What Is Malwarebytes Endpoint Protection?

Malwarebytes Endpoint Protection provides complete malware protection and remediation with precise threat detection, proactive threat blocking, and thorough remediation, driven from the cloud and easy to use for organizations of all sizes.

Who Uses Malwarebytes Endpoint Protection?

Complete threat protection and remediation solution, centrally managed from the cloud for organizations of all sizes.

Malwarebytes Endpoint Protection Details

Malwarebytes

Founded in 2006

Malwarebytes Endpoint Protection pricing

Starting Price:

US$49.00/year
  • Yes, has free trial
  • No free version

Malwarebytes Endpoint Protection does not have a free version but does offer a free trial. Malwarebytes Endpoint Protection paid version starts at US$49.00/year.

Pricing plans get a free trial

Malwarebytes Endpoint Protection Details

Malwarebytes

Founded in 2006

Malwarebytes Endpoint Protection videos and images

Not provided by vendor

Malwarebytes Endpoint Protection deployment and support

Support

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support

Deployment

  • Cloud, SaaS, Web-based
  • Mac (Desktop)
  • Windows (Desktop)
  • Windows (On-Premise)
  • Linux (On-Premise)
  • Android (Mobile)
  • iPhone (Mobile)
  • iPad (Mobile)

Training

  • Videos

Features of Malwarebytes Endpoint Protection

  • API
  • Access Control
  • Access Controls/Permissions
  • Active Directory Integration
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Anti Spam
  • Anti Virus
  • Application Security
  • Audit Management
  • Audit Trail
  • Authentication
  • Best Practices Repository
  • Compliance Management
  • Data Security
  • Data Visualisation
  • Endpoint Protection Software
  • Event Logs
  • Event Tracking
  • Financial Data Protection
  • HIPAA Compliant
  • Incident Management
  • Maintenance Scheduling
  • Monitoring
  • Network Security Software
  • Password Management
  • Patch Management
  • Policy Management
  • Privileged Account Management
  • Real Time Monitoring
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Two-Factor Authentication
  • User Management
  • Virus Definition Update
  • Vulnerability Protection
  • Vulnerability Scanning

View full list of Computer Security Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Anti Spam
  • Anti Virus
  • Audit Trail
  • Automatic Backup
  • Backup and Recovery
  • Compliance Management
  • Compliance Tracking
  • Compression
  • Configurable Workflow
  • Configuration Management
  • Data Recovery
  • Data Replication
  • Data Storage Management
  • Data Synchronisation
  • Disaster Recovery
  • File Management
  • File Transfer
  • HIPAA Compliant
  • Incident Management
  • Issue Management
  • Monitoring
  • Multiple Data Sources
  • Policy Management
  • Real Time Analytics
  • Real Time Monitoring
  • Real Time Notifications
  • Remote Access/Control
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Scheduling
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Sensitive Data Identification
  • Status Tracking
  • Task Scheduling
  • Third Party Integrations
  • User Management
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting/Blacklisting
  • Workflow Management

View full list of Data Loss Prevention Software

  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Behavioural Analytics
  • Continuous Monitoring
  • Endpoint Management
  • Event Analysis
  • Prioritisation
  • Remediation Management
  • Root Cause Analysis
  • Whitelisting/Blacklisting

View full list of Endpoint Detection and Response Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Application Security
  • Behavioural Analytics
  • Compliance Management
  • Customisable Reports
  • Data Visualisation
  • Device Management
  • Encryption
  • Event Logs
  • HIPAA Compliant
  • Incident Management
  • Monitoring
  • Patch Management
  • Policy Management
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting/Analytics
  • Risk Analytics
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Summary Reports
  • Third Party Integrations
  • Threat Response
  • Two-Factor Authentication
  • User Management
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting

View full list of Endpoint Protection Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Audit Management
  • Audit Trail
  • Capacity Management
  • Change Management
  • Chat/Messaging
  • Compliance Management
  • Configurable Workflow
  • Configuration Management
  • Customisable Branding
  • Customisable Reports
  • Dashboard
  • Data Import/Export
  • Data Visualisation
  • Event Logs
  • IT Asset Tracking
  • IT Reporting
  • Incident Management
  • Inventory Management
  • Issue Auditing
  • Knowledge Management
  • License Management
  • Maintenance Scheduling
  • Monitoring
  • Patch Management
  • Performance Metrics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Real-time Updates
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • SSL Security
  • Self Service Portal
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Single Sign On
  • Task Management
  • Third Party Integrations
  • Ticket Management
  • Uptime Reporting
  • User Management
  • Workflow Management

