SlideShare a Scribd company logo
Malwarebytes Corporation, 10 Almaden Blvd., Tenth Floor, San Jose, CA 95113
www.malwarebytes.org • corporate-sales@malwarebytes.org
Protects against new and exploit-based malware
Get Malwarebytes Anti-Malware for Business and Malwarebytes Anti-Exploit for
Business together in one powerful, cost-effective bundle. Protect your endpoints
with a layered Malwarebytes defense engineered to defeat the latest and most
dangerous malware. It’s the smart solution to your security challenges.
Powerful multi-layered defense delivers smart endpoint protection
Malwarebytes Anti-Malware for Business
Version: 1.75
Languages Available:
English, Bosnian, Bulgarian, Catalan, Chinese Simplified, Chinese
Traditional, Croatian, Czech, Danish, Dutch, Estonian, Finnish,
French, German, Greek, Hebrew, Hungarian, Italian, Latvian,
Lithuanian, Macedonian, Norwegian, Polish, Portuguese (Brazil),
Portuguese (Portugal), Romanian, Russian, Serbian, Slovak,
Slovenian, Spanish, Swedish, Thai, Turkish, Vietnamese.
Hardware Requirements:
CPU: 800Mhz
RAM: 1024 MB (256 MB or more for Windows XP)
Disk space: 25 MB
Screen resolution: 800x600 or greater
Active internet connection for database and product updates
Software:
Microsoft Internet Explorer 6 (or newer), Firefox, Chrome or Opera
browser
Supported Operating Systems:
Windows 8.1® (32-bit, 64-bit)
Windows 8® (32-bit, 64-bit)
Windows 7® (32-bit, 64-bit)
Windows Vista® (32-bit, 64-bit)
Windows XP® (Service Pack 3 or later)
(32-bit only)
Additional Requirements for Managed Mode:
Windows Installer 4.0 (Windows XP only, already included in other
Windows versions)
.NET Framework 3.5 (Windows XP only)
.NET Framework 4.0 (Windows Vista, Windows 7, Windows 8)
Tech Specs
Malwarebytes Anti-Malware for Business
Malwarebytes Corporation, 10 Almaden Blvd., Tenth Floor, San Jose, CA 95113
www.malwarebytes.org • corporate-sales@malwarebytes.org
Features and Benefits
Anti-Malware/Anti-Spyware
Detects and eliminates zero-hour and known viruses,
Trojans, worms, rootkits, adware, and spyware in real
time to ensure data security and network integrity.
Malicious Website Blocking
Prevents access to known malicious IP addresses
so that end users are proactively protected from
downloading malware, hacking attempts, redirects to
malicious websites, and “malvertising.”
File Execution Blocking
Prevents malicious threats from executing code and
quarantines them to prevent malware attacks.
Malwarebytes Chameleon Technology
Prevents malware from blocking the installation
of Malwarebytes Anti-Malware for Business on an
infected endpoint so the infection can be remediated.
Three System Scan Modes (Quick, Flash, Full)
Enables selection of the most efficient system scan
for endpoint security requirements and available
system resources.
Advanced Malware Remediation
Employs delete-on-reboot to remove persistent or
deeply embedded malware.
Command-Line Interface
Offers an alternative to the Malwarebytes GUI for
control and flexibility, and enables importation and
exportation of client settings for faster configuration.
XML Logging
Provides reporting in a convenient human-readable
and machine-readable format to simplify use by log
analysis tools and data management.
Malwarebytes Corporation, 10 Almaden Blvd., Tenth Floor, San Jose, CA 95113
www.malwarebytes.org • corporate-sales@malwarebytes.org
Malwarebytes Anti-Exploit for Business
Features
Four layers of exploit protection:
1. Protection against Operating System (OS) security
bypasses
Employs multiple advanced memory protection techniques to
detect exploit attempts which try to bypass the native Operating
System protections such Data Execution Prevention (DEP) and
Address Space Layout Randomization (ASLR).
2. Memory caller protection
Incorporates multiple memory techniques to prevent exploit
code from executing from memory, such as from specific or
special memory areas.
3. Application behavior protection
Prevents protected applications from being exploited by
sandbox escapes and memory mitigation bypasses by preventing
the exploit from executing its malicious payload.
4. Application hardening
Uses proven techniques, including mandatory Data Execution
Prevention (DEP) Enforcement, Bottom-Up ASLR Enforcement,
and Anti-Heap Spraying, to generically harden applications to be
less susceptible to vulnerability exploit attacks, even if patches
and updates have not been applied.
Additional Features
• 100% instant, proactive technology does not rely on blacklisting
(signatures), white-listing, sandboxing, or virtual machines
• No signature database—no need for daily updates.
Extremely light 3 MB footprint
• Compatible with anti-malware and antivirus products
• Compatible with old and end-of-life Windows
operating systems, including Windows XP
• Install and forget—no management necessary, almost no end-
