This content is currently locked.

Your current McLean & Company subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
1-877-281-0480 (US/CAN) or
+1-519-936-2659 (International)
ThreatDown EDR Logo Award Winner Product Badge
ThreatDown EDR Logo Award Winner Product Badge
Malwarebytes

ThreatDown EDR

Composite Score
9.0 /10
CX Score
9.2 /10
Category
ThreatDown EDR
9.0 /10

What is ThreatDown EDR?

ThreatDown EDR (endpoint detection and response) is enriched by Malwarebytes global threat intelligence and its patented remediation engine that removes every trace of malware to prevent reinfection. Seven-day ransomware rollback ensures organizations can turn the clock back on attacks and restore systems.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

ThreatDown EDR won the following awards in the Endpoint Protection - Enterprise category

Filter By

ThreatDown EDR Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on ThreatDown EDR.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

92 Likeliness to Recommend

99 Plan to Renew

85 Satisfaction of Cost Relative to Value


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+93 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love ThreatDown EDR?

1% Negative
3% Neutral
96% Positive

Pros

  • Security Protects
  • Fair
  • Respectful
  • Reliable

Feature Ratings

Average 85

Vendor Capability Ratings

Average 84

ThreatDown EDR Screenshots

ThreatDown EDR Downloads

ThreatDown EDR Reviews

Fred S.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Nov 2024

Threat Down EDR: Locking Down IT Security!

Likeliness to Recommend

9 /10

What differentiates ThreatDown EDR from other similar products?

What makes Threat Down EDR particularly valuable to us is its real-time threat hunting—it’s as if we have a security team constantly on guard, pinpointing vulnerabilities and suspicious activities before they escalate. In a field where threats are evolving faster than ever, this tool’s proactive approach keeps our systems a step ahead.

What is your favorite aspect of this product?

One of the features that’s made my life easier is Threat Down’s behavioral analytics. It builds baseline profiles for each endpoint and flags deviations as soon as they appear. This allows us to spot suspicious activities quickly and accurately without wading through endless false positives. The notifications are also very well-done—they’re immediate but not overwhelming.

What do you dislike most about this product?

A con, however, is the lack of integration with certain legacy systems.

What recommendations would you give to someone considering this product?

Threat Down has brought a whole new level of responsiveness and confidence to our security measures. Our IT team isn’t just reacting to threats; we’re anticipating them, thanks to its predictive analytics. It has reduced our incident response times significantly, allowing us to address issues almost immediately and keep downtime minimal.

Pros

  • Performance Enhancing
  • Enables Productivity
  • Trustworthy
  • Unique Features

Tharusan S.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Oct 2024

I know my system is safe with this

Likeliness to Recommend

8 /10

What differentiates ThreatDown EDR from other similar products?

You will know your protected and secure using this

What is your favorite aspect of this product?

Umbrella of protection and improvement

What do you dislike most about this product?

No dislikes

What recommendations would you give to someone considering this product?

Try it, it is very good

Pros

  • Reliable
  • Trustworthy
  • Efficient Service
  • Caring

Bella C.

  • Role: Operations
  • Industry: Other
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted Oct 2024

Secure and reliable

Likeliness to Recommend

9 /10

What differentiates ThreatDown EDR from other similar products?

It gives advanced protection to our endpoint through detection and investigation. Its tools monitor the activities of the endpoint and keep us alert continuously. It involves machine learning for the detection of potential threats such as malware.

What is your favorite aspect of this product?

It is a blessing for my system as it keeps me alert by real-time monitoring whenever any malicious or anomalies happen in my system. This EDR system caters to automated response abilities. In case of detecting any threat to my device, it automatically isolates the infected device.

What do you dislike most about this product?

It demands an expert to properly interpret for its initial setup. Without involving a security team, we face complexity in dealing with it.

What recommendations would you give to someone considering this product?

Before it's implementation, make sure that you are capable enough to deal with system's demands and complexity.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Performance Enhancing
  • Trustworthy

Most Popular ThreatDown EDR Comparisons

  • Microsoft Defender for Endpoint Logo

    Microsoft Defender for Endpoint

    Compare
  • Sophos Intercept X Endpoint Logo

    Sophos Intercept X Endpoint

    Compare
  • ESET Endpoint Security Logo

    ESET Endpoint Security

    Compare
  • Webroot Business Endpoint Protection Logo

    Webroot Business Endpoint Protection

    Compare
  • Crowdstrike Falcon Platform Logo

    Crowdstrike Falcon Platform

    Compare
  • Trend Micro Apex One Logo

    Trend Micro Apex One

    Compare