Endpoint Security

Combines multiple layers of advanced threat defense into one endpoint protection platform.

Break the attack chain

Malwarebytes Endpoint Security brings all of our industry-leading protection and remediation technologies into one powerful solution. This multi-layer defense model breaks the attack chain by combining advanced malware detection and remediation, malicious website blocking, ransomware blocking, and exploit protection in a single platform.

Delivering multi-stage attack protection provides companies of all sizes, across all industries, around the globe the ability to stop an attacker at every step.

Advantages

Malwarebytes Endpoint Security blocks zero-hour malware and ransomware

Blocks zero-hour malware and ransomware

Reduces the chance of data loss and saves on IT resources by protecting against zero-hour malware and ransomware that traditional security solutions miss.

Malwarebytes Endpoint Security removes all traces of malware

Removes all traces of malware

With the management console feature, you can deploy and configure endpoints as well as manage policies by user group.

Malwarebytes Endpoint Security frees up IT resources

Frees up IT resources

Maintains productivity by preserving system uptime and reducing the need for reimaging. Reduces the burden on the IT department.

Malwarebytes Endpoint Security stops malicious websites

Stops malicious websites

Prevents access to known malicious IP addresses so that end users are proactively protected from downloading malware, hacking attempts, redirects to malicious websites, and malvertising.

Malwarebytes Endpoint Security comprehensive reporting

Comprehensive reporting

Identifies vulnerable endpoints and aggregates endpoint reporting. Includes XML logging in machine- and human-readable formats for robust analysis.

Malwarebytes Endpoint Security scalable threat prevention

Scalable threat prevention

Deploys protection for every endpoint as your company grows. Streamlines deployment via the patented virtual deployment simulator.

Malwarebytes Endpoint Security closes Apple security gap

Closes Apple security gap

Removes malware and adware quickly from Mac endpoints with a separate remediation-only client. Cleans OS X systems in less than a minute from start to finish. Separate GUI and command line programs enable flexible deployment using popular Mac management solutions.

Core technologies

Malwarebytes Endpoint Security core technologies

Anti-malware features

  • Proactive anti-malware scanning engine
  • Small system footprint
  • Malicious website blocking
  • Three scan modes
  • Compatible with legacy security solutions
  • Separate remediation-only client for Mac

Anti-exploit features

  • Anti-exploit technology shields vulnerable applications and browsers
  • Four different layers of protection across stages of an attack
  • Extremely light 3 MB footprint, no signature database
  • Compatible with all anti-malware and antivirus products
  • Customizable protection for third-party or custom apps

Anti-ransomware features

  • Dedicated real-time detection and blocking engine
  • Proprietary ransomware behavioral technology
  • Signature-less identification of unknown (zero-hour) ransomware
  • Small system footprint
  • Compatible with third-party security solutions

Management Console features

Centralized management

  • Multiple client management (up to thousands from a single console)
  • Push install functionality
  • Comprehensive policies for different groups
  • Active Directory integration and synchronization
  • Virtual deployment simulator
  • Email notifications

Don't take our word for it

"We could probably measure the hours saved with Malwarebytes in the thousands. Being able to tell Malwarebytes to find, remove, or quarantine a problem is huge for us."

Davin Garcia
Director of Information Security
Gilbane

CASE STUDY

"The problems–and complaints–just went away. We have far less after-the-fact remediation, we haven't had any ransomware incidents, and I haven't touched Malwarebytes since deployment."

Gareth Edwards
Technical Lead, Information Services
University of Central Lancashire

CASE STUDY

Tech specs

Malwarebytes Endpoint Security includes anti-malware and anti-exploit technologies managed by the Management Console, along with our unmanaged Mac remediation and anti-ransomware technologies. Each has individual specs.

Languages Available
English

Hardware Requirements
CPU: 2 GHz (dual-core 2.6 GHZ or higher recommended)
RAM: 2 GB (4 GB recommended)
Disk space: 10 GB (20 GB recommended)
Screen resolution: 1024x768 or higher
Active internet connection for database updates, product updates and registration

Software
Microsoft Internet Explorer 6 (or newer), Firefox, Chrome or Opera browser .NET Framework 3.5

Supported Operating Systems
Windows Server 2016 (64-bit)
Windows Server 2012 R2 (64-bit)
Windows Server 2012 (64-bit)
Windows Small Business Server 2011
Windows Server 2008 (32/64-bit)
Windows Server 2008 R2 (32/64-bit)

Please note that Windows servers using the Server Core installation process are specifically excluded

Supported Microsoft SQL Servers
SQL Express 2008 (shipped with product, subject to review, 10 GB maximum database size limitation)
SQL Server 2008
SQL Server 2012
SQL Server 2014
SQL Server 2016

Please note that Windows servers using the Server Core installation process are specifically excluded.