View full list of IT Management Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Audit Management
  • Audit Trail
  • Automatic Backup
  • Bandwidth Monitoring
  • Baseline Manager
  • CPU Monitoring
  • Capacity Management
  • Compliance Management
  • Configuration Management
  • Customisable Dashboard
  • Customisable Reports
  • Dashboard Creation
  • Data Visualisation
  • Database Monitoring
  • Diagnostic Tools
  • Email Alerts
  • Email Monitoring
  • Event Logs
  • Event Tracking
  • Incident Management
  • Inventory Management
  • Issue Management
  • Maintenance Scheduling
  • Monitoring
  • Network Monitoring
  • Patch Management
  • Performance Monitoring
  • Policy Management
  • Real Time Analytics
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Real-time Updates
  • Remote Monitoring & Management
  • Reporting/Analytics
  • Risk Alerts
  • SSL Security
  • Self Service Portal
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Status Tracking
  • Third Party Integrations
  • Threshold Alerts
  • Trend Analysis
  • Uptime Reporting
  • User Management
  • Visual Analytics
  • Web Traffic Reporting

View full list of IT, Server & Network Monitoring Tools

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Audit Management
  • Audit Trail
  • Bandwidth Monitoring
  • Baseline Manager
  • Capacity Management
  • Compliance Management
  • Configuration Management
  • Customisable Reports
  • Dashboard
  • Dashboard Creation
  • Data Visualisation
  • Email Alerts
  • Event Logs
  • IP Address Monitoring
  • Incident Management
  • Internet Usage Monitoring
  • Inventory Management
  • Maintenance Scheduling
  • Monitoring
  • Network Analysis
  • Network Resource Management
  • Patch Management
  • Performance Management
  • Performance Metrics
  • Policy Management
  • Predictive Analytics
  • Purchasing & Receiving
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Real-time Updates
  • Remote Monitoring & Management
  • Reporting & Statistics
  • SSL Security
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Simple Network Management Protocol (SNMP)
  • Third Party Integrations
  • Threshold Alerts
  • Uptime Reporting
  • Visual Analytics
  • Vulnerability Scanning
  • Web Traffic Reporting

View full list of Network Monitoring Tools

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anti Spam
  • Anti Virus
  • Audit Management
  • Audit Trail
  • Authentication
  • Compliance Management
  • Data Visualisation
  • Email Alerts
  • Event Logs
  • Event Tracking
  • Filtering
  • Firewalls
  • HIPAA Compliant
  • Incident Management
  • Intrusion Detection System
  • Monitoring
  • PCI Compliance
  • Patch Management
  • Policy Management
  • Prioritisation
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Assessment
  • SSL Security
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Third Party Integrations
  • Threat Response
  • Two-Factor Authentication
  • User Management
  • VPN
  • Vulnerability Scanning
  • Web Traffic Reporting
  • Workflow Management

View full list of Network Security Software

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Anti Virus
  • Asset Lifecycle Management
  • Audit Management
  • Audit Trail
  • Automatic Backup
  • Compliance Management
  • Configuration Management
  • Customisable Branding
  • Customisable Reports
  • Deployment Management
  • Event Logs
  • For MSPs
  • IT Asset Management
  • IT Asset Tracking
  • Inventory Management
  • Maintenance Scheduling
  • Mobile Access
  • Monitoring
  • Multiple User Accounts
  • Network Monitoring
  • Patch Management
  • Policy Management
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Real-time Alerts
  • Real-time Updates
  • Remediation Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Role-Based Permissions
  • Server Monitoring
  • Service Level Agreement (SLA) Management
  • Summary Reports
  • Support Ticket Management
  • Task Management
  • Task Scheduling
  • Third Party Integrations
  • Uptime Reporting
  • Usage Tracking/Analytics
  • User Management
  • Vulnerability Scanning
  • Workflow Management

