SlideShare a Scribd company logo
1 of 4
Download to read offline
CASE STUDY
Malwarebytes Corporation, 10 Almaden Blvd. Tenth Floor, San Jose, CA 95113
www.malwarebytes.org | corporate-sales@malwarebytes.org
1
Food for the Hungry Stops Malware in its Tracks
This nonprofit uses Malwarebytes Anti-Malware for Business to detect and stop
malware from gobbling valuable time from its mission.
INDUSTRY
Nonprofit Organization
BUSINESS CHALLENGE
Stop malware from crippling computers,
allowing staff to focus on their mission of
fighting poverty and hunger
IT ENVIRONMENT
Infrastructure in more than 20 countries
and over 75 offices in U.S., Asia, Africa, Latin
America and the Caribbean, including a server
farm, networks, firewalls, LAN gateways,
content filtering, and standard anti-virus
protection
SOLUTION
1000 licenses of Malwarebytes Anti-Malware
for Business, which includes the Management
Console
RESULTS
–– Detects and stops the spread of malware
that was undetectable with other tools
–– Saves hours and days of time in remediating
infected endpoints
–– Protects systems, websites, and files with no
impact to end users
BUSINESS PROFILE
Food for the Hungry (FH) has served the poor around the
world since 1971. Today, it serves people with 2000 staff
in more than 20 countries. Through child sponsorship
programs and donations, FH works with poor
communities to find solutions that increase child survival
and improve children’s educational opportunities. It
helps shelter, feed, and clothe survivors of natural
disasters. And the organization works on projects in
AIDS/HIV, Ebola relief, children’s education, clean water
and farming, health emergencies, and helping leaders,
families, and churches reach their potential.
Malwarebytes Corporation, 10 Almaden Blvd. Tenth Floor, San Jose, CA 95113
www.malwarebytes.org | corporate-sales@malwarebytes.org
CASE STUDY
2
Food for the Hungry Stops Malware in its Tracks
Malwarebytes enables us to catch significantly more malware incidents
and infections early, before they spread and create more damage. It saves
us a lot of time.”
—Kevin Choo, Manager of IT Field Operations, Food for the Hungry
BUSINESS CHALLENGE
Security is a global issue and FH experiences the
impact of computer viruses and malware first-
hand. Two thousand staff members in more than
20 countries use approximately 1500 endpoints,
which include desktops, laptops, and flash drives.
Most applications deployed to employees are web-
based, because they can be accessed more easily
from remote areas where the only connection
available might be an Internet café with a shared
computer. Kevin Choo is Manager of IT Field
Operations for Food for the Hungry. Based in
Kampala, Uganda, he supports IT operations and
infrastructure for Africa, Latin America and the
Caribbean, and Asia.
“We were seeing a lot of malware—viruses,
Trojans, and region-specific malware,” he said.
“It was especially common on flash drives, which
employees use at public libraries, cafes, and other
shared computers for Internet access.”
Maintaining and cleaning endpoints in FH’s offices
and field sites was challenging. Some locations
are more than 10 hours away and accessible only
by poor roads. When Choo or another IT team
member visited a remote location to perform IT
maintenance, he might end up staying anywhere
from a few days to two weeks. They often found a
wide range of endpoint disfunction due to malware.
Some computers had slow performance or reduced
functionality. Some users couldn’t open their
browsers or get email. Some endpoints wouldn’t
even turn on.
IT team members easily spent one-third to half
their time simply remediating endpoints during
these visits.
“We knew that our anti-virus solution was not
sufficient by itself,” said Choo. “We needed
more powerful protection and remediation
against malware.”
Malwarebytes Corporation, 10 Almaden Blvd. Tenth Floor, San Jose, CA 95113
www.malwarebytes.org | corporate-sales@malwarebytes.org
CASE STUDY
3
Food for the Hungry Stops Malware in its Tracks
THE SOLUTION
MALWAREBYTES ANTI-MALWARE
Several members of the IT staff had personally used Malwarebytes for their own systems and were
familiar with its capabilities. They liked the fact that it was easy to use—and highly effective. Based on
their collective experience, the team chose to implement 1000 licenses of Malwarebytes Anti-Malware
for Business.
The Malwarebytes solution protects against zero-hour malware that most other solutions miss.
Malwarebytes Anti-Malware for Business is proven to be resource-efficient, preserving endpoint
performance while it works. The team rolled out Malwarebytes Anti-Malware for Business globally, with
each region responsible for implementing it in its country and local offices. For individual endpoints in
locations without access to the Internet, the solution is deployed at the next IT visit to the area.
BETTER DETECTION
It’s difficult to pinpoint the number of infections employees experienced because of the large distances
between locations and extreme remoteness of some users. However, the obvious infections were
significant enough to disrupt activities and reduce productivity for FH employees. When Malwarebytes
Anti-Malware for Business was deployed, the IT team found that the software was detecting infections
that they couldn’t detect before. For IT staff, Malwarebytes eliminated guesswork, accelerated cleanup,
and ultimately, improved their ability to serve their users and give them back time to focus on the
organization’s mission.
“Because our applications are primarily web-based, Malwarebytes’ real-time system, website, and file
protection gives us more tools in our kit,” said Choo. “Malwarebytes enables us to catch significantly
more malware incidents and infections early, before they spread and create more damage. It saves us
a lot of time.”
Malwarebytes Corporation, 10 Almaden Blvd. Tenth Floor, San Jose, CA 95113
www.malwarebytes.org | corporate-sales@malwarebytes.org
CASE STUDY
4
Food for the Hungry Stops Malware in its Tracks
About Malwarebytes
Malwarebytes provides anti-malware and anti-exploit software designed to protect businesses and consumers against zero-
day threats that consistently escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware earned an
“Outstanding” rating by CNET editors, is a PCMag.com Editor’s Choice, and was the only security software to earn a perfect
malware remediation score from AV-TEST.org. That’s why more than 38,000 SMBs and Enterprise businesses worldwide
trust Malwarebytes to protect their data. Founded in 2008, Malwarebytes is headquartered in California, operates offices in
Europe, and employs a global team of researchers and experts.
REAL-TIME, NONINVASIVE PROTECTION
FH also considered the footprint of an anti-malware solution on users’ endpoints. With a goal of gaining
more protection with less software, the organization had to walk a fine line of deploying more software
without compromising the machine’s performance or the user experience. Malwarebytes Anti-Malware
for Business works quietly in the background, using minimal computer resources to deliver unmatched
protection. Choo said that Malwarebytes also works well with FH’s anti-virus solution and he hasn’t seen
any conflicts.
CONFIDENCE IN OUR CHOICE OF STANDARDS
“The benefits of Malwarebytes are huge,” said Choo. “Adding Malwarebytes has strengthened our security
for endpoint protection. Our staff are happier to have solid protection and we have more confidence in our
infrastructure standards.”
FH will continue to monitor the performance of Malwarebytes and looks forward to taking advantage of
additional functionality and innovation from Malwarebytes in the future. Even now, Choo and his team
have recommended Malwarebytes to other users and nonprofit organizations. With so few staff covering
such a vast geographic area, sometimes an FH IT team member will be the only IT-knowledgeable person
in the area, and other nonprofit groups working in proximity will ask for advice. They always recommend
Malwarebytes for endpoint protection issues.
“We are a growing organization,” said Choo. “We want the best, most effective tools to protect our staff’s
computers and data, and allow them to focus on the work.”

