Anti-Exploitfor Business

Protects vulnerable programs against zero-day attacks with innovative exploit mitigation technology.

BUY NOW CONTACT SALES

Anti-Exploit in action

See how Malwarebytes Anti-Exploit for Business protects in both stages of an exploit attack using multiple layers of innovative technology.

Advantages

Malwarebytes protects with four layers

Protects with four layers

Multiple layers work together to block exploits instantly in four ways: 1. Shell code execution. 2. Memory calls. 3. Sandbox escapes. 4. Memory mitigation.

Malwarebytes saves bandwidth, resources

Saves bandwidth, resources

Malwarebytes Anti-Exploit for Business doesn't use a signature database like traditional endpoint security, so it doesn't require frequent updates and conserves network bandwidth. Its small 3MB footprint and lean client further minimizes use of system resources.

Malwarebytes conserves CPU cycles

Conserves CPU cycles

Malwarebytes Anti-Exploit for Business doesn't waste valuable CPU cycles employing virtual machines. Making it the perfect solution for older hardware and EOL operating systems like Microsoft XP, which is no longer supported with security updates.

Malwarebytes is hands free, maintenance free

Hands free, maintenance free

Our advanced technology doesn't employ blacklisting/whitelisting or sandboxing, so it needs far less management by the IT department than traditional endpoint security. Malwarebytes Anti-Exploit for Business also requires minimal or no end-user interaction.

Anti-Exploit for Business features

  • Protects against bypasses
  • Memory caller protection
  • Management console
  • Application hardening
  • No signatures, sandboxing, or virtual machines
  • Compatible with other antivirus programs

Protected programs

Browsers/components

  • Google Chrome
  • Mozilla Firefox
  • Internet Explorer
  • Opera
  • Java
  • Adobe Reader
  • Flash
  • Shockwave
  • Any other add-on that runs in the browser process space

Applications

  • Windows Media Player (wmplayer, wmplayer2)
  • QuickTime
  • VLC Player
  • Adobe Acrobat Reader
  • Microsoft Word
  • Microsoft Excel
  • Adobe Acrobat Pro
  • Foxit Reader
Icons of protected programs (Flash, Adobe Reader, Microsoft Excel, Microsoft Word, Mozilla Firefox, Google Chrome, Internet Explorer, Silverlight, and Java)

Tech specs

Anti-Exploit for Business

Version
Click here to view our full business history.

Languages Available
English

Hardware Requirements
CPU: 800MHz CPU RAM: 1024 MB (512 MB or more recommended)
Disk space: 10 MB
Screen resolution: 800x600 or greater updates

Supported Operating Systems
Windows 10® (32-bit, 64-bit) Windows 8.1® (32-bit, 64-bit)
Windows 8® (32-bit, 64-bit)
Windows 7® (32-bit, 64-bit)
Windows Vista® (32-bit, 64-bit)
Windows XP® (32-bit, 64-bit, Service Pack 3 or later)
Windows Server 2008® (32-bit, 64-bit)
Windows Server 2008® R2 (32-bit, 64-bit)
Windows Small Business Server 2011
Windows Server 2012® (64-bit)
Windows Server 2012® R2 (64-bit)

Additional Requirements for Managed Mode
Windows Installer 4.0 (Windows XP only, already included in other Windows versions)
.NET Framework 3.5 (Windows XP, Windows 8.0/8.1, Windows 10)
.NET Framework 4.0 (Windows Vista, Windows 7, Windows 8)

Management Console (Managed Mode Only)

Version
Click here to view our full business history.

Languages Available
English

Hardware Requirements
CPU: 2 GHz (dual-core 2.6 GHZ or higher recommended)
RAM: 2 GB (4 GB recommended)
Disk space: 10 GB (20 GB recommended)
Screen resolution: 1024x768 or higher
Active internet connection for database updates, product updates and registration

Software
Microsoft Internet Explorer 6 (or newer), Firefox, Chrome or Opera browser .NET Framework 3.5

Supported Operating Systems
Windows Server 2012 R2 (64-bit)
Windows Server 2012 (64-bit)
Windows Small Business Server 2011
Windows Server 2008 (32/64-bit)
Windows Server 2008 R2 (32/64-bit)

Please note that Windows servers using the Server Core installation process are specifically excluded

Supported Microsoft SQL Servers
SQL Express 2008 (shipped with product, subject to review, 10 GB maximum database size limitation)
SQL Server 2008
SQL Server 2012
SQL Server 2014

Please note that Windows servers using the Server Core installation process are specifically excluded.

Want to prevent cyberthreats?

Check out Malwarebytes Endpoint Security.

Malwarebytes Endpoint Security screenshot

CALL SALES
CONTACT SALES BUY NOW

Select your language