Anti-Exploitfor Business

Protects vulnerable programs against zero-day attacks with innovative exploit mitigation technology.


Trusted by

Vermeer uses Malwarebytes Dole uses Malwarebytes Samsung uses Malwarebytes

Anti-Exploit in action

See how Malwarebytes Anti-Exploit for Business protects in both stages of an exploit attack using multiple layers of innovative technology.


Malwarebytes protects with four layers

Protects with four layers

Multiple layers work together to block exploits instantly in four ways: 1. Shell code execution. 2. Memory calls. 3. Sandbox escapes. 4. Memory mitigation.

Malwarebytes saves bandwidth, resources

Saves bandwidth, resources

Malwarebytes Anti-Exploit for Business doesn't use a signature database like traditional endpoint security, so it doesn't require frequent updates and conserves network bandwidth. Its small 3MB footprint and lean client further minimizes use of system resources.

Malwarebytes conserves CPU cycles

Conserves CPU cycles

Malwarebytes Anti-Exploit for Business doesn't waste valuable CPU cycles employing virtual machines. Making it the perfect solution for older hardware and EOL operating systems like Microsoft XP, which is no longer supported with security updates.

Malwarebytes is hands free, maintenance free

Hands free, maintenance free

Our advanced technology doesn't employ blacklisting/whitelisting or sandboxing, so it needs far less management by the IT department than traditional endpoint security. Malwarebytes Anti-Exploit for Business also requires minimal or no end-user interaction.

Anti-Exploit for Business features

  • Protects against bypasses
  • Memory caller protection
  • Management console
  • Application hardening
  • No signatures, sandboxing, or virtual machines
  • Compatible with other antivirus programs

Protected programs


  • Google Chrome
  • Mozilla Firefox
  • Internet Explorer
  • Opera
  • Java
  • Adobe Reader
  • Flash
  • Shockwave
  • Any other add-on that runs in the browser process space


  • Windows Media Player (wmplayer, wmplayer2)
  • QuickTime
  • VLC Player
  • Adobe Acrobat Reader
  • Microsoft Word
  • Microsoft Excel
  • Adobe Acrobat Pro
  • Foxit Reader
Icons of protected programs (Flash, Adobe Reader, Microsoft Excel, Microsoft Word, Mozilla Firefox, Google Chrome, Internet Explorer, Silverlight, and Java)

Tech specs

Anti-Exploit for Business More

Click here to view our full business history.

Languages Available

Hardware Requirements
RAM: 1024 MB (512 MB or more recommended)
Disk space: 10 MB
Screen resolution: 800x600 or greater updates

Supported Operating Systems
Windows 10® (32-bit, 64-bit)
Windows 8.1® (32-bit, 64-bit)
Windows 8® (32-bit, 64-bit)
Windows 7® (32-bit, 64-bit)
Windows Vista® (32-bit, 64-bit)
Windows XP® (32-bit, 64-bit, Service Pack 3 or later)
Windows Server 2008® (32-bit, 64-bit)
Windows Server 2008® R2 (32-bit, 64-bit)
Windows Small Business Server 2011
Windows Server 2012® (64-bit)
Windows Server 2012® R2 (64-bit)
Windows Server 2016 (64-bit)

Additional Requirements for Managed Mode
Windows Installer 4.0 (Windows XP only, already included in other Windows versions)
.NET Framework 3.5 (Windows XP, Windows 8.0/8.1, Windows 10)
.NET Framework 4.0 (Windows Vista, Windows 7, Windows 8)

Management Console (Managed Mode Only) More

Click here to view our full business history.

Languages Available

Hardware Requirements
CPU: 2 GHz (dual-core 2.6 GHZ or higher recommended)
RAM: 2 GB (4 GB recommended)
Disk space: 10 GB (20 GB recommended)
Screen resolution: 1024x768 or higher
Active internet connection for database updates, product updates and registration

Microsoft Internet Explorer 6 (or newer), Firefox, Chrome or Opera browser .NET Framework 3.5

Supported Operating Systems
Windows Server 2016 (64-bit)
Windows Server 2012 R2 (64-bit)
Windows Server 2012 (64-bit)
Windows Small Business Server 2011
Windows Server 2008 (32/64-bit)
Windows Server 2008 R2 (32/64-bit)

Please note that Windows servers using the Server Core installation process are specifically excluded

Supported Microsoft SQL Servers
SQL Express 2008 (shipped with product, subject to review, 10 GB maximum database size limitation)
SQL Server 2008
SQL Server 2012
SQL Server 2014
SQL Server 2016

Please note that Windows servers using the Server Core installation process are specifically excluded.

Want to prevent cyberthreats?

Check out Malwarebytes Endpoint Security.

Malwarebytes Endpoint Security screenshot

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language

Cybersecurity basics

Your intro to everything relating to cyberthreats, and how to stop them.