user interaction required
Benefits
Offers your business the most complete exploit
mitigation solution
No other endpoint exploit mitigation solution provides
four layers of protection. These layers (Operating System
Bypasses, Malicious Memory Caller, Application Behavior,
Application Hardening) work together to block exploits
instantly, both in the first stage of the attack, preventing
shellcode execution, and in the second stage, memory calls
and sandbox escapes and memory mitigation bypasses.
Smaller, lighter, and easier to use
Malwarebytes Anti-Exploit for Business technology doesn’t
use a signature database like traditional endpoint security,
so it doesn’t require frequent updates, conserving network
bandwidth. Its small 3 MB footprint and lean client further
minimizes use of system resources. And, unlike other exploit
mitigation solutions, Malwarebytes Anti-Exploit for Business
doesn’t waste valuable CPU cycles employing virtual
machines. This makes Malwarebytes Anti-Exploit for
Business the perfect solution for older hardware
and EOL operating systems like Microsoft Windows XP,
which will no longer be supported with security
updates.
Hands-free, maintenance-free
Malwarebytes Anti-Exploit for Business relies on advanced
technology that doesn’t employ blacklisting/whitelisting
or sandboxing, so it needs far less management by the IT
department than traditional endpoint security. Malwarebytes
Anti-Exploit for Business also requires minimal or no end-
user interaction. Install it and forget it.
Tech Specs
Malwarebytes Anti-Exploit for Business
Version: 1.06
Languages Available:
English
Hardware Requirements:
CPU: 800MHz CPU
RAM: 1024 MB (512 MB or more recommended)
Disk space: 10 MB
Screen resolution: 800x600 or greater screen resolution
Supported Operating Systems:
Windows 8.1® (32-bit, 64-bit)
Windows 8® (32-bit, 64-bit)
Windows 7® (32-bit, 64-bit)
Windows Vista® (32-bit, 64-bit)
Windows XP® (32-bit, 64-bit, Service Pack 3 or later)
Windows Server 2008®/2008 R2® (32-bit, 64-bit)
Windows Server 2012®/2012 R2® (64-bit)
Additional Requirements for Managed Mode:
Windows Installer 4.0 (Windows XP only, already included in other
Windows versions)
.NET Framework 3.5 (Windows XP only)
.NET Framework 4.0 (Windows Vista, Windows 7, Windows 8)
Tech Specs
Malwarebytes Corporation, 10 Almaden Blvd., Tenth Floor, San Jose, CA 95113
www.malwarebytes.org • corporate-sales@malwarebytes.org
Malwarebytes Management Console
Features and Benefits
• Enables push install of Malwarebytes products to
distributed clients from a single console for easier
deployment
• Enables scheduling of endpoint scans and automatic client
installs for off-peak hours to conserve network bandwidth
and resources
• Detects all endpoints and their software on the network
so endpoints that do not have Malwarebytes and are
vulnerable to cyberattacks can be secured
• Enables simulated deployment on an endpoint before
installation so potential issues can be addressed in advance
• Sends email notifications to specified administrators/
users based upon detected threats and/or multiple system
performance criteria
• Operates alongside other security vendors’ administration
consoles without conflicts or the need to displace existing
endpoint security clients
• Updates signature databases on distributed clients
automatically to ensure viable protection
• Enables customized policies and access for different user
groups
• Offers different end-user visibility settings to ensure the
optimal balance between notification, end-user security
awareness, and productivity
• Features robust system reporting (with printable logs) to
enable enhanced security management
Threat View
Aggregates the data necessary to evaluate potentially
malicious threats on the distributed clients and tracks user
access to potentially malicious websites. Threat View also
tracks activity by both IP address and user login while
displaying the aggregated data in a convenient chart format
for more efficient analysis.
Malwarebytes Management Console
(Managed Mode Only)
Version: 1.5
Languages Available:
English
Hardware:
CPU: 2 GHz (dual-core 2.6 GHZ or higher
recommended)
RAM: 2 GB (4 GB recommended)
Available Disk Space: 10 GB (20 GB
recommended)
Screen Resolution:
1024x768 or greater
Active internet connection for database and
product updates
Software:
Microsoft Internet Explorer 6 (or newer),
Firefox, Chrome or Opera browser
.NET Framework 3.5
.NET Framework 4.0
Supported Operating Systems:
Windows Server 2012 R2 (64-bit)
Windows Server 2012 (64-bit)
Windows Server 2008 (32/64-bit)
Windows Server 2008 R2 (32/64-bit)
Supported Microsoft SQL Servers:
SQL Express 2008 (shipped with product,
subject to review, 10 GB maximum database
size limitation)
SQL Server 2008 (for larger installations)

