Only one thing is certain in the threat landscape: the uncertainty around the attacks, the techniques, the tactics, and the vectors. Exploit kits dominated the landscape a few years ago, but has become quiet. Ransomware tops the list of today, but what’s in the store for the future? The trouble is, we don’t know for sure. The threats that we’re seeing today are almost certainly not the threats that we’ll likely see tomorrow. So what do we do in order to protect ourselves from the unknown? We need to take a holistic approach that allows us to protect against anything that may come our way.
Malwarebytes Endpoint Protection leverages 7 unique layers of detection techniques in what we call Multi-Vector Protection – a multi-vector approach protects against today and tomorrow’s threats. The layers fall into two categories: rules-based and behavior-based. The rules-based layers leverage human-intelligence: the curated work of our talented threat researchers. Contrary to popular belief – signature approaches are not bad. Effectively implemented, they offer fast, accurate, and highly efficient protection against known threats with little risk to false-positives. The behavior-based technologies are signature-less techniques that address unknown malware. Altogether, these 7 layers address the attack chain – both pre and post-execution for both known and unknown threats.
It’s critical to note that our remediation capabilities are included as part of Malwarebytes Endpoint Protection because we know we can’t be 100% effective 100% of the time. So when something does get through, as soon as we know about it, we’ll be able to find and thoroughly remove the infection.
What makes our approach work so well? It’s driven by the best threat intelligence in the industry. Over the years, Malwarebytes has been established as the gold-standard in remediation. More than 500,000 downloads occur daily from both consumers and enterprises when their existing solutions fail and more than 3 million remediation events are processed daily. Malwarebytes has the only threat intelligence in the industry with the ability to “see” the latest successful threats. This provides us the insight to understand the tactics, techniques, and procedures used by the attackers, allowing us to a) validate our ability to detect the threats and b) stay ahead of the threats by understanding the trends before anyone else.
Malwarebytes Endpoint Protection is the second solution to be offered on our new single, unified endpoint agent and delivered via our cloud-based management platform. This new platform eases deployment of Malwarebytes Endpoint Protection (as well as Malwarebytes Incident Response). Additionally, larger organizations benefit from effortless, unlimited scalability and quick time-to-value.
In addition to managing the deployment, the cloud management console also centrally manages security policy and threat visibility across all endpoints in your organization. The cloud platform also enables endpoint Asset Management by delivering dozens of endpoint system details such as network interfaces, storage devices, memory objects, installed software, software updates, startup programs, and more.
I encourage you all to learn more about this new solution and more importantly, give it a try!