Breach Remediation

Provides advanced threat detection and remediation for your endpoints via an extensible platform.

CONTACT US LEARN MORE

Stop re-imaging, start hunting

According to Gartner, malicious threats remain undetected on business endpoints for 205 days on average*. Can your enterprise business wait that long? Our threat detection and remediation solution scans for and remediates malware, reducing dwell time and the need for endpoint re-imaging.

Malwarebytes Breach Remediation is engineered to integrate seamlessly into existing security stacks. If your endpoints require comprehensive advanced threat protection, we recommend Malwarebytes Endpoint Security.

*Sources: Gartner Security & Risk Management Summit Presentation, Defending Endpoints From Persistent Attack, Peter Firstbrook, 8-11 June 2015

Advantages

Malwarebytes hunts for malware

Hunts for malware

Discovers new and undetected malware and rapidly remediates it. Uses Malwarebytes behavioral rules and heuristics to detect zero-day malware. Accesses indicators of compromise (IOCs) from third-party breach detection tools and repositories for comprehensive detection.

Malwarebytes Remediates malware thoroughly

Remediates malware thoroughly

Removes all traces of infections and related artifacts, not just the primary payload or infector. Eliminates risk of new attacks or lateral movements that capitalize on leftover malware traces. Malwarebytes is the de facto industry leader in malware remediation—trusted by millions and proven by AV-Test.org.

Malwarebytes Reduces threat dwell time

Reduces threat dwell time

Detects advanced threats that your other security layers have missed, closing the window between discovery and remediation. Reduces exposure to malicious activity.

Malwarebytes Records threat events for later analysis

Records threat events for later analysis

Tracks forensic analytics using the proprietary Forensic Timeliner feature so your team can address security gaps or unsafe user behavior. Gathers system events prior to and during an infection and presents data in a timeline for comprehensive analysis of vector and attack chain.

Malwarebytes Works within your stack

Works within your stack

Integrates easily with existing security infrastructure such as SIEM, breach detection systems, and endpoint management platforms. Enables you to trigger deployment and remediation through your endpoint management platform based on alerts received from your SIEM and automatically feed resolution details back into your SIEM.

Malwarebytes Closes Apple security gap

Closes Apple security gap

Removes malware and adware quickly from Mac endpoints. Cleans OS X systems in less than a minute. Separate GUI and command line programs enable flexible deployment using popular Mac management solutions. Allows remote, automated operation using shell, or AppleScript commands.

Breach Remediation features

  • Advanced malware remediation with anti-rootkit scanning [ PC ] [ Mac ]
  • Intelligent proprietary scanning engine [ PC ] [ Mac ]
  • Automated remote malware discovery and remediation [ PC ] [ Mac ]
  • Behavioral forensic analytics [ PC ]
  • Command-line interface [ PC ] [ Mac ]
  • Graphical user interface [ Mac ]
  • Custom OpenIOC threat indicators (XML format) [ PC ]
  • Four system scan types (Full, Threat, Hyper, Path) [ PC ]
  • Optional scan-and-remediate or scan-only modes [ PC ] [ Mac ]
  • Quarantine management of detected threats [ PC ] [ Mac ]
  • Event logging to central location (CEF format) [ PC ]
  • No lasting footprint on endpoint [ PC ] [ Mac ]
  • Extensible platform supports flexible deployment options [ PC ] [ Mac ]

Breach Remediation in action (Mac version)

The Mac version deploys using popular management solutions and offers both GUI and command line interface (CLI) options.

Don't take our word for it

"When we first deployed Malwarebytes, we found malware everywhere. About 25 percent of the company’s endpoints were infected. Now, we might see a handful of infections and we spend less than an hour per week remediating systems."

Robert Kay
IT Infrastructure and Operations Leader
Hypertherm

CASE STUDY

"Malwarebytes works flawlessly and has been a big help. We haven’t had to take any machines down since we deployed it. It’s been one of the best purchases we’ve made."

Mario Bernardo
Assistant Director
Florida Gulf Coast University

CASE STUDY

Tech specs

These are the minimum requirements for a computer on which Malwarebytes Breach Remediation is deployed. Please note that these requirements do not include other functionality that the computer is responsible for.

Breach Remediation

Version
Click here to view our full business history.

Languages Available
English

Included Components
Windows CLI program
Windows Forensic Timeliner program
Mac GUI program
Mac CLI program

Hardware Requirements
256MB of RAM (512MB or more recommended)
800MHz CPU or faster
20MB of free hard disk space
800x600 or greater screen resolution
Active Internet Connection, for license validation and threat signature updates
USB Port (optional, depending on deployment method)

Supported Operating Systems
Windows 10® (32-bit, 64-bit)
Windows 8.1® (32-bit, 64-bit)
Windows 8® (32-bit, 64-bit)
Windows 7® (32-bit, 64-bit)
Windows Vista® (32-bit, 64-bit)
Windows XP® (Service Pack 3 or later, 32-bit only)
Windows Server 2012®/2012 R2® (32-bit, 64-bit)
Windows Server 2008®/2008 R2® (32-bit, 64-bit)
Windows Server 2003® (32-bit only)
Mac OS X (10.9 and newer)

Please note that Windows servers using the Server Core installation process are specifically excluded.

Want to prevent cyberthreats?

Check out Malwarebytes Endpoint Security.


CALL SALES
CONTACT SALES

Select your language