More Related Content

What's hot

SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
Microsoft TechNet - Belgium and Luxembourg
 
Atc ny friday-talk_slides_20080808
Atc ny friday-talk_slides_20080808Atc ny friday-talk_slides_20080808
Atc ny friday-talk_slides_20080808Todd Deshane
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionWebroot
 
Top 10 Enterprise Features of Windows Mobile 6
Top 10 Enterprise Features of Windows Mobile 6Top 10 Enterprise Features of Windows Mobile 6
Top 10 Enterprise Features of Windows Mobile 6
jasonlan
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
Aidy Tificate
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
jasonlan
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10blusmurfydot1
 
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
jasonlan
 
Desktop Alert Lite 4.0 Presentation
Desktop Alert Lite 4.0 PresentationDesktop Alert Lite 4.0 Presentation
Desktop Alert Lite 4.0 Presentation
desktopalert
 
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...Toshiharu Harada, Ph.D
 
Design for security in operating system
Design for security in operating systemDesign for security in operating system
Design for security in operating system
Bhagyashree Barde
 
Mitigating Rapid Cyberattacks
Mitigating Rapid CyberattacksMitigating Rapid Cyberattacks
Mitigating Rapid Cyberattacks
Erdem Erdogan
 
Hacking Microsoft Remote Desktop Services for Fun and Profit
Hacking Microsoft Remote Desktop Services for Fun and ProfitHacking Microsoft Remote Desktop Services for Fun and Profit
Hacking Microsoft Remote Desktop Services for Fun and Profit
Alisa Esage Шевченко
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
Ramesh Upadhaya
 
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISORINLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISORNeha Rana
 
Computer and internet security
Computer and internet securityComputer and internet security
Computer and internet security
hoshmand kareem
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer English
cynapspro GmbH
 

What's hot (20)

SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
Atc ny friday-talk_slides_20080808
Atc ny friday-talk_slides_20080808Atc ny friday-talk_slides_20080808
Atc ny friday-talk_slides_20080808
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware Infection
 
Top 10 Enterprise Features of Windows Mobile 6
Top 10 Enterprise Features of Windows Mobile 6Top 10 Enterprise Features of Windows Mobile 6
Top 10 Enterprise Features of Windows Mobile 6
 
It kamus virus security glossary
It kamus virus   security glossaryIt kamus virus   security glossary
It kamus virus security glossary
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
 
How to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 usersHow to deploy Windows Mobile to 40,000 users
How to deploy Windows Mobile to 40,000 users
 
Program Threats
Program ThreatsProgram Threats
Program Threats
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
 
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
 
Desktop Alert Lite 4.0 Presentation
Desktop Alert Lite 4.0 PresentationDesktop Alert Lite 4.0 Presentation
Desktop Alert Lite 4.0 Presentation
 
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
 
License
LicenseLicense
License
 
Design for security in operating system
Design for security in operating systemDesign for security in operating system
Design for security in operating system
 
