How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
One of our clients right now is using Malwarebytes for their endpoint security, and they were part of a security assessment we ran. This organization was hit by ransomware and therefore getting a solution specifically that addressed ransomware was of primary importance.
My job position is Cybersecurity Engineer. We use the solution as an EDR or endpoint detection response. As EDR is, it is not the primary endpoint protection as it can not control the risk. This product is working as behavior monitoring for the end users. These monitoring products are not controlling the endpoint. For controlling the endpoint, you can use EPP (Endpoint Protection) products like Symantec Endpoint Protection, Trend Micro Endpoint Protection, one that was called OfficeScan — now the updated one is called Apex One — or other strong endpoint protection solutions like Sophos Intercept X and so on. But Malwarebytes is just EDR. EDR is mainly for detecting usage behaviors. It is evaluation and it is not technically protection for the user environment.
The primary use case of the solution is something I'm using myself, on my own computer. It sits in the background, works very well and does what you expect it to do. I'm using the free version at the moment but I'm considering getting the premium version because it's a pretty good product. My working environment is Windows, but my own personal preference is Mac, a Mac OS which I own. I have the solution on 24/7.
We use this solution for the detection and elimination of malware.
We use this solution for Endpoint Security on sixty-seven workstations.
It is an endpoint antivirus. We are using the most current version of the product. Our company does security audits, so we are pretty secure.
We use it for instant response.
It detects malware in such a way for important people to understand the threat.
We primarily use this solution for malware detection.
We use it to protect the organization's cybersecurity posture.