ThreatDown EDR
9.0 /10

What is ThreatDown EDR?

ThreatDown EDR (endpoint detection and response) is enriched by Malwarebytes global threat intelligence and its patented remediation engine that removes every trace of malware to prevent reinfection. Seven-day ransomware rollback ensures organizations can turn the clock back on attacks and restore systems.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

ThreatDown EDR won the following awards in the Endpoint Protection category

Filter By

ThreatDown EDR Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on ThreatDown EDR.

92 Likeliness to Recommend

99 Plan to Renew

85 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

+93 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love ThreatDown EDR?

1% Negative
3% Neutral
96% Positive

Pros

  • Security Protects
  • Respectful
  • Fair
  • Reliable

Feature Ratings

Average 85

Dynamic Malware Detection

88

Endpoint Detection and Response

88

Centralized Management Portal

86

Flexible Deployment Options

86

Ransomware Recovery and Removal

85

System Hardening

85

Application Containment Mechanisms

85

Cross Platform Support

84

Automated Remediation

84

Port and Device Control

84

Cross Platform Integration

83

Vendor Capability Ratings

Average 84

Ease of Implementation

88

Usability and Intuitiveness

86

Quality of Features

86

Ease of IT Administration

85

Vendor Support

84

Business Value Created

84

Product Strategy and Rate of Improvement

84

Ease of Data Integration

84

Breadth of Features

83

Availability and Quality of Training

81

Ease of Customization

79

ThreatDown EDR Reviews

  • Role: Information Technology
  • Industry: Other
  • Involvement: End User of Application
Validated Review
Anonymous Reviewer

Submitted Aug 2021

It is a reliable company, and an excellent product

Likeliness to Recommend

10 /10

Pros

  • Fair
  • Friendly Negotiation
  • Helps Innovate
  • Continually Improving Product

Caroline L.

  • Role: Vendor Management
  • Industry: Other
  • Involvement: IT Leader or Manager
Validated Review
Verified Reviewer

Submitted Aug 2021

Great product

Likeliness to Recommend

8 /10

What differentiates ThreatDown EDR from other similar products?

Ease of use and deployment

What is your favorite aspect of this product?

The software runs on autopilot and does its job

What do you dislike most about this product?

No major complaint about this product

What recommendations would you give to someone considering this product?

Go ahead and try it out

Pros

  • Efficient Service
  • Caring
  • Respectful
  • Fair

Chris C.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Aug 2021

Simple clean UI and great Protection.

Likeliness to Recommend

8 /10

What differentiates ThreatDown EDR from other similar products?

The Technical service team has been so easy to work with. They are a breath of fresh air compared to some vendor technical support.

What is your favorite aspect of this product?

It helps me sleep at night knowing our network is safe. It is very reliable and robust. we have had it for years and we are keeping it so its doing something right!

What do you dislike most about this product?

Uninstalling Malwarebytes can be a chore. it requires some tools and even then some!

What recommendations would you give to someone considering this product?

Go for it, it is simple to use with easy implementation. you really cant go wrong

Pros

  • Reliable
  • Effective Service
  • Respectful
  • Security Protects

Most Popular ThreatDown EDR Comparisons

  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Symantec Endpoint Security Logo

    Symantec Endpoint Security

    Compare
  • Microsoft Defender for Endpoint Logo

    Microsoft Defender for Endpoint

    Compare
  • Sophos Intercept X Endpoint Logo

    Sophos Intercept X Endpoint

    Compare
  • Avast Business Security Logo

    Avast Business Security

    Compare
  • Acronis Cyber Protect Cloud Logo

    Acronis Cyber Protect Cloud

    Compare