Mitigating Rapid Cyberattacks
Mitigating Rapid CyberattacksMitigating Rapid Cyberattacks
Mitigating Rapid Cyberattacks
 
Hacking Microsoft Remote Desktop Services for Fun and Profit
Hacking Microsoft Remote Desktop Services for Fun and ProfitHacking Microsoft Remote Desktop Services for Fun and Profit
Hacking Microsoft Remote Desktop Services for Fun and Profit
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISORINLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
INLINE_PATCH_PROXY_FOR_XEN_HYPERVISOR
 
Computer and internet security
Computer and internet securityComputer and internet security
Computer and internet security
 
DevicePro Flyer English
DevicePro Flyer EnglishDevicePro Flyer English
DevicePro Flyer English
 

Viewers also liked

Beyond The Whiteboard Introduction
Beyond The Whiteboard IntroductionBeyond The Whiteboard Introduction
Beyond The Whiteboard Introduction
crossfitnaples
 
Bond Trailer analysis
Bond Trailer analysisBond Trailer analysis
Bond Trailer analysis
samasmedia
 
Garwood _ ELFA IMN 2017
Garwood _ ELFA IMN 2017Garwood _ ELFA IMN 2017
Garwood _ ELFA IMN 2017Rita Garwood
 
Logistic specialist perfomance appraisal 2
Logistic specialist perfomance appraisal 2Logistic specialist perfomance appraisal 2
Logistic specialist perfomance appraisal 2tonychoper6404
 
Hris specialist perfomance appraisal 2
Hris specialist  perfomance appraisal 2Hris specialist  perfomance appraisal 2
Hris specialist perfomance appraisal 2tonychoper6404
 
project OS
project  OSproject  OS
project OS
Banan Hasan
 
Controller performance appraisal
Controller performance appraisalController performance appraisal
Controller performance appraisal
coreypier
 
282 863-1-pb
282 863-1-pb282 863-1-pb
282 863-1-pb
yanishu
 
On Ramp Program
On Ramp ProgramOn Ramp Program
On Ramp Program
crossfitnaples
 
Garwood - BMO Snyder Clark
Garwood - BMO Snyder ClarkGarwood - BMO Snyder Clark
Garwood - BMO Snyder ClarkRita Garwood
 
Hamilton 2003 ecommence and taxation
Hamilton 2003 ecommence and taxationHamilton 2003 ecommence and taxation
Hamilton 2003 ecommence and taxationStuart Hamilton
 
презентация1
презентация1презентация1
презентация1
ильдар гайнутдинов
 

Viewers also liked (12)

Beyond The Whiteboard Introduction
Beyond The Whiteboard IntroductionBeyond The Whiteboard Introduction
Beyond The Whiteboard Introduction
 
Bond Trailer analysis
Bond Trailer analysisBond Trailer analysis
Bond Trailer analysis
 
Garwood _ ELFA IMN 2017
Garwood _ ELFA IMN 2017Garwood _ ELFA IMN 2017
Garwood _ ELFA IMN 2017
 
Logistic specialist perfomance appraisal 2
Logistic specialist perfomance appraisal 2Logistic specialist perfomance appraisal 2
Logistic specialist perfomance appraisal 2
 
Hris specialist perfomance appraisal 2
Hris specialist  perfomance appraisal 2Hris specialist  perfomance appraisal 2
Hris specialist perfomance appraisal 2
 
project OS
project  OSproject  OS
project OS
 
Controller performance appraisal
Controller performance appraisalController performance appraisal
Controller performance appraisal
 
282 863-1-pb
282 863-1-pb282 863-1-pb
282 863-1-pb
 
On Ramp Program
On Ramp ProgramOn Ramp Program
On Ramp Program
 
Garwood - BMO Snyder Clark
Garwood - BMO Snyder ClarkGarwood - BMO Snyder Clark
Garwood - BMO Snyder Clark
 
Hamilton 2003 ecommence and taxation
Hamilton 2003 ecommence and taxationHamilton 2003 ecommence and taxation
Hamilton 2003 ecommence and taxation
 
презентация1
презентация1презентация1
презентация1
 

Similar to MBESProductSheet (1)

Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
xband
 
How to Choose a SandBox - Gartner
How to Choose a SandBox - GartnerHow to Choose a SandBox - Gartner
How to Choose a SandBox - Gartner
Moti Sagey מוטי שגיא
 