More Related Content

What's hot

What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App SecWhat the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App SecIBM Security
 
Human error and secure systems - DevOpsDays Ohio 2015
Human error and secure systems - DevOpsDays Ohio 2015Human error and secure systems - DevOpsDays Ohio 2015
Human error and secure systems - DevOpsDays Ohio 2015Dustin Collins
 
Risk Assessment Cybersecurity Project at Utica College
Risk Assessment Cybersecurity Project at Utica CollegeRisk Assessment Cybersecurity Project at Utica College
Risk Assessment Cybersecurity Project at Utica CollegeJeff Macharyas
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection RecommendationsAlienVault
 
Panda Cloud Services
Panda Cloud ServicesPanda Cloud Services
Panda Cloud ServicesOzgur Gercek
 

What's hot (6)

What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App SecWhat the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
 
Human error and secure systems - DevOpsDays Ohio 2015
Human error and secure systems - DevOpsDays Ohio 2015Human error and secure systems - DevOpsDays Ohio 2015
Human error and secure systems - DevOpsDays Ohio 2015
 
Risk Assessment Cybersecurity Project at Utica College
Risk Assessment Cybersecurity Project at Utica CollegeRisk Assessment Cybersecurity Project at Utica College
Risk Assessment Cybersecurity Project at Utica College
 
AEPWP09292016
AEPWP09292016AEPWP09292016
AEPWP09292016
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection Recommendations
 
Panda Cloud Services
Panda Cloud ServicesPanda Cloud Services
Panda Cloud Services
 

Viewers also liked

Top 8 department secretary resume samples
Top 8 department secretary resume samplesTop 8 department secretary resume samples
Top 8 department secretary resume sampleskicarjom
 
