ThreatDown
9.0 /10

What is ThreatDown?

Industry-proven through award-winning protection, ThreatDown powered by Malwarebytes (Formerly Malwarebytes Endpoint Detection and Response) stops attacks against workstations and servers with security that catches what other solutions miss. ThreatDown provides organizations complete, integrated protection through a single, lightweight agent that is incredibly fast to install and easy to manage.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

ThreatDown won the following awards in the Endpoint Detection & Response category

Filter By

ThreatDown Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on ThreatDown.

90 Likeliness to Recommend

1
Since last award

100 Plan to Renew

89 Satisfaction of Cost Relative to Value

1
Since last award


{y}
{name}

Emotional Footprint Overview

+95 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love ThreatDown?

0% Negative
2% Neutral
98% Positive

Pros

  • Reliable
  • Security Protects
  • Saves Time
  • Respectful

Feature Ratings

Average 88

Whitelisting Blacklisting

90

Task Prioritization

89

Continuous Monitoring

89

Intrusion Detection Prevention

88

Malware Identification Accuracy

87

Behavioural Analytics

87

Automated Threat Response

86

Machine Learning

86

Agent Efficiency

85

IOC Consumption

83

IOC Tools

83

Vendor Capability Ratings

Average 84

Business Value Created

87

Ease of Data Integration

87

Ease of IT Administration

85

Product Strategy and Rate of Improvement

85

Ease of Implementation

85

Quality of Features

84

Breadth of Features

84

Availability and Quality of Training

83

Usability and Intuitiveness

83

Vendor Support

82

Ease of Customization

82

ThreatDown Reviews

Michael T.

  • Role: Operations
  • Industry: Entertainment
  • Involvement: End User of Application
Validated Review
Verified Reviewer

Submitted May 2022

Effective protection against computer threats

Likeliness to Recommend

9 /10

What differentiates ThreatDown from other similar products?

It provides excellent and modern security for computer equipment, adapted to the needs of our company. It guarantees advanced levels of protection against threats based on Artificial Intelligence. It effectively prevents all terminals from possible cyber attacks. Its protection system does not require user intervention, allowing time to be spent on other tasks required by the company. It is a powerful solution that provides additional controls to ensure effective threat detection.

What is your favorite aspect of this product?

It is light, fast and its consumption of resources in the equipment is low. Its cloud administration interface allows you to easily manage it from anywhere. It prevents most threats before they can be executed, allowing us to do our administrative work without fear of cyber damage to our computers. It allows you to know in real time when a script is about to be executed and offers the ability to quickly allow or reject it. Its proactive security approach adapts to the degree of complexity in cybersecurity present in the Windows operating system.

What do you dislike most about this product?

This platform provides high protection against threats, although in the initial analysis, it can detect false negatives and its price is considerably high.

What recommendations would you give to someone considering this product?

I recommend the implementation of this platform for its valuable capabilities. It is silent, effective and constantly adapting software to detect all the new cyber threats that appear continuously.

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Performance Enhancing

Mark M.

  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Apr 2022

Very Efficient for malware 🤓

Likeliness to Recommend

10 /10

What differentiates ThreatDown from other similar products?

It fully asses and scans your entire IT infrastructure for malware and actually isolates infected files and softwares

What is your favorite aspect of this product?

Deep scanning features

What do you dislike most about this product?

Sometimes it may flag a genuine software as malware, you need to be very careful before deleting isolated files and softwares

What recommendations would you give to someone considering this product?

To go ahead and purchase, they'll be satisfied as Iam. 😃

Pros

  • Continually Improving Product
  • Reliable
  • Performance Enhancing
  • Enables Productivity

S P.

  • Role: Operations
  • Industry: Energy
  • Involvement: Business Leader or Manager
Validated Review
Verified Reviewer

Submitted Apr 2022

Best EDR solutions and also cost-effective too

Likeliness to Recommend

9 /10

What differentiates ThreatDown from other similar products?

Its best in scale and its detection methods are crystal clear with the accuracy compared to the other products

What is your favorite aspect of this product?

Machine learning model and user behavior model both model detection and their information are really trustworthy

What do you dislike most about this product?

Actually, it does not dislike it's just a suggestion for a download option for the sandbox analysis report in the nebula console

What recommendations would you give to someone considering this product?

Based on the industry standard this product is trustworthy and costly effective its alert and detected methods are crystal clear in the dashboard with the brief info about the alert

Pros

  • Helps Innovate
  • Performance Enhancing
  • Enables Productivity
  • Trustworthy

Most Popular ThreatDown Comparisons

  • Crowdstrike Falcon Platform Logo

    Crowdstrike Falcon Platform

    Compare
  • Sophos Intercept X Endpoint Logo

    Sophos Intercept X Endpoint

    Compare
  • Trellix Endpoint Security Logo

    Trellix Endpoint Security

    Compare
  • Microsoft Defender for Endpoint Logo

    Microsoft Defender for Endpoint

    Compare
  • SentinelOne Singularity XDR Logo

    SentinelOne Singularity XDR

    Compare
  • Trend Micro Vision One Logo

    Trend Micro Vision One

    Compare