Languages Available
English, Bosnian, Bulgarian, Catalan, Chinese Simplified, Chinese Traditional, Croatian, Czech, Danish, Dutch, Estonian, Finnish, French, German, Greek, Hebrew, Hungarian, Italian, Latvian, Lithuanian, Macedonian, Norwegian, Polish, Portuguese (Brazil), Portuguese (Portugal), Romanian, Russian, Serbian, Slovak, Slovenian, Spanish, Swedish, Thai, Turkish, Vietnamese.

Software
Microsoft Internet Explorer 6 (or newer), Firefox, Chrome or Opera browser

Hardware Requirements
256MB of RAM (512MB or more recommended)
800MHz CPU or faster
20MB of free hard disk space
800x600 or greater screen resolution
Active Internet Connection, for license validation and threat signature updates
USB Port (optional, depending on deployment method)

Supported Operating Systems
Windows 10 ® (32-bit, 64-bit)
Windows 8.1 ® (32-bit, 64-bit)
Windows 8 ® (32-bit, 64-bit)
Windows 7 ® (32-bit, 64-bit)
Windows Vista ® (32-bit, 64-bit)
Windows XP ® (Service Pack 3 or later) (32-bit only)
Windows Server 2016 (64-bit)
Windows Server 2012 R2 ® (32-bit, 64-bit)
Windows Server 2012 ® (32-bit, 64-bit)
Windows Small Business Server 2011
Windows Server 2008 R2 ® (32-bit, 64-bit)
Windows Server 2008 ® (32-bit, 64-bit)
Windows Server 2003 ® (32-bit only)

Please note that Windows servers using the Server Core installation process are specifically excluded.

Additional Requirements for Managed Mode
Windows Installer 4.0 (Windows XP only, already included in other Windows versions)
.NET Framework 3.5 (Windows XP, Windows 8.0/8.1, Windows 10)
.NET Framework 4.0 (Windows Vista, Windows 7, Windows 8)

Languages Available
English

Hardware Requirements
CPU: 800MHz CPU
RAM: 1024 MB (512 MB or more recommended)
Disk space: 10 MB
Screen resolution: 800x600 or greater updates

Supported Operating Systems
Windows 10® (32-bit, 64-bit)
Windows 8.1® (32-bit, 64-bit)
Windows 8® (32-bit, 64-bit)
Windows 7® (32-bit, 64-bit)
Windows Vista® (32-bit, 64-bit)
Windows XP® (32-bit, 64-bit, Service Pack 3 or later)
Windows Server 2008® (32-bit, 64-bit)
Windows Server 2008® R2 (32-bit, 64-bit)
Windows Small Business Server 2011
Windows Server 2012® (64-bit)
Windows Server 2012® R2 (64-bit)
Windows Server 2016 (64-bit)

Additional Requirements for Managed Mode
Windows Installer 4.0 (Windows XP only, already included in other Windows versions)
.NET Framework 3.5 (Windows XP, Windows 8.0/8.1, Windows 10)
.NET Framework 4.0 (Windows Vista, Windows 7, Windows 8)

Languages Available
English

Hardware Requirements
Any Apple Mac device that supports Mac OS X version 10.8 or later
Active Internet connection updates

Supported Operating Systems
Mac OS X version 10.8 or later

Security & Privacy
Allow apps to be downloaded from the Mac App Store and identified developers (the most restrictive setting)

Languages Available
English

Hardware Requirements
CPU: 800 Mhz
RAM: 1024 MB
Disk space: 100 MB
Screen resolution: 800x600 or greater
Active Internet connection for product updates and registration

Software
Microsoft Internet Explorer 6 (or newer), Firefox, Chrome, or Opera browser

Supported Operating Systems

Security & Privacy
Windows 10 (32-bit, 64-bit)
Windows 8.1 (32-bit, 64-bit)
Windows 8 (32-bit, 64-bit)
Windows 7 (32-bit, 64-bit)