Windows server hardening 1
Windows server hardening 1Windows server hardening 1
Windows server hardening 1
Frank Avila Zapata
 
Top 10 antiviruses
Top 10 antivirusesTop 10 antiviruses
Top 10 antiviruses
university of education,Lahore
 
Anti Key Logging And Real Time Encryption Software
Anti Key Logging And Real Time Encryption SoftwareAnti Key Logging And Real Time Encryption Software
Anti Key Logging And Real Time Encryption Software
Grey Matter India Technologies PVT LTD
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
Sophos Benelux
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
Pooja Bhojwani
 
ApplicationPro Flyer English
ApplicationPro Flyer EnglishApplicationPro Flyer English
ApplicationPro Flyer English
cynapspro GmbH
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
Symantec
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
William hendric
 
Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesInformation Technology
 
Microsoft OS Vulnerabilities
Microsoft OS VulnerabilitiesMicrosoft OS Vulnerabilities
Microsoft OS Vulnerabilities
SecurityTube.Net
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
phanleson
 
Kaspersky antivirus ppt
Kaspersky antivirus pptKaspersky antivirus ppt
Kaspersky antivirus ppt
Dipak Bamugade
 
Cyber tooth briefing
Cyber tooth briefingCyber tooth briefing
Cyber tooth briefing
Andrew Sispoidis
 
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg
Ethical hacking   chapter 8 - Windows Vulnerabilities - Eric VanderburgEthical hacking   chapter 8 - Windows Vulnerabilities - Eric Vanderburg
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg
Eric Vanderburg
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
Blue Coat
 

Similar to MBESProductSheet (1) (20)

MBESDatasheet
MBESDatasheetMBESDatasheet
MBESDatasheet
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
SP1_Battlecard
SP1_BattlecardSP1_Battlecard
SP1_Battlecard
 
How to Choose a SandBox - Gartner
How to Choose a SandBox - GartnerHow to Choose a SandBox - Gartner
How to Choose a SandBox - Gartner
 
Windows server hardening 1
Windows server hardening 1Windows server hardening 1
Windows server hardening 1
 
Top 10 antiviruses
Top 10 antivirusesTop 10 antiviruses
Top 10 antiviruses
 
Anti Key Logging And Real Time Encryption Software
Anti Key Logging And Real Time Encryption SoftwareAnti Key Logging And Real Time Encryption Software
Anti Key Logging And Real Time Encryption Software
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
 
ApplicationPro Flyer English
ApplicationPro Flyer EnglishApplicationPro Flyer English
ApplicationPro Flyer English
 
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSesTECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
TECHNICAL BRIEF Protecting & Migrating Legacy Windows OSes
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System Vulnerabilities
 
Microsoft OS Vulnerabilities
Microsoft OS VulnerabilitiesMicrosoft OS Vulnerabilities
Microsoft OS Vulnerabilities
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
 
Kaspersky antivirus ppt
Kaspersky antivirus pptKaspersky antivirus ppt
Kaspersky antivirus ppt
 
Cyber tooth briefing
Cyber tooth briefingCyber tooth briefing
Cyber tooth briefing
 
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg
Ethical hacking   chapter 8 - Windows Vulnerabilities - Eric VanderburgEthical hacking   chapter 8 - Windows Vulnerabilities - Eric Vanderburg
Ethical hacking chapter 8 - Windows Vulnerabilities - Eric Vanderburg
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
 
Returnil 2010
Returnil 2010Returnil 2010
Returnil 2010
 

MBESProductSheet (1)

