visibility is essential for proactively identifying and addressing potential security risks.

What is your favorite aspect of this product?

Malwarebytes EDR's primary strength is its seamless integration with network monitoring tools. This integration enables infrastructure specialists to correlate security events with broader infrastructure performance data, providing a more holistic view of the organization's security posture. This approach allows for more informed decision-making and efficient incident response.

What do you dislike most about this product?

It relies on agent-based deployment at individual endpoints, which can pose challenges for managing and maintaining agents in large or complex infrastructure environments.

What recommendations would you give to someone considering this product?

Malwarebytes EDR provides robust endpoint monitoring capabilities and integrates with network monitoring tools to enhance the overall resilience of the organization's infrastructure. Infrastructure specialists can leverage Malwarebytes EDR to improve threat detection, streamline incident response, and ensure the continued availability and integrity of critical systems and data, ultimately safeguarding the organization's operations and reputation.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Most Popular ThreatDown Comparisons

  • Crowdstrike Falcon Platform Logo

    Crowdstrike Falcon Platform

    Compare
  • Sophos Intercept X Endpoint Logo

    Sophos Intercept X Endpoint

    Compare
  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Microsoft Defender for Endpoint Logo

    Microsoft Defender for Endpoint

    Compare
  • SentinelOne Singularity XDR Logo

    SentinelOne Singularity XDR

    Compare
  • Trend Micro Vision One Logo

    Trend Micro Vision One

    Compare
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019