Key Benefits. Core Technologies and Technical Features. Advanced threat prevention

Similar documents
Endpoint protection for physical and virtual desktops

Total Defense Endpoint Premium r12

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Quick Heal Exchange Protection 4.0

CA Host-Based Intrusion Prevention System r8.1

escan Corporate Edition User Guide

Symantec Endpoint Protection

Endpoint protection for physical and virtual desktops

RELEASE NOTES. F-Secure Client Security Version build 309 (RTM) F-Secure Client Security Premium Version build 118 (RTM) 1.

Anti-exploit tools: The next wave of enterprise security

McAfee Web Reporter Turning volumes of data into actionable intelligence

Symantec Endpoint Protection

Grant Management. System Requirements

Cisco Unified Presence Server 1.0

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

Microsoft Office 2010 via Windows 7 (Word, Excel, Access, One Note, Outlook, PowerPoint and Publisher) Microsoft Exchange 2007, Visio, Project.

Symantec Endpoint Protection Datasheet

Cisco TelePresence Management Suite

Getting Started with Symantec Endpoint Protection

Hope is not a strategy. Jérôme Bei

Cisco TelePresence Management Suite

Symantec Protection Suite Small Business Edition

Abila Grant Management. System Requirements

Malwarebytes Endpoint Security Quick Start Guide Version September 2015

Poliscript Installation Guide

Trimble Office Synchronizer Release Notes. Version 1.68 November 2013

Symantec Protection Suite Small Business Edition

Cisco TelePresence Management Suite

Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control

Internet Security Suite

Contents. BMC Atrium Core Compatibility Matrix

Microsoft IT Increases Security and Streamlines Antimalware Management by Using Microsoft Forefront Endpoint. Protection 2010.

EMC SourceOne. Products Compatibility Guide REV 54

Recording. Smart recording (depending on the camera models)

Symantec Protection Suite Small Business Edition

ABOUT LAVASOFT. Contact. Lavasoft Product Sheet: Ad-Aware Free Antivirus+

OpenScape Web Collaboration

Kaseya IT Automation Framework

AccuRead OCR. Administrator's Guide

Symantec Endpoint Protection

Closing the Antivirus Protection Gap

ESET NOD32 ANTIVIRUS 9

Languages Supported. SpeechGear s products are being used to remove communications barriers throughout the world.

ESET NOD32 ANTIVIRUS 8

Symantec Endpoint Protection Small Business Edition Getting Started Guide

OpenScape Web Collaboration

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

New Features SMART Sync Collaboration Feature Improvements

Bridgit 4.6 software

Contents. BMC Remedy AR System Compatibility Matrix

Service Updates and Enhancements

HP Universal CMDB. Software Version: Support Matrix

Specifications SMART Bridgit software

Forefront Protection 2010 for Exchange Server Overview

CA Client Automation: Patch Manager - Supported Patches

Shavlik Protect. Installation and Setup Guide

Symantec Endpoint Protection Getting Started Guide

Patch Management SoftwareTechnical Specs

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

ESET SMART SECURITY 9

ivms-4500 HD (Android) Mobile Client Software User Manual (V3.4)

Information. OpenScape Web Collaboration V7

Parallels Containers for Windows 6.0

Cisco Unified Attendant Console Premium Edition Version 9.1

This document provides the first-priority information on Parallels Virtuozzo Containers 4.0 for Windows and supplements the included documentation.

