
What is ThreatDown EDR?
ThreatDown EDR (endpoint detection and response) is enriched by Malwarebytes global threat intelligence and its patented remediation engine that removes every trace of malware to prevent reinfection. Seven-day ransomware rollback ensures organizations can turn the clock back on attacks and restore systems.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceThreatDown EDR Ratings
Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard
to access more information on ThreatDown EDR.
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
90 Likeliness to Recommend
1
Since last award
100 Plan to Renew
89 Satisfaction of Cost Relative to Value
1
Since last award
Emotional Footprint Overview
Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.
+96 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love ThreatDown EDR?
Pros
- Reliable
- Saves Time
- Respectful
- Security Protects
How to read the Emotional Footprint
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Negative
Neutral
Positive
Feature Ratings
Whitelisting Blacklisting
Continuous Monitoring
Task Prioritization
Intrusion Detection Prevention
Automated Threat Response
Malware Identification Accuracy
Behavioural Analytics
Agent Efficiency
Machine Learning
IOC Tools
IOC Consumption
Vendor Capability Ratings
Product Strategy and Rate of Improvement
Ease of Data Integration
Business Value Created
Ease of IT Administration
Availability and Quality of Training
Quality of Features
Breadth of Features
Ease of Implementation
Vendor Support
Usability and Intuitiveness
Ease of Customization
Also Featured in...
ThreatDown EDR Screenshots
ThreatDown EDR Downloads
Malwarebytes Nebula dashboard

Malwarebytes Cloud Security Module

Suspicious Activity monitoring

Malwarebytes OneView MSP security platform

Malwarebytes OneView ease of use

ThreatDown EDR Reviews

Astrid O.
- Role: Finance
- Industry: Banking
- Involvement: End User of Application
Submitted Apr 2025
Secure Guardian: Digital Defense Protection
Likeliness to Recommend
What differentiates ThreatDown EDR from other similar products?
ThreatDown EDR shows its unique strength by joining multiple endpoint events into complete attack visualizations, which makes it easier to spot advanced threats that hunting single activities would miss. The product's memory scanning feature finds threats that exist solely in random access memory (RAM). Its advanced protection works better than other security tools that cannot find these types of attacks.
What is your favorite aspect of this product?
The cloud system shows endpoint protection throughout our whole banking network from any location. Retrospective security analysis is one of ThreatDown's most important features because it scans activities that were already approved when new threat data becomes available. The software protects our banking operations by working with no performance impact, so essential banking applications continue to deliver excellent customer service.
What do you dislike most about this product?
Our team struggles with the powerful custom rules, since the platform does not show if they become too broad or result in false alerting inside our network.
What recommendations would you give to someone considering this product?
Manual system checks across separate networks became necessary to find endpoint problems before systems got deployed. The platform constantly tracks user actions to notify us about possible threats right when they appear before harm can be done. A ThreatDown system discovered suspicious PowerShell entries running on a finance workstation while performing its monitoring task. These PowerShell sequences held legitimate descriptions but formed stealthy computer survival tools.
Pros
- Helps Innovate
- Reliable
- Enables Productivity
- Unique Features
Larry H.
- Role: Information Technology
- Industry: Engineering
- Involvement: End User of Application
Submitted Jan 2025
"Easy to use!"
Likeliness to Recommend
What differentiates ThreatDown EDR from other similar products?
Automatically restores encrypted, deleted, or modified files up to seven days after a ransomware attack.
What is your favorite aspect of this product?
Covers malware, ransomware, phishing, and advanced persistent threats (APTs), providing peace of mind for developers and businesses alike.
What do you dislike most about this product?
Developers or security teams needing highly tailored threat detection or response workflows may find the platform limiting.
What recommendations would you give to someone considering this product?
For teams working on critical projects, the rollback feature can be a game-changer in minimizing downtime and data loss.
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Performance Enhancing

Shahzad M.
- Role: Vendor Management
- Industry: Technology
- Involvement: Vendor Management and Renewal
Submitted Nov 2024
Feature-rich, effective, but needs AI driven
Likeliness to Recommend
What differentiates ThreatDown EDR from other similar products?
ThreatDown EDR differentiates itself with its real-time response speed, lightweight agent, and advanced threat analytics tailored for modern attack vectors.
What is your favorite aspect of this product?
Its seamless integration with existing security ecosystems.
What do you dislike most about this product?
Limited AI-driven proactive threat hunting capabilities.
What recommendations would you give to someone considering this product?
Evaluate its compatibility with your existing tools and consider additional threat-hunting needs.
Pros
- Respectful
- Helps Innovate
- Enables Productivity
- Unique Features