Malwarebytes Competitors and Alternatives

Get our free report covering Microsoft, Broadcom, Cylance, and other competitors of Malwarebytes. Updated: December 2020.
454,950 professionals have used our research since 2012.

Read reviews of Malwarebytes competitors and alternatives

Mohammad Ali Khan
Director at Pacific Infotech UK ltd
Real User
Top 20
Oct 15, 2020
Automatic remediation and rollback help us minimize the number of technicians needed to support customers

What is our primary use case?

We are a managed services provider. We are not just using it for ourselves, but we are also supporting it and deploying it for a number of our customers. The primary use case is that it's endpoint protection software and we use it to protect our end customers' endpoints, whether they are Apple or computers, laptops or servers. SentinelOne is software as a service, but it has an agent that has to be installed on a computer or a server onsite.

Pros and Cons

  • "It has a one-click button that we can use to reverse all those dodgy changes made by the virus program and bring the system quickly back to what it was. That's one of the most important features."
  • "Another valuable feature is that if a machine is infected, one that may infect other computers within the network, we have the capability of segregating that machine in the network so that it remains connected to the internet but is cut off from the other machines in the network. That helps prevent spreading of the infection. That's a very unique feature, one I have not seen in the last 10 to 15 years from any other antivirus program. That's amazing."
  • "One of the areas which would benefit from being improved is the policies. There are still software programs where we need to manually program in the policies to tell the system, "This program is legitimate." Some level of AI-based automation in creating those policies would go a long way in improving the amount of time it takes to deploy the system."

What other advice do I have?

Go for it. It's an absolutely brilliant product. But understand what it is before starting to deploy. Unless you understand the product, you will not know how to use it to the best of its best capabilities. The solution's Behavioral AI works with and without a network connection, providing the internal protection. But having that network connection is important because it will then be able to report it to the central dashboard. While it will do what it has to do locally, it's helpful when the agent reports back to the central dashboard so that the IT Admin can take action. It is important that…
Omar Sánchez (Mr.Tech)
Information Security Advisor, CISO & CIO, Docutek Services at Docutek Services
Consultant
Top 5Leaderboard
Feb 14, 2019
You can quickly locate exceptions and can configure process exceptions

What is our primary use case?

The primary use case is endpoint security. The product is my main endpoint, IP, and threat management.

Pros and Cons

  • "If the user leaves our premises or network, Palo Alto Traps will still be on that endpoint and will still apply our policies."
  • "Traps doesn't work with McAfee. You need to remove McAfee to install Traps. This is very common, and its nothing that should be an issue. Some antivirus engines recognize Traps as an threat component, so maybe they need to shake hands somewhere."

What other advice do I have?

Test normal behavior of the Traps agents (injection and policy) and confirm that there has been no change in the user experience.
reviewer1140780
Consultant at a wholesaler/distributor with 10,001+ employees
Vendor
Sep 26, 2019
Straightforward installation, but better interprocess and real-time memory visibility are needed

What is our primary use case?

Our primary use case for this solution is endpoint synchronization. I deal with all of the security vendors, and this is one of the products that I have experience with. The deployment is on-premises and is used in conjunction with our firewall.

Pros and Cons

  • "From an application perspective, this solution is stable."
  • "The memory check needs to be improved, giving better visibility into the run-time memory."

What other advice do I have?

When it comes to Fortinet, the users are not a big fan of their current model. Bit by bit, they pull you into to buying the entire security fabric. You have to buy a lot of product, and a lot of licenses, to enable all of the features which will help you to secure your environment. This is unlike other solutions, where you have the ability to buy a particular product and it will do its job from the start to the end. I'm thinking that they are trying to move to the McAfee model, where everything is a separate license that needs to be added. You have to buy a lot of product to get the perfect…
Get our free report covering Microsoft, Broadcom, Cylance, and other competitors of Malwarebytes. Updated: December 2020.
454,950 professionals have used our research since 2012.