DATASHEET
Breach Remediation
Provides advanced threat detection and remediation for your endpoints via an extensible platform.
CONTACT US LEARN MORETrusted by
According to Gartner, malicious threats remain undetected on business endpoints for 205 days on average*. Can your enterprise business wait that long? Our threat detection and remediation solution scans for and remediates malware, reducing dwell time and the need for endpoint re-imaging.
Malwarebytes Breach Remediation is engineered to integrate seamlessly into existing security stacks. If your endpoints require comprehensive advanced threat protection, we recommend Malwarebytes Endpoint Security.
*Sources: Gartner Security & Risk Management Summit Presentation, Defending Endpoints From Persistent Attack, Peter Firstbrook, 8-11 June 2015
Discovers new and undetected malware and rapidly remediates it. Uses Malwarebytes behavioral rules and heuristics to detect zero-day malware. Accesses indicators of compromise (IOCs) from third-party breach detection tools and repositories for comprehensive detection.
Removes all traces of infections and related artifacts, not just the primary payload or infector. Eliminates risk of new attacks or lateral movements that capitalize on leftover malware traces. Malwarebytes is the de facto industry leader in malware remediation—trusted by millions and proven by AV-Test.org.
Detects advanced threats that your other security layers have missed, closing the window between discovery and remediation. Reduces exposure to malicious activity.
Tracks forensic analytics using the proprietary Forensic Timeliner feature so your team can address security gaps or unsafe user behavior. Gathers system events prior to and during an infection and presents data in a timeline for comprehensive analysis of vector and attack chain.
Integrates easily with existing security infrastructure such as SIEM, breach detection systems, and endpoint management platforms. Enables you to trigger deployment and remediation through your endpoint management platform based on alerts received from your SIEM and automatically feed resolution details back into your SIEM.
Removes malware and adware quickly from Mac endpoints. Cleans OS X systems in less than a minute. Separate GUI and command line programs enable flexible deployment using popular Mac management solutions. Allows remote, automated operation using shell, or AppleScript commands.
The Mac version deploys using popular management solutions and offers both GUI and command line interface (CLI) options.
These are the minimum requirements for a computer on which Malwarebytes Breach Remediation is deployed. Please note that these requirements do not include other functionality that the computer is responsible for.
Version
Click here to view our full business history.
Languages Available
English
Included Components
Windows CLI program
Windows Forensic Timeliner program
Mac GUI program
Mac CLI program
Hardware Requirements
256MB of RAM (512MB or more recommended)
800MHz CPU or faster
20MB of free hard disk space
800x600 or greater screen resolution
Active Internet Connection, for license validation and threat signature updates
USB Port (optional, depending on deployment method)
Supported Operating Systems
Windows 10® (32-bit, 64-bit)
Windows 8.1® (32-bit, 64-bit)
Windows 8® (32-bit, 64-bit)
Windows 7® (32-bit, 64-bit)
Windows Vista® (32-bit, 64-bit)
Windows XP® (Service Pack 3 or later, 32-bit only)
Windows Server 2012®/2012 R2® (32-bit, 64-bit)
Windows Server 2008®/2008 R2® (32-bit, 64-bit)
Windows Server 2003® (32-bit only)
Mac OS X (10.9 and newer)
Please note that Windows servers using the Server Core installation process are specifically excluded.
Check out Malwarebytes Endpoint Security.
Select your language
Your intro to everything relating to cyberthreats, and how to stop them.