  • 1. Malwarebytes Corporation, 10 Almaden Blvd., Tenth Floor, San Jose, CA 95113 www.malwarebytes.org • corporate-sales@malwarebytes.org Protects against new and exploit-based malware Get Malwarebytes Anti-Malware for Business and Malwarebytes Anti-Exploit for Business together in one powerful, cost-effective bundle. Protect your endpoints with a layered Malwarebytes defense engineered to defeat the latest and most dangerous malware. It’s the smart solution to your security challenges. Powerful multi-layered defense delivers smart endpoint protection
  • 2. Malwarebytes Anti-Malware for Business Version: 1.75 Languages Available: English, Bosnian, Bulgarian, Catalan, Chinese Simplified, Chinese Traditional, Croatian, Czech, Danish, Dutch, Estonian, Finnish, French, German, Greek, Hebrew, Hungarian, Italian, Latvian, Lithuanian, Macedonian, Norwegian, Polish, Portuguese (Brazil), Portuguese (Portugal), Romanian, Russian, Serbian, Slovak, Slovenian, Spanish, Swedish, Thai, Turkish, Vietnamese. Hardware Requirements: CPU: 800Mhz RAM: 1024 MB (256 MB or more for Windows XP) Disk space: 25 MB Screen resolution: 800x600 or greater Active internet connection for database and product updates Software: Microsoft Internet Explorer 6 (or newer), Firefox, Chrome or Opera browser Supported Operating Systems: Windows 8.1® (32-bit, 64-bit) Windows 8® (32-bit, 64-bit) Windows 7® (32-bit, 64-bit) Windows Vista® (32-bit, 64-bit) Windows XP® (Service Pack 3 or later) (32-bit only) Additional Requirements for Managed Mode: Windows Installer 4.0 (Windows XP only, already included in other Windows versions) .NET Framework 3.5 (Windows XP only) .NET Framework 4.0 (Windows Vista, Windows 7, Windows 8) Tech Specs Malwarebytes Anti-Malware for Business Malwarebytes Corporation, 10 Almaden Blvd., Tenth Floor, San Jose, CA 95113 www.malwarebytes.org • corporate-sales@malwarebytes.org Features and Benefits Anti-Malware/Anti-Spyware Detects and eliminates zero-hour and known viruses, Trojans, worms, rootkits, adware, and spyware in real time to ensure data security and network integrity. Malicious Website Blocking Prevents access to known malicious IP addresses so that end users are proactively protected from downloading malware, hacking attempts, redirects to malicious websites, and “malvertising.” File Execution Blocking Prevents malicious threats from executing code and quarantines them to prevent malware attacks. Malwarebytes Chameleon Technology Prevents malware from blocking the installation of Malwarebytes Anti-Malware for Business on an infected endpoint so the infection can be remediated. Three System Scan Modes (Quick, Flash, Full) Enables selection of the most efficient system scan for endpoint security requirements and available system resources. Advanced Malware Remediation Employs delete-on-reboot to remove persistent or deeply embedded malware. Command-Line Interface Offers an alternative to the Malwarebytes GUI for control and flexibility, and enables importation and exportation of client settings for faster configuration. XML Logging Provides reporting in a convenient human-readable and machine-readable format to simplify use by log analysis tools and data management.
  • 3. Malwarebytes Corporation, 10 Almaden Blvd., Tenth Floor, San Jose, CA 95113 www.malwarebytes.org • corporate-sales@malwarebytes.org Malwarebytes Anti-Exploit for Business Features Four layers of exploit protection: 1. Protection against Operating System (OS) security bypasses Employs multiple advanced memory protection techniques to detect exploit attempts which try to bypass the native Operating System protections such Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR). 2. Memory caller protection Incorporates multiple memory techniques to prevent exploit code from executing from memory, such as from specific or special memory areas. 3. Application behavior protection Prevents protected applications from being exploited by sandbox escapes and memory mitigation bypasses by preventing the exploit from executing its malicious payload. 4. Application hardening Uses proven techniques, including mandatory Data Execution Prevention (DEP) Enforcement, Bottom-Up ASLR Enforcement, and Anti-Heap Spraying, to generically harden applications to be less susceptible to vulnerability exploit attacks, even if patches and updates have not been applied. Additional Features • 100% instant, proactive technology does not rely on blacklisting (signatures), white-listing, sandboxing, or virtual machines • No signature database—no need for daily updates. Extremely light 3 MB footprint • Compatible with anti-malware and antivirus products • Compatible with old and end-of-life Windows operating systems, including Windows XP • Install and forget—no management necessary, almost