Top 8 facility security officer resume samples
Top 8 facility security officer resume samplesTop 8 facility security officer resume samples
Top 8 facility security officer resume sampleskicarjom
 
Top 8 claims officer resume samples
Top 8 claims officer resume samplesTop 8 claims officer resume samples
Top 8 claims officer resume sampleskicarjom
 
Top 8 specialist resume samples
Top 8 specialist resume samplesTop 8 specialist resume samples
Top 8 specialist resume sampleskicarjom
 
Le Mind Mapping dans la vie d'un analyste d'affaires - Ma présentation à l'IIBA
Le Mind Mapping dans la vie d'un analyste d'affaires - Ma présentation à l'IIBALe Mind Mapping dans la vie d'un analyste d'affaires - Ma présentation à l'IIBA
Le Mind Mapping dans la vie d'un analyste d'affaires - Ma présentation à l'IIBAStephane Gauthier, MBA
 
Top 8 hr secretary resume samples
Top 8 hr secretary resume samplesTop 8 hr secretary resume samples
Top 8 hr secretary resume sampleskicarjom
 
Top 8 board secretary resume samples
Top 8 board secretary resume samplesTop 8 board secretary resume samples
Top 8 board secretary resume sampleskicarjom
 
Top 8 support officer resume samples
Top 8 support officer resume samplesTop 8 support officer resume samples
Top 8 support officer resume sampleskicarjom
 
Top 8 financial secretary resume samples
Top 8 financial secretary resume samplesTop 8 financial secretary resume samples
Top 8 financial secretary resume sampleskicarjom
 
Top 8 scientific officer resume samples
Top 8 scientific officer resume samplesTop 8 scientific officer resume samples
Top 8 scientific officer resume sampleskicarjom
 
Top 8 supply chain officer resume samples
Top 8 supply chain officer resume samplesTop 8 supply chain officer resume samples
Top 8 supply chain officer resume sampleskicarjom
 
Top 8 programme officer resume samples
Top 8 programme officer resume samplesTop 8 programme officer resume samples
Top 8 programme officer resume sampleskicarjom
 
Phrasal verbs
Phrasal  verbs Phrasal  verbs
Phrasal verbs cris3215
 
Informàtica
InformàticaInformàtica
Informàticavics2002
 

Viewers also liked (16)

Top 8 department secretary resume samples
Top 8 department secretary resume samplesTop 8 department secretary resume samples
Top 8 department secretary resume samples
 
Top 8 facility security officer resume samples
Top 8 facility security officer resume samplesTop 8 facility security officer resume samples
Top 8 facility security officer resume samples
 
Top 8 claims officer resume samples
Top 8 claims officer resume samplesTop 8 claims officer resume samples
Top 8 claims officer resume samples
 
Top 8 specialist resume samples
Top 8 specialist resume samplesTop 8 specialist resume samples
Top 8 specialist resume samples
 
Le Mind Mapping dans la vie d'un analyste d'affaires - Ma présentation à l'IIBA
Le Mind Mapping dans la vie d'un analyste d'affaires - Ma présentation à l'IIBALe Mind Mapping dans la vie d'un analyste d'affaires - Ma présentation à l'IIBA
Le Mind Mapping dans la vie d'un analyste d'affaires - Ma présentation à l'IIBA
 
1609MyersBriggsChuckWilliams
1609MyersBriggsChuckWilliams1609MyersBriggsChuckWilliams
1609MyersBriggsChuckWilliams
 
Top 8 hr secretary resume samples
Top 8 hr secretary resume samplesTop 8 hr secretary resume samples
Top 8 hr secretary resume samples
 
Top 8 board secretary resume samples
Top 8 board secretary resume samplesTop 8 board secretary resume samples
Top 8 board secretary resume samples
 
Top 8 support officer resume samples
Top 8 support officer resume samplesTop 8 support officer resume samples
Top 8 support officer resume samples
 
Top 8 financial secretary resume samples
Top 8 financial secretary resume samplesTop 8 financial secretary resume samples
Top 8 financial secretary resume samples
 
latihan 3
latihan 3latihan 3
latihan 3
 
Top 8 scientific officer resume samples
Top 8 scientific officer resume samplesTop 8 scientific officer resume samples
Top 8 scientific officer resume samples
 
Top 8 supply chain officer resume samples
Top 8 supply chain officer resume samplesTop 8 supply chain officer resume samples
Top 8 supply chain officer resume samples
 
Top 8 programme officer resume samples
Top 8 programme officer resume samplesTop 8 programme officer resume samples
Top 8 programme officer resume samples
 
