ThreatDown EDR Logo
ThreatDown EDR Logo
Malwarebytes

ThreatDown EDR

9.0 /10
Category
ThreatDown EDR
9.0 /10

What is ThreatDown EDR?

ThreatDown EDR (endpoint detection and response) is enriched by Malwarebytes global threat intelligence and its patented remediation engine that removes every trace of malware to prevent reinfection. Seven-day ransomware rollback ensures organizations can turn the clock back on attacks and restore systems.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

ThreatDown EDR won the following awards in the Endpoint Protection - Enterprise category

Filter By

ThreatDown EDR Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on ThreatDown EDR.

92 Likeliness to Recommend

99 Plan to Renew

85 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

+93 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love ThreatDown EDR?

1% Negative
3% Neutral
96% Positive

Pros

  • Security Protects
  • Fair
  • Respectful
  • Reliable

Feature Ratings

Average 85

Vendor Capability Ratings

Average 84

ThreatDown EDR Reviews

Prathamesh M.

  • Role: Information Technology
  • Industry: Retail
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Oct 2021

Great product to detect malware

Likeliness to Recommend

10 /10

What differentiates ThreatDown EDR from other similar products?

Malwarebytes endpoint detection stands out as great tool when considering intrusion detection and malware quarantine. It has better performance compared to its competitors McAfee and AVG. Its price is lower than the other two products. It provides many intrusion detection functionalities and malware protection. Quarantines threat always and provides notification indicating threat status. Installation is easy and price is very affordable at the given point. It monitors all web activities and PUP alerts to notify the admins about any intrusion attack. Overall, it is useful product compared to competitors.

What is your favorite aspect of this product?

The features are my favorite aspect. The most important is malware and spyware quarantine which helps prevents intrusions and reboot. This feature lets the user decide on malware termination procedure. It also helps us to detect and reroute the intrusion to its source so it can be blocked and reported. The second feature that I like is the notification process, high level notification and intrusion detection. Followed by quarantine and termination. Third feature I like is version control and updates, sync and integration over all systems

What do you dislike most about this product?

I dislike the version updates and bugs that usually happen with version updates. The version updates lead to sync issues and fixing the issue takes quite some time to understand the point of defect and built an integrated solution. The version control is hard to detect. Bug logs are sloppy and hard to reroute and quarantine. The reboot is time consuming and requires a lot of time.

What recommendations would you give to someone considering this product?

The product is highly recommended to users in organizations where intrusion attacks are common. This product is great in detecting intrusion and bug quarantine leading to solution to malware and spyware termination. It has reasonable price tag, which is good return on value. The product is a comprehensive product for malware and spyware detection and deletion.

Pros

  • Reliable
  • Performance Enhancing
  • Enables Productivity
  • Trustworthy

Jason L.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Sep 2021

Great product. Would love a portable version.

Likeliness to Recommend

9 /10

What differentiates ThreatDown EDR from other similar products?

Rootkit detection has been great since the beginning. We use it mostly for virus remediation for clients and would love a portable version. The product has been GREAT with catching and fixing systems.

What is your favorite aspect of this product?

Clean up has been the best part of this product

What do you dislike most about this product?

I dont like that you have to install and then connect to the internet to get new definitions. I would like to be able to deploy a portable version from an admin console to use on the fly.

What recommendations would you give to someone considering this product?

This product is great at any level. Home or business and will be useful throughout the life of any machine that it is installed.

Pros

  • Continually Improving Product
  • Reliable
  • Performance Enhancing
  • Enables Productivity

Nick H.

  • Role: Information Technology
  • Industry: Manufacturing
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Sep 2021

Easy to deploy and manage with the cloud

Likeliness to Recommend

10 /10

What differentiates ThreatDown EDR from other similar products?

Ease of Use

What is your favorite aspect of this product?

Cloud management and Ransomeware roll back

What do you dislike most about this product?

No indication if a machine stops responding, it just goes dark and says it cant be reached.

What recommendations would you give to someone considering this product?

Login daily to the cloud dashboard and keep an eye on everything.

Pros

  • Continually Improving Product
  • Efficient Service
  • Security Protects
  • Helps Innovate

Cons

  • Less Generous

Most Popular ThreatDown EDR Comparisons

  • Microsoft Defender for Endpoint Logo

    Microsoft Defender for Endpoint

    Compare
  • Sophos Intercept X Endpoint Logo

    Sophos Intercept X Endpoint

    Compare
  • ESET Endpoint Security Logo

    ESET Endpoint Security

    Compare
  • Webroot Business Endpoint Protection Logo

    Webroot Business Endpoint Protection

    Compare
  • Crowdstrike Falcon Platform Logo

    Crowdstrike Falcon Platform

    Compare
  • Trend Micro Apex One Logo

    Trend Micro Apex One

    Compare