View full list of RMM Software

  • @mentions
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts/Notifications
  • Assignment Management
  • Calendar Management
  • Chat/Messaging
  • Collaboration Tools
  • Commenting/Notes
  • Communication Management
  • Customisable Branding
  • Customisable Templates
  • Data Import/Export
  • Document Management
  • Document Storage
  • Drag & Drop
  • Electronic Signature
  • Email Management
  • Employee Activity Monitoring
  • File Management
  • File Transfer
  • Live Chat
  • Meeting Management
  • Monitoring
  • Prioritisation
  • Progress Tracking
  • Project Time Tracking
  • Projections
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real-time Updates
  • Remote Access/Control
  • Remote Support Software
  • Reporting & Statistics
  • SSL Security
  • Single Sign On
  • Softphone Software
  • Tagging
  • Task Management
  • Task Progress Tracking
  • Task Scheduling
  • Third Party Integrations
  • Time Zone Tracking
  • Two-Way Audio & Video
  • Video Chat
  • Video Conferencing
  • Workflow Management

View full list of Remote Work Software

  • API
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Approval Process Control
  • Assessment Management
  • Audit Management
  • Audit Trail
  • Business Process Control
  • Compliance Management
  • Configurable Workflow
  • Corrective and Preventive Actions (CAPA)
  • Customisable Reports
  • Customisable Templates
  • Dashboard
  • Dashboard Creation
  • Data Visualisation
  • Document Management
  • Document Storage
  • Exceptions Management
  • Forms Management
  • IT Risk Management
  • Incident Management
  • Internal Controls Management
  • Legal Risk Management
  • Mobile Access
  • Monitoring
  • Operational Risk Management
  • Policy Management
  • Predictive Analytics
  • Real Time Monitoring
  • Real Time Reporting
  • Reminders
  • Reporting & Statistics
  • Reporting/Analytics
  • Reputational Risk Management
  • Response Management
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Risk Reporting
  • Risk Scoring
  • Security Auditing
  • Task Management
  • Third Party Integrations
  • Training Management
  • Vendor Management
  • Version Control
  • Workflow Management

View full list of Risk Management Software

  • API
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Application Security
  • Behavior Analytics
  • Cloud Backup
  • Customisable Reports
  • Data Visualisation
  • Event Analysis
  • Event Logs
  • IT Reporting
  • Incident Reporting
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Scanning
  • Prioritisation
  • Profiling
  • Real Time Analytics
  • Real Time Data
  • Real Time Reporting
  • Real-time Alerts
  • Remediation Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Server Monitoring
  • Threat Intelligence
  • Threat Response
  • Vulnerability Scanning
  • Web-Application Security

View full list of Threat Intelligence

  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anti Virus
  • Assessment Management
  • Asset Discovery
  • Asset Tagging
  • Audit Management
  • Audit Trail
  • Authentication
  • Compliance Management
  • Customisable Reports
  • Data Visualisation
  • Email Alerts
  • Event Logs
  • Event Tracking
  • HIPAA Compliant
  • Incident Management
  • Monitoring
  • Network Scanning
  • PCI Compliance
  • Patch Management
  • Policy Management
  • Prioritisation
  • Real Time Analytics
  • Real Time Data
  • Real Time Monitoring
  • Real Time Notifications
  • Real Time Reporting
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Risk Management
  • Role-Based Permissions
  • Search/Filter
  • Security Auditing
  • Server Monitoring
  • Status Tracking
  • Third Party Integrations
  • Two-Factor Authentication
  • User Management
  • Vulnerability Assessment
  • Vulnerability Scanning
  • Web Scanning

View full list of Vulnerability Management Software

Alternatives to Malwarebytes Endpoint Protection

More Malwarebytes Endpoint Protection alternatives

Reviews of Malwarebytes Endpoint Protection

Read all 2,229 reviews

Average score

Overall
4.7
Ease of Use
4.7
Customer Service
4.4
Features
4.6
Value for Money
4.6

Reviews by company size (employees)

  • <50
  • 51-200
  • 201-1,000
  • >1,001
Darian P.
Darian P.
Team Lead of Internal Tools in US
Verified LinkedIn User
Insurance, 201-500 Employees
Used the Software for: 2+ years
Reviewer Source

Review of Malwarebytes

5 3 months ago

Comments: We needed a new antivirus after our old one was letting us down and decided to purchase 2 antivirus licenses, Malwarebytes being one of those two. It has performed fantastically.

Pros:

Many of us in the department were already familiar with malwarebytes through our personal use. We decided on a company-wide rollout since our personal experience with the defense was top-tier.

