Malwarebytes launches its endpoint protection and response solution

Malwarebytes recently announced the launch of its latest solution, Malwarebytes Endpoint Protection and Response offering protection at every stage of an attack and the new solution features cloud -based single management console and a unified agent.

The Endpoint Protection and Response’s flight recorder provides continuous monitoring and visibility into Windows desktops to obtain powerful insight. Businesses can easily track file system activity, network activity, process activity and registry activity. Flight recorder events are stored both locally and in the cloud, adding another sphere of safety.

The multi-vector protection (MVP) uses a seven-layered approach, which includes both static and dynamic detection techniques. These techniques protect against all known and unknown threat types, from traditional viruses to tomorrow’s advanced threats.

When an endpoint is compromised, Malwarebytes stops the bleeding by isolating the endpoint. Endpoint Protection and Response is the first product to offer three ways to isolate an endpoint. Network isolation restricts which processes can communicate. Process isolation controls which processes are allowed to keep functioning. Desktop isolation alerts the end user and halts further interaction to limit damage. With these three controls, malware is rendered incommunicado and remote attackers are locked out.

Malwarebytes proprietary Linking Engine provides complete and thorough remediation to rapidly return an endpoint to a healthy state and minimize impact to the end-user, post-compromise. Rollback technology winds back the clock up to 72 hours, negating the impact of ransomware with just-in-time backups prior to infection.

Marcin Kleczynski, CEO at Malwarebytes said “Malwarebytes Endpoint Protection and Response provides proven endpoint protection with integrated detection and response capabilities via a single agent, so organizations of all sizes can easily protect their endpoints from targeted attacks, thoroughly remediate systems and rollback ransomware.”