Phrasal verbs
Phrasal  verbs Phrasal  verbs
Phrasal verbs
 
Informàtica
InformàticaInformàtica
Informàtica
 

Similar to CaseStudyFoodForTheHungry

Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And RiskChandrashekhar B
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?SOCVault
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOKBoris Loukanov
 
Quick heal-presentation
Quick heal-presentationQuick heal-presentation
Quick heal-presentationDarshan Khant
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber SecurityComodo SSL Store
 
OSB120 Beat Ransomware
OSB120 Beat RansomwareOSB120 Beat Ransomware
OSB120 Beat RansomwareIvanti
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareGFI Software
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and RiskSecPod Technologies
 
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22Cenzic
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfBlogger
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention GuideBrian Honan
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
Trusteer Apex Provides Automatic and Accurate Malware Protection
Trusteer Apex Provides Automatic and Accurate Malware ProtectionTrusteer Apex Provides Automatic and Accurate Malware Protection
Trusteer Apex Provides Automatic and Accurate Malware ProtectionIBM Security
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdfKavitaDubey18
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)ChristopherAntonius
 
Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack ClancyClancy9
 

Similar to CaseStudyFoodForTheHungry (20)

Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
 
WhatIsMalwarebytes
WhatIsMalwarebytesWhatIsMalwarebytes
WhatIsMalwarebytes
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And Risk
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
 
Quick heal-presentation
Quick heal-presentationQuick heal-presentation
Quick heal-presentation
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber Security
 
OSB120 Beat Ransomware
OSB120 Beat RansomwareOSB120 Beat Ransomware
OSB120 Beat Ransomware
 
VIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of BloatwareVIPRE Business Takes a Bite out of Bloatware
VIPRE Business Takes a Bite out of Bloatware
 
Lastline Case Study
Lastline Case StudyLastline Case Study
Lastline Case Study
 
Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and Risk
 
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention Guide
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
Trusteer Apex Provides Automatic and Accurate Malware Protection
Trusteer Apex Provides Automatic and Accurate Malware ProtectionTrusteer Apex Provides Automatic and Accurate Malware Protection
Trusteer Apex Provides Automatic and Accurate Malware Protection
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdf
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
 
Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack Malwarebytes Anti-Malware Crack
Malwarebytes Anti-Malware Crack
 

