Latest Research


This content is currently locked.

Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
1-888-670-8889 (US/CAN) or
+1-519-432-3550 (International)
ThreatDown
9.0 /10

What is ThreatDown?

Industry-proven through award-winning protection, ThreatDown powered by Malwarebytes (Formerly Malwarebytes Endpoint Detection and Response) stops attacks against workstations and servers with security that catches what other solutions miss. ThreatDown provides organizations complete, integrated protection through a single, lightweight agent that is incredibly fast to install and easy to manage.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

ThreatDown won the following awards in the Endpoint Protection category

Filter By

ThreatDown Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on ThreatDown.

92 Likeliness to Recommend

99 Plan to Renew

85 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

+92 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love ThreatDown?

1% Negative
3% Neutral
96% Positive

Pros

  • Security Protects
  • Respectful
  • Fair
  • Reliable

Feature Ratings

Average 85

Dynamic Malware Detection

89

Endpoint Detection and Response

88

Flexible Deployment Options

86

Centralized Management Portal

86

Ransomware Recovery and Removal

85

System Hardening

85

Application Containment Mechanisms

85

Cross Platform Support

84

Port and Device Control

84

Cross Platform Integration

84

Automated Remediation

84

Vendor Capability Ratings

Average 84

Ease of Implementation

88

Usability and Intuitiveness

86

Quality of Features

86

Ease of IT Administration

86

Vendor Support

84

Business Value Created

84

Ease of Data Integration

84

Product Strategy and Rate of Improvement

84

Breadth of Features

83

Availability and Quality of Training

81

Ease of Customization

79

ThreatDown Screenshots

ThreatDown Downloads

ThreatDown Reviews

  • Role: Information Technology
  • Industry: Other
  • Involvement: IT Leader or Manager
Validated Review
Anonymous Reviewer

Submitted Mar 2020

Great protection, but a bit heavy on the computers

Likeliness to Recommend

10 /10

Pros

  • Continually Improving Product
  • Reliable
  • Performance Enhancing
  • Enables Productivity
  • Role: Information Technology
  • Industry: Government
  • Involvement: Business Leader or Manager
Validated Review
Anonymous Reviewer

Submitted Mar 2020

It does what is advertised on the tin

Likeliness to Recommend

9 /10

Pros

  • Generous Negotitation
  • Over Delivered
  • Helps Innovate
  • Inspires Innovation

Kevin B.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: Business Leader or Manager
Validated Review
Verified Reviewer

Submitted Feb 2020

Enterprise Product from a Go To Vendor

Likeliness to Recommend

10 /10

What differentiates ThreatDown from other similar products?

Everyone users Malwarebytes for personal Malware removal. This is because they are the best, and now they have an enterprise product.

What is your favorite aspect of this product?

Cloud-Based management

What do you dislike most about this product?

New features added weekly. This may mean their growing, which may mean they are playing catch up to other vendors but I'm unsure.

What recommendations would you give to someone considering this product?

It's a new product that is getting better and better.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Enables Productivity

Most Popular ThreatDown Comparisons

  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Kaspersky Endpoint Security for Business Logo

    Kaspersky Endpoint Security for Business

    Compare
  • Microsoft Defender for Endpoint Logo

    Microsoft Defender for Endpoint

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare
  • Sophos Intercept X Endpoint Logo

    Sophos Intercept X Endpoint

    Compare
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019