How To Protect Your Computer From A Malicious Virus

Implementing Security Update Management

Cisco Unified Attendant Console Business Edition Version 9.1

Remote Desktop Services Guide

`````````````````SIRE QUICK START GUIDE

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

Zone Labs Integrity Smarter Enterprise Security

ivms-4500 HD (ios) Mobile Client Software User Manual (V3.4)

Symantec Endpoint Protection Small Business Edition Installation and Administration Guide

Xerox Easy Translator Service User Guide

Background. How much does EMET cost? What is the license fee? EMET is freely available from Microsoft without material cost.

PRICE LIST. ALPHA TRANSLATION AGENCY

XProtect Essential 2.1. Specification Sheet

We Answer To All Your Localization Needs!

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Release Notes for Arc Enterprise Version 5.0.2

SMART Bridgit software

Version 2010 System Requirements Revised 8/9/2010 1

Sage Grant Management System Requirements

HP Business Notebook Password Localization Guidelines V1.0

Symantec Endpoint Protection

Similar to basic pricing, usage cost is added in specified time intervals. Example: Each 15 minutes, add $1.00. Overtime option is optional.

We Answer All Your Localization Needs!

Cyclope Internet Filtering Proxy. - User Guide -

Seven for 7: Best practices for implementing Windows 7

Technical Specification Data 1

Microsoft SharePoint Workspace 2010 Product Guide

IBM Endpoint Manager for Core Protection

Crystal Reports Server Embedded 2008 with Service Pack 7 for Windows Supported Platforms

Live Office. Personal Archive User Guide

Cisco Advanced Malware Protection for Endpoints

Bridgit conferencing software Version 4.6

Yandex.Translate API Developer's guide

Personal Archive User Guide

Transcription:

Advanced threat prevention Malwarebytes Endpoint Security is an innovative platform that delivers powerful multilayered defense for smart endpoint protection. Malwarebytes Endpoint Security enables small and large enterprise businesses to thoroughly protect against the latest malware and advanced threats including stopping known and unknown exploit attacks. Key Benefits Blocks zero-hour malware Reduces the chances of data exfiltration and saves on IT resources by protecting against zero-hour malware that traditional security solutions can miss. Saves legacy systems Protects unsupported programs by armoring vulnerabilities against exploits. Increases productivity Maintains end-user productivity by preserving system performance and keeping staff on revenuepositive projects. Easy management Simplifies endpoint security management and identifies vulnerable endpoints. Streamlines endpoint security deployment and maximizes IT management resources. Scalable threat prevention Deploys protection for every endpoint and scales as your company grows. Detects unprotected systems Discovers all endpoints and installed software on your network. Systems without Malwarebytes that are vulnerable to cyber attacks can be easily secured. Core Technologies and Technical Features Anti-Malware Proactive anti-malware/anti-spyware scanning engine Detects and eliminates zero-hour and known viruses, Trojans, worms, rootkits, adware, and spyware in real time to ensure data security and network integrity. Extends its protection to Windows Server operating systems. Three system scan modes (Quick, Flash, Full) Enables selection of the most efficient system scan based on endpoint security requirements and available system resources.

Advanced threat prevention Malicious website blocking Prevents access to known malicious IP addresses so that end users are proactively protected from downloading malware, hacking attempts, redirects to malicious websites, and malvertising. File execution blocking Prevents malicious threats from executing code and quarantines them to prevent malware attacks. Malwarebytes Chameleon technology Prevents malware from blocking the installation of Malwarebytes Anti-Malware for Business on an infected endpoint so the infection can be remediated. Advanced malware remediation Employs delete-on-reboot to remove persistent or deeply embedded malware. Command-Line interface Offers an alternative to the Malwarebytes GUI for control and flexibility, and enables importation and exportation of client settings for faster configuration. XML logging Provides reporting in a convenient human- and machine-readable format to simplify use by log analysis tools and data management. MSI package Ensures flexible installation.

Anti-Exploit Four layers of exploit protection Protection against Operating System (OS) security bypasses Employs multiple advanced memory protection techniques to detect exploit attempts that try to bypass the native Operating System protections such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR). Memory caller protection Incorporates multiple memory techniques to prevent exploit code from executing from specific or special memory areas. Additional features 100% instant, proactive technology does not rely on blacklisting (signatures), whitelisting, sandboxing, or virtual machines No signature database no need for daily updates Extremely light 3 MB footprint Compatible with anti-malware and antivirus products Compatible with old and end-of-life Windows operating systems, including Windows XP Install and forget no management necessary, almost no end-user interaction required Application behavior protection Prevents protected applications from being exploited by sandbox escapes and memory mitigation bypasses by preventing the exploit from executing its malicious payload. Application hardening Uses proven techniques, including mandatory Data Execution Prevention (DEP) Enforcement, Bottom- Up ASLR Enforcement, and Anti-Heap Spraying, to generically harden applications to be less susceptible to vulnerability exploit attacks, even if patches and updates have not been applied.

