91制片厂

Latest 91制片厂


This content is currently locked.

Your current 91制片厂 subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
1-888-670-8889 (US/CAN) or
+1-703-340-1171 (International)
ThreatDown EDR Logo Award Winner Product Badge
ThreatDown EDR Logo Award Winner Product Badge
Malwarebytes

ThreatDown EDR

Composite Score
9.1 /10
CX Score
9.4 /10
Category
ThreatDown EDR
9.1 /10

What is ThreatDown EDR?

ThreatDown EDR (endpoint detection and response) is enriched by Malwarebytes global threat intelligence and its patented remediation engine that removes every trace of malware to prevent reinfection. Seven-day ransomware rollback ensures organizations can turn the clock back on attacks and restore systems.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

ThreatDown EDR won the following awards in the Endpoint Detection & Response category

Filter By

ThreatDown EDR Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on ThreatDown EDR.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

90 Likeliness to Recommend

1
Since last award

100 Plan to Renew

89 Satisfaction of Cost Relative to Value

1
Since last award


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+97 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love ThreatDown EDR?

1% Negative
1% Neutral
98% Positive

Pros

  • Reliable
  • Saves Time
  • Respectful
  • Security Protects

Feature Ratings

Average 87

Whitelisting Blacklisting

90

Continuous Monitoring

88

Task Prioritization

88

Intrusion Detection Prevention

88

Malware Identification Accuracy

86

Behavioural Analytics

86

IOC Tools

86

Agent Efficiency

86

Automated Threat Response

86

Machine Learning

86

IOC Consumption

85

Vendor Capability Ratings

Average 85

Product Strategy and Rate of Improvement

87

Business Value Created

86

Availability and Quality of Training

85

Ease of IT Administration

85

Ease of Data Integration

85

Breadth of Features

84

Quality of Features

84

Ease of Implementation

84

Vendor Support

83

Ease of Customization

83

Usability and Intuitiveness

83

ThreatDown EDR Screenshots

ThreatDown EDR Downloads

ThreatDown EDR Reviews

Roxanne D.

  • Role: Student Academic
  • Industry: Education
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Apr 2025

Analyzing Threat Down EDR鈥檚 Strengths.

Likeliness to Recommend

10 /10

What differentiates ThreatDown EDR from other similar products?

ThreatDown EDR supports integration into the existing security frameworks, which contribute to increasing the platform鈥檚 practicality. In terms of features, the product expended flexibility lets security teams implement it in the most convenient way for them while providing more effective protection than other analogues.

What is your favorite aspect of this product?

ThreatDown EDR forms a distinct identity due to its abilities in real-time threat detection and automated response mechanism. Using more complex algorithms and behavioral analysis, it succeeds in detecting insecure events and threats and provide organizations with early redress to reduce damages within cyber attacks.

What do you dislike most about this product?

There is a number of negative aspects regarding ThreatDown EDR, and one that stands out is the product鈥檚 strong dependence on the internet connection to work effectively. In such an environment, the product might not detect threats in real-time and thus, leave an organization exposed during abrupt instability of a network.

What recommendations would you give to someone considering this product?

For organizations considering ThreatDown EDR, it is essential to assess their specific security needs and infrastructure compatibility. Conducting a thorough evaluation of existing systems will ensure seamless integration and maximize the product's effectiveness in enhancing endpoint protection.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Astrid O.

  • Role: Finance
  • Industry: Banking
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Apr 2025

Secure Guardian: Digital Defense Protection

Likeliness to Recommend

8 /10

What differentiates ThreatDown EDR from other similar products?

ThreatDown EDR shows its unique strength by joining multiple endpoint events into complete attack visualizations, which makes it easier to spot advanced threats that hunting single activities would miss. The product's memory scanning feature finds threats that exist solely in random access memory (RAM). Its advanced protection works better than other security tools that cannot find these types of attacks.

What is your favorite aspect of this product?

The cloud system shows endpoint protection throughout our whole banking network from any location. Retrospective security analysis is one of ThreatDown's most important features because it scans activities that were already approved when new threat data becomes available. The software protects our banking operations by working with no performance impact, so essential banking applications continue to deliver excellent customer service.

What do you dislike most about this product?

Our team struggles with the powerful custom rules, since the platform does not show if they become too broad or result in false alerting inside our network.

What recommendations would you give to someone considering this product?

Manual system checks across separate networks became necessary to find endpoint problems before systems got deployed. The platform constantly tracks user actions to notify us about possible threats right when they appear before harm can be done. A ThreatDown system discovered suspicious PowerShell entries running on a finance workstation while performing its monitoring task. These PowerShell sequences held legitimate descriptions but formed stealthy computer survival tools.

Pros

  • Helps Innovate
  • Reliable
  • Enables Productivity
  • Unique Features

Larry H.

  • Role: Information Technology
  • Industry: Engineering
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Jan 2025

"Easy to use!"

Likeliness to Recommend

10 /10

What differentiates ThreatDown EDR from other similar products?

Automatically restores encrypted, deleted, or modified files up to seven days after a ransomware attack.

What is your favorite aspect of this product?

Covers malware, ransomware, phishing, and advanced persistent threats (APTs), providing peace of mind for developers and businesses alike.

What do you dislike most about this product?

Developers or security teams needing highly tailored threat detection or response workflows may find the platform limiting.

What recommendations would you give to someone considering this product?

For teams working on critical projects, the rollback feature can be a game-changer in minimizing downtime and data loss.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Most Popular ThreatDown EDR Comparisons

Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171