Cons:

When at a user's computer, we are unable to view logs while at that computer and instead have to go login to the UI at the IT desk to view those logs which is inconvenient. Otherwise it works very well.

Alternatives Considered: Kaspersky Endpoint Security, Trend Micro and Bitdefender GravityZone

Reasons for Choosing Malwarebytes Endpoint Protection: Kaspersky was unable to find viruses on computers we tested that Malwarebytes could. Our kaspersky setup was not finding anything while other programs were able to find much more, so we switched.

Switched From: Kaspersky Endpoint Security

Reasons for Switching to Malwarebytes Endpoint Protection: We chose malwarebytes because it ran with low CPU on the employee machine during scans which allowed them to work without slowdowns. Other software we tested would sometimes freeze machines because there were so many processes going on.

Sean H.
Ceo Technician in US
Computer Hardware, 2-10 Employees
Used the Software for: 2+ years
Reviewer Source

Malware Bytes still Biting Hard

5 10 months ago

Comments: Ive been using malware bytes for more than ten years! It always does a full scan and solve little things without compromising the computers resources!

Pros:

Integration and warnings are most important.

Cons:

More control over automatic scan should be tweaked.

Alternatives Considered: AVG Antivirus Business Edition

Reasons for Choosing Malwarebytes Endpoint Protection: Malware bytes works fastet and is more accurate.

Switched From: AVG Internet Security Business Edition

Gede ananda A.
Gede ananda A.
CEO in Indonesia
Verified LinkedIn User
Apparel & Fashion, 2-10 Employees
Used the Software for: 2+ years
Reviewer Source

Probably the best Protection Service on Market

5 4 weeks ago New

Comments: Malwarebytes is on my top 3 Antivirus for a while. I got the 3 years license for dirt cheap and do the job extremely well, since a lot of Ransomware cases happening lately. Helping me a lot to detect and sanitize files after the download.

Pros:

It doesn't take many resources on PC while running in the background, Regular Update for the virus database and protection, Easy to use, a wide variation of virus/malware database, and Instantly alert me of suspicious file seconds after downloading. Before I buy the license, I use the free version and it does an extremely good job, even with the only real-time protection feature.

Cons:

Sometimes Malwarebytes doesn't work well with other Antiviruses Services, which leads my system into some problems, for example, Blue Screen and high disk usage

Scott F.
Director of Technical Operations in US
Information Technology & Services, 2-10 Employees
Used the Software for: 2+ years
Reviewer Source

Great overall protection but too many sacrifices

3 4 years ago

Pros:

There's no doubt that MalwareBytes AntiMalware has been one of the best solutions for removing and preventing malware and spyware on computers. I've been using them for years as a PC Technician, and their utilities have always been a staple in my technician toolbox (flash drive) to repair systems and keep them healthy. The current version of the program, version 3, is much easier to use than ever before and has tons of great features and abilities - and of course, it removes and prevents all kinds of malware just as it always has.

Cons:

I was a HUGE fine of prior versions of this software, but the newer version 3 has seen my faith shaken. While the program is still great at removing malware, the realtime aspect of the program is plagued by performance issues. Even using the program in freeware mode without the realtime scanner active, it was still commonplace for me to see active memory usage exceed 500MB routinely. When using the realtime scanner aspect of the premium version, usage would hover around 200MB for a while but eventually, it would balloon out of control to the point where it would consistently use over 700MB at a time until you closed it or rebooted, which would restart the cycle. I found the only way to stop this was to basically shut it down entirely and disable the services, using it as an on-demand scanner only. Because of this, I have stopped recommending it. Simply put - the program is GREAT at detecting and removing threats, however, it has become a resource hog to the point where the system becomes crippled when running the premium version.

Adrian W.
Senior Manager in Canada
Airlines/Aviation, Self Employed
Used the Software for: 2+ years
Reviewer Source

Probably the best malware virus protection software

5 5 months ago

Comments: I have been truly delighted with this software which doesnt have the annoying features of Norton. Its well worth the price of the annual subscription and is a install and forget and it sits there doing its thing.

Pros:

Ease of installation, reasonable pricing and real time monitoring of all web activities and PUP alerts

Cons:

Nothing. Its affordable, a snap to install and upgrade and generates valid alerts rather than cryptic error messages.