Management Console Multiple client management Centrally manages thousands of clients from a single console and automatically updates signature databases on distributed clients to ensure viable protection. Push install functionality Enables push install of Malwarebytes products to distributed clients from a single console for easier deployment. Comprehensive policy rules Create customized policies and access for different user groups Flexible scan scheduling Enables scheduling of endpoint scans and automatic client installs for off-peak hours to conserve network bandwidth and resources. Endpoint identification Detects all endpoints and their software on the network so vulnerable endpoints without Malwarebytes can be secured. Active Directory integration Easily integrates and synchronizes with Microsoft Active Directory. Unobtrusive end-user experience Offers different end-user visibility settings to ensure the optimal balance between notification, end-user security awareness, and productivity. Central reporting Create system reports (with printable logs) to enable enhanced security management and sends security events to Syslog server (JSON format). Threat View Aggregates necessary data to evaluate potentially malicious threats on the distributed clients, and tracks user access to potentially malicious websites. Threat View also tracks activity by both IP address and user login while displaying the aggregated data in a convenient chart format for more efficient analysis. Virtual deployment simulator Enables simulated deployment on an endpoint before installation so potential issues can be addressed in advance. Email notifications Sends email notifications to specified administrators/users based upon detected threats and/or multiple system performance criteria.

Tech Specs Malwarebytes Anti-Malware for Business Version: 1.80 Languages Available: English, Bosnian, Bulgarian, Catalan, Chinese Simplified, Chinese Traditional, Croatian, Czech, Danish, Dutch, Estonian, Finnish, French, German, Greek, Hebrew, Hungarian, Italian, Latvian, Lithuanian, Macedonian, Norwegian, Polish, Portuguese (Brazil), Portuguese (Portugal), Romanian, Russian, Serbian, Slovak, Slovenian, Spanish, Swedish, Thai, Turkish, Vietnamese. Hardware Requirements CPU: 800Mhz RAM: 2 GB (Windows Server), 1 GB (Windows), 256+ MB (Windows XP) Available disk space: 25 MB Screen resolution: 800x600 or greater Active internet connection for database and product updates Software Microsoft Internet Explorer 6 (or newer), Firefox, Chrome or Opera browser Supported Operating Systems Windows 10 (32-bit, 64-bit) Windows 8.1 (32-bit, 64-bit) Windows 8 (32-bit, 64-bit) Windows 7 (32-bit, 64-bit) Windows Vista (32-bit, 64-bit) Windows XP (Service Pack 3 or later) (32-bit only) Windows Server 2012 /2012 R2 (32-bit, 64-bit) - excludes Server Core installation option Windows Server 2008 /2008 R2 (32-bit, 64-bit) - excludes Server Core installation option) Windows Server 2003 (32-bit only) Additional Requirements for Managed Mode Windows Installer 4.0 (Windows XP only, already included in other Windows versions).net Framework 3.5 (Windows XP only).net Framework 4.0 (Windows Vista, Windows 7, Windows 8) Malwarebytes Anti-Exploit for Business Version: 1.08 Languages Available: English Hardware Requirements: CPU: 800MHz CPU RAM: 2 GB (Windows Server and 64-bit systems), 1 GB (32- bit systems), 512+ MB (recommended for Windows XP) Available disk space: 10 MB Screen resolution: 800x600 or greater Supported Operating Systems Windows 10 (32-bit, 64-bit) Windows 8.1 (32-bit, 64-bit) Windows 8 (32-bit, 64-bit) Windows 7 (32-bit, 64-bit) Windows Vista (32-bit, 64-bit) Windows XP (32-bit, 64-bit, Service Pack 3 or later) Windows Server 2012 /2012 R2 (32-bit, 64-bit) Windows Server 2008 /2008 R2 (32-bit, 64-bit) Windows Server 2003 /2003 R2 (32-bit, 64-bit) Additional Requirements for Managed Mode Windows Installer 4.0 (Windows XP only, already included in other Windows versions).net Framework 3.5

Malwarebytes Management Console Version: 1.6 Languages Available: English Hardware CPU: 2 GHz (dual-core 2.6 GHZ or higher recommended) RAM: 2 GB (4 GB recommended) Available Disk Space: 10 GB (20 GB recommended) Screen Resolution: 1024x768 or greater Active Internet connection for database and product updates Software Microsoft Internet Explorer 6 (or newer), Firefox, Chrome or Opera browser.net Framework 3.5.NET Framework 4.0 Supported Operating Systems (Excludes Server Core installation option) Windows Server 2012 /2012 R2 (64-bit) Windows Server 2008 /2008 R2 (32-bit, 64-bit) Supported Microsoft SQL Servers SQL Server 2014 SQL Server 2012 SQL Server 2008 (for larger installations) Included Microsoft SQL Server SQL Server 2008 Express (shipped with product, 10 GB maximum database size limitation) About Malwarebytes Malwarebytes protects consumers and businesses against malicious threats that escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware, the company s flagship product, has a highly advanced heuristic detection engine that has removed more than five billion malicious threats from computers worldwide. More than 70,000 SMBs and enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, the company is headquartered in California with offices in Europe, and a global team of researchers and experts. For more information, please visit us at www.malwarebytes.com. Copyright 2016, Malwarebytes. Malwarebytes and the Malwarebytes logo are trademarks of Malwarebytes. All descriptions and specifications herein are subject to change without notice and are provided without warranty of any kind.