Detects what others can't

Malwarebytes Endpoint Security protects your endpoints with next-gen tech that out-thinks malware and traditional security.

Buy Request Trial
Zero, the Malwarebytes robot

We could probably measure the hours saved with Malwarebytes in the thousands. Being able to tell Malwarebytes to find, remove, or quarantine a problem is huge for us.

  • Davin Garcia
  • Director of Information Security

Solving your endpoint protection problems

Wins when other solutions fail

As the de-facto malware removal tools for businesses worldwide, Malwarebytes products are used when traditional AV fails, which is often. How often? Our products are downloaded more than 500k times and remove more than 3 million pieces of malware daily.

More telemetry, smarter security

The visibility into the successful malware attacks provides Malwarebytes the world’s most informed telemetry. This intelligence uniquely allows us to fully understand the techniques that make these attacks work and how to counter them.

Layers break the attack chain

Malwarebytes Endpoint Security deploys a layered approach with multiple detection techniques. In conjunction with the world’s most informed telemetry, our technology offers you unparalleled protection on the endpoint.

Ready to see what Malwarebytes Endpoint Security can do for your business?

Buy Request Trial

Malwarebytes Endpoint Security technology

Application Hardening

Application Hardening

Reduces the vulnerability surface, making the endpoint more resilient. Proactively detects fingerprinting attempts made by advanced exploit attacks.

Web Protection

Web Protection

Protects endpoints by blocking access to and from malicious websites, malvertising, and scammer networks.


Exploit Mitigation

Exploit Mitigation

Proactively detects and blocks attempts to compromise application vulnerabilities and remotely execute code on the endpoint.

Application Behavior

Application Behavior

Ensures applications behave as intended, preventing them from being leveraged to infect endpoints.


Payload Analysis

Payload Analysis

Identifies entire families of known malware by using a combination of heuristic and behavioral rules.

Ransomware Mitigation

Ransomware Mitigation

Detects and blocks ransomware from encrypting files using a behavioral monitoring technology.


Callback Protection

Callback Protection

Prevents access to command and control (C&C) servers and malicious websites.

Management Console features

Centralized management

  • Multiple client management (up to thousands from a single console)
  • Push install functionality
  • Comprehensive policies for different groups
  • Active Directory integration and synchronization
  • Virtual deployment simulator
  • Email notifications

Tech specs

Malwarebytes Endpoint Security includes anti-malware and anti-exploit technologies managed by the Management Console, along with our unmanaged Mac remediation and anti-ransomware technologies. Each has individual specs.

Management Console (Managed Mode Only) More

Version
Click here to view our full business history.

Languages Available
English

Hardware Requirements
CPU: 2 GHz (dual-core 2.6 GHZ or higher recommended)
RAM: 2 GB (4 GB recommended)
Disk space: 10 GB (20 GB recommended)
Screen resolution: 1024x768 or higher
Active internet connection for database updates, product updates and registration

Software
Microsoft Internet Explorer 6 (or newer), Firefox, Chrome or Opera browser .NET Framework 3.5

Supported Operating Systems
Windows Server 2016 (64-bit)
Windows Server 2012 R2 (64-bit)
Windows Server 2012 (64-bit)
Windows Small Business Server 2011
Windows Server 2008 (32/64-bit)
Windows Server 2008 R2 (32/64-bit)

Please note that Windows servers using the Server Core installation process are specifically excluded

Supported Microsoft SQL Servers
SQL Express 2008 (shipped with product, subject to review, 10 GB maximum database size limitation)
SQL Server 2008
SQL Server 2012
SQL Server 2014
SQL Server 2016

Please note that Windows servers using the Server Core installation process are specifically excluded.

Anti-Malware for Business More

Version
Click here to view our full business history.

Languages Available
English, Bosnian, Bulgarian, Catalan, Chinese Simplified, Chinese Traditional, Croatian, Czech, Danish, Dutch, Estonian, Finnish, French, German, Greek, Hebrew, Hungarian, Italian, Latvian, Lithuanian, Macedonian, Norwegian, Polish, Portuguese (Brazil), Portuguese (Portugal), Romanian, Russian, Serbian, Slovak, Slovenian, Spanish, Swedish, Thai, Turkish, Vietnamese.