CaseStudyFoodForTheHungry

  • 1. CASE STUDY Malwarebytes Corporation, 10 Almaden Blvd. Tenth Floor, San Jose, CA 95113 www.malwarebytes.org | corporate-sales@malwarebytes.org 1 Food for the Hungry Stops Malware in its Tracks This nonprofit uses Malwarebytes Anti-Malware for Business to detect and stop malware from gobbling valuable time from its mission. INDUSTRY Nonprofit Organization BUSINESS CHALLENGE Stop malware from crippling computers, allowing staff to focus on their mission of fighting poverty and hunger IT ENVIRONMENT Infrastructure in more than 20 countries and over 75 offices in U.S., Asia, Africa, Latin America and the Caribbean, including a server farm, networks, firewalls, LAN gateways, content filtering, and standard anti-virus protection SOLUTION 1000 licenses of Malwarebytes Anti-Malware for Business, which includes the Management Console RESULTS –– Detects and stops the spread of malware that was undetectable with other tools –– Saves hours and days of time in remediating infected endpoints –– Protects systems, websites, and files with no impact to end users BUSINESS PROFILE Food for the Hungry (FH) has served the poor around the world since 1971. Today, it serves people with 2000 staff in more than 20 countries. Through child sponsorship programs and donations, FH works with poor communities to find solutions that increase child survival and improve children’s educational opportunities. It helps shelter, feed, and clothe survivors of natural disasters. And the organization works on projects in AIDS/HIV, Ebola relief, children’s education, clean water and farming, health emergencies, and helping leaders, families, and churches reach their potential.
  • 2. Malwarebytes Corporation, 10 Almaden Blvd. Tenth Floor, San Jose, CA 95113 www.malwarebytes.org | corporate-sales@malwarebytes.org CASE STUDY 2 Food for the Hungry Stops Malware in its Tracks Malwarebytes enables us to catch significantly more malware incidents and infections early, before they spread and create more damage. It saves us a lot of time.” —Kevin Choo, Manager of IT Field Operations, Food for the Hungry BUSINESS CHALLENGE Security is a global issue and FH experiences the impact of computer viruses and malware first- hand. Two thousand staff members in more than 20 countries use approximately 1500 endpoints, which include desktops, laptops, and flash drives. Most applications deployed to employees are web- based, because they can be accessed more easily from remote areas where the only connection available might be an Internet café with a shared computer. Kevin Choo is Manager of IT Field Operations for Food for the Hungry. Based in Kampala, Uganda, he supports IT operations and infrastructure for Africa, Latin America and the Caribbean, and Asia. “We were seeing a lot of malware—viruses, Trojans, and region-specific malware,” he said. “It was especially common on flash drives, which employees use at public libraries, cafes, and other shared computers for Internet access.” Maintaining and cleaning endpoints in FH’s offices and field sites was challenging. Some locations are more than 10 hours away and accessible only by poor roads. When Choo or another IT team member visited a remote location to perform IT maintenance, he might end up staying anywhere from a few days to two weeks. They often found a wide range of endpoint disfunction due to malware. Some computers had slow performance or reduced functionality. Some users couldn’t open their browsers or get email. Some endpoints wouldn’t even turn on. IT team members easily spent one-third to half their time simply remediating endpoints during these visits. “We knew that our anti-virus solution was not sufficient by itself,” said Choo. “We needed more powerful protection and remediation against malware.”
  • 3. Malwarebytes Corporation, 10 Almaden Blvd. Tenth Floor, San Jose, CA 95113 www.malwarebytes.org | corporate-sales@malwarebytes.org CASE STUDY 3 Food for the Hungry Stops Malware in its Tracks THE SOLUTION MALWAREBYTES ANTI-MALWARE Several members of the IT staff had personally used Malwarebytes for their own systems and were familiar with its capabilities. They liked the fact that it was easy to use—and highly effective. Based on their collective experience, the team chose to implement 1000 licenses of Malwarebytes Anti-Malware for Business. The Malwarebytes solution protects against zero-hour malware that most other solutions miss. Malwarebytes Anti-Malware for Business is proven to be resource-efficient, preserving endpoint performance while it works. The team rolled out Malwarebytes Anti-Malware for Business globally, with each region responsible for implementing it in its country and local offices. For individual endpoints in locations without access to the Internet, the solution is deployed at the next IT visit to the area. BETTER DETECTION It’s difficult to pinpoint the number of infections employees experienced because of the large distances between locations and extreme remoteness of some users. However, the obvious infections were significant enough to disrupt activities and reduce productivity for FH employees. When Malwarebytes Anti-Malware for Business was deployed, the IT team found that the software was detecting infections that they couldn’t detect before. For IT staff, Malwarebytes eliminated guesswork, accelerated cleanup, and ultimately, improved their ability to serve their users and give them back time to focus on the organization’s mission. “Because our applications are primarily web-based, Malwarebytes’ real-time system, website, and file protection gives us more tools in our kit,” said Choo. “Malwarebytes enables us to catch significantly more malware incidents and infections early, before they spread and create more damage. It saves us a lot of time.”
  • 4. Malwarebytes Corporation, 10 Almaden Blvd. Tenth Floor, San Jose, CA 95113 www.malwarebytes.org | corporate-sales@malwarebytes.org CASE STUDY 4 Food for the Hungry Stops Malware in its Tracks About Malwarebytes Malwarebytes provides anti-malware and anti-exploit software designed to protect businesses and consumers against zero- day threats that consistently escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware earned an “Outstanding” rating by CNET editors, is a PCMag.com Editor’s Choice, and was the only security software to earn a perfect malware remediation score from AV-TEST.org. That’s why more than 38,000 SMBs and Enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, Malwarebytes is headquartered in California, operates offices in Europe, and employs a global team of researchers and experts. REAL-TIME, NONINVASIVE PROTECTION FH also considered the footprint of an anti-malware solution on users’ endpoints. With a goal of gaining more protection with less software, the organization had to walk a fine line of deploying more software without compromising the machine’s performance or the user experience. Malwarebytes Anti-Malware for Business works quietly in the background, using minimal computer resources to deliver unmatched protection. Choo said that Malwarebytes also works well with FH’s anti-virus solution and he hasn’t seen any conflicts. CONFIDENCE IN OUR CHOICE OF STANDARDS “The benefits of Malwarebytes are huge,” said Choo. “Adding Malwarebytes has strengthened our security for endpoint protection. Our staff are happier to have solid protection and we have more confidence in our infrastructure standards.” FH will continue to monitor the performance of Malwarebytes and looks forward to taking advantage of additional functionality and innovation from Malwarebytes in the future. Even now, Choo and his team have recommended Malwarebytes to other users and nonprofit organizations. With so few staff covering such a vast geographic area, sometimes an FH IT team member will be the only IT-knowledgeable person in the area, and other nonprofit groups working in proximity will ask for advice. They always recommend Malwarebytes for endpoint protection issues. “We are a growing organization,” said Choo. “We want the best, most effective tools to protect our staff’s computers and data, and allow them to focus on the work.”