no end- user interaction required Benefits Offers your business the most complete exploit mitigation solution No other endpoint exploit mitigation solution provides four layers of protection. These layers (Operating System Bypasses, Malicious Memory Caller, Application Behavior, Application Hardening) work together to block exploits instantly, both in the first stage of the attack, preventing shellcode execution, and in the second stage, memory calls and sandbox escapes and memory mitigation bypasses. Smaller, lighter, and easier to use Malwarebytes Anti-Exploit for Business technology doesn’t use a signature database like traditional endpoint security, so it doesn’t require frequent updates, conserving network bandwidth. Its small 3 MB footprint and lean client further minimizes use of system resources. And, unlike other exploit mitigation solutions, Malwarebytes Anti-Exploit for Business doesn’t waste valuable CPU cycles employing virtual machines. This makes Malwarebytes Anti-Exploit for Business the perfect solution for older hardware and EOL operating systems like Microsoft Windows XP, which will no longer be supported with security updates. Hands-free, maintenance-free Malwarebytes Anti-Exploit for Business relies on advanced technology that doesn’t employ blacklisting/whitelisting or sandboxing, so it needs far less management by the IT department than traditional endpoint security. Malwarebytes Anti-Exploit for Business also requires minimal or no end- user interaction. Install it and forget it. Tech Specs Malwarebytes Anti-Exploit for Business Version: 1.06 Languages Available: English Hardware Requirements: CPU: 800MHz CPU RAM: 1024 MB (512 MB or more recommended) Disk space: 10 MB Screen resolution: 800x600 or greater screen resolution Supported Operating Systems: Windows 8.1® (32-bit, 64-bit) Windows 8® (32-bit, 64-bit) Windows 7® (32-bit, 64-bit) Windows Vista® (32-bit, 64-bit) Windows XP® (32-bit, 64-bit, Service Pack 3 or later) Windows Server 2008®/2008 R2® (32-bit, 64-bit) Windows Server 2012®/2012 R2® (64-bit) Additional Requirements for Managed Mode: Windows Installer 4.0 (Windows XP only, already included in other Windows versions) .NET Framework 3.5 (Windows XP only) .NET Framework 4.0 (Windows Vista, Windows 7, Windows 8)
  • 4. Tech Specs Malwarebytes Corporation, 10 Almaden Blvd., Tenth Floor, San Jose, CA 95113 www.malwarebytes.org • corporate-sales@malwarebytes.org Malwarebytes Management Console Features and Benefits • Enables push install of Malwarebytes products to distributed clients from a single console for easier deployment • Enables scheduling of endpoint scans and automatic client installs for off-peak hours to conserve network bandwidth and resources • Detects all endpoints and their software on the network so endpoints that do not have Malwarebytes and are vulnerable to cyberattacks can be secured • Enables simulated deployment on an endpoint before installation so potential issues can be addressed in advance • Sends email notifications to specified administrators/ users based upon detected threats and/or multiple system performance criteria • Operates alongside other security vendors’ administration consoles without conflicts or the need to displace existing endpoint security clients • Updates signature databases on distributed clients automatically to ensure viable protection • Enables customized policies and access for different user groups • Offers different end-user visibility settings to ensure the optimal balance between notification, end-user security awareness, and productivity • Features robust system reporting (with printable logs) to enable enhanced security management Threat View Aggregates the data necessary to evaluate potentially malicious threats on the distributed clients and tracks user access to potentially malicious websites. Threat View also tracks activity by both IP address and user login while displaying the aggregated data in a convenient chart format for more efficient analysis. Malwarebytes Management Console (Managed Mode Only) Version: 1.5 Languages Available: English Hardware: CPU: 2 GHz (dual-core 2.6 GHZ or higher recommended) RAM: 2 GB (4 GB recommended) Available Disk Space: 10 GB (20 GB recommended) Screen Resolution: 1024x768 or greater Active internet connection for database and product updates Software: Microsoft Internet Explorer 6 (or newer), Firefox, Chrome or Opera browser .NET Framework 3.5 .NET Framework 4.0 Supported Operating Systems: Windows Server 2012 R2 (64-bit) Windows Server 2012 (64-bit) Windows Server 2008 (32/64-bit) Windows Server 2008 R2 (32/64-bit) Supported Microsoft SQL Servers: SQL Express 2008 (shipped with product, subject to review, 10 GB maximum database size limitation) SQL Server 2008 (for larger installations)