Software
Microsoft Internet Explorer 6 (or newer), Firefox, Chrome or Opera browser

Hardware Requirements
256MB of RAM (512MB or more recommended)
800MHz CPU or faster
20MB of free hard disk space
800x600 or greater screen resolution
Active Internet Connection, for license validation and threat signature updates
USB Port (optional, depending on deployment method)

Supported Operating Systems
Windows 10 ® (32-bit, 64-bit)
Windows 8.1 ® (32-bit, 64-bit)
Windows 8 ® (32-bit, 64-bit)
Windows 7 ® (32-bit, 64-bit)
Windows Vista ® (32-bit, 64-bit)
Windows XP ® (Service Pack 3 or later) (32-bit only)
Windows Server 2016 (64-bit)
Windows Server 2012 R2 ® (32-bit, 64-bit)
Windows Server 2012 ® (32-bit, 64-bit)
Windows Small Business Server 2011
Windows Server 2008 R2 ® (32-bit, 64-bit)
Windows Server 2008 ® (32-bit, 64-bit)
Windows Server 2003 ® (32-bit only)

Please note that Windows servers using the Server Core installation process are specifically excluded.

Additional Requirements for Managed Mode
Windows Installer 4.0 (Windows XP only, already included in other Windows versions)
.NET Framework 3.5 (Windows XP, Windows 8.0/8.1, Windows 10)
.NET Framework 4.0 (Windows Vista, Windows 7, Windows 8)

Anti-Exploit for Business More

Version
Click here to view our full business history.

Languages Available
English

Hardware Requirements
CPU: 800MHz CPU
RAM: 1024 MB (512 MB or more recommended)
Disk space: 10 MB
Screen resolution: 800x600 or greater updates

Supported Operating Systems
Windows 10® (32-bit, 64-bit)
Windows 8.1® (32-bit, 64-bit)
Windows 8® (32-bit, 64-bit)
Windows 7® (32-bit, 64-bit)
Windows Vista® (32-bit, 64-bit)
Windows XP® (32-bit, 64-bit, Service Pack 3 or later)
Windows Server 2008® (32-bit, 64-bit)
Windows Server 2008® R2 (32-bit, 64-bit)
Windows Small Business Server 2011
Windows Server 2012® (64-bit)
Windows Server 2012® R2 (64-bit)
Windows Server 2016 (64-bit)

Additional Requirements for Managed Mode
Windows Installer 4.0 (Windows XP only, already included in other Windows versions)
.NET Framework 3.5 (Windows XP, Windows 8.0/8.1, Windows 10)
.NET Framework 4.0 (Windows Vista, Windows 7, Windows 8)

Mac Remediation More

Languages Available
English

Hardware Requirements
Any Apple Mac device that supports Mac OS X version 10.8 or later
Active Internet connection updates

Supported Operating Systems
Mac OS X version 10.8 or later

Security & Privacy
Allow apps to be downloaded from the Mac App Store and identified developers (the most restrictive setting)

Anti-Ransomware More

Languages Available
English

Hardware Requirements
CPU: 800 Mhz
RAM: 1024 MB
Disk space: 100 MB
Screen resolution: 800x600 or greater
Active Internet connection for product updates and registration

Software
Microsoft Internet Explorer 6 (or newer), Firefox, Chrome, or Opera browser

Supported Operating Systems
Windows 10 (32-bit, 64-bit)
Windows 8.1 (32-bit, 64-bit)
Windows 8 (32-bit, 64-bit)
Windows 7 (32-bit, 64-bit)

Looking to remove malware?

Our threat detection and remediation solution remotely cleans infected endpoints, reducing dwell time and the need for endpoint re-imaging.

Learn More

Cybersecurity info you can't do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language

Cybersecurity basics

Your intro to everything relating to cyberthreats, and how to stop them.