Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Malwarebytes Launches MDR Solution for SMBs

Endpoint detection and response (EDR) specialist provider Malwarebytes has launched a new managed detection and response (MDR) solution to bring threat and incident detection to the SMB market. SMBs are heavily targeted by malicious actors because they are often considered to be the soft underbelly of opportunity. 

Endpoint detection and response (EDR) specialist provider Malwarebytes has launched a new managed detection and response (MDR) solution to bring threat and incident detection to the SMB market. SMBs are heavily targeted by malicious actors because they are often considered to be the soft underbelly of opportunity. 

The MDR solution combines the security firm’s EDR technology with human delivered expertise at a level normally unattainable by SMBs. 

Many mainstream cybersecurity products are beyond the budget of smaller organizations, while fulltime specialist security teams are equally unaffordable. 

Malwarebytes  has been heralding the launch of MDR for the last few months, with some existing customers already receiving what he calls an advanced beta, and on-site publication of several blogs extolling the virtues of MDR. With the official launch on October 12, 2022, the company highlights the different level of threat hunting that MDR can bring to existing SMB EDR customers – including the SMB customers of managed service providers.

Malwarebytes logoSMBs, which can include educational and healthcare institutions, cannot often afford the 24/7/365 security team needed to continuously monitor and triage EDR alerts. Nor can they afford to augment these EDR alerts with professional third-party threat intelligence services, both which are provided by Malwarebytes’ MDR. 

The new service provides an option for automated remediation. This is important for SMBs where an attack may occur overnight or at weekends when no security staff are present. Although optional, the firm strongly urges that automated remediation is allowed during the onboarding process. Just alerting the customer and having to wait hours until someone is available to react could be catastrophic given the speed with which many attacks progress. “It’s kind of crippling the point of having a 24/7 service,” Bob Shaker, VP of managed services at Malwarebytes, told SecurityWeek.

The automated remediation is never destructive. “We won’t reboot a computer, we won’t reimage a computer, and we won’t cripple a computer,” said Shaker. “If we must, we will take an endpoint and just quarantine or isolate it if we believe it is safe and not detrimental to do so.”

Onboarding from EDR to MDR is automated and speedy. “Many MDR systems can take months to get fully up and running,” he commented. That’s because the EDRs need to be brought into the MDR. “We flip the paradigm. If you buy our EDR system, you’re already in our MDR. Onboarding is just signing up, providing some basic information, and we immediately spin up the MDR instance in our environment.” His first advanced beta customers, he added, “were literally up and running in less than a day.”

It is perhaps worth noting that the Malwarebytes EDRs, used in the Malwarebytes MDR, scored strongly in independent anti-malware analyses. In this year’s MITRE Engenuity ATT&CK Evaluations, the firm recognized 83 out of 92 steps taken in an attack modeled on Wizard Spider and Sandworm threat actors. At the same time, it provided 100% protection efficacy – all straight from the box without requiring any configuration changes ahead of the test.

Advertisement. Scroll to continue reading.

“There simply aren’t enough hours in the day for most organizations to adequately address a barrage of alerts. But they don’t have to do it alone,” said Shaker. “We’ve recruited an incredible team of dedicated experts across the globe and empowered them with our award-winning tools and AI-based threat modeling to be a powerful force-multiplier for SMBs and MSPs. This is just the beginning as we continue to accelerate product innovation and deliver new services to secure chronically underserved SMBs and empower MSPs to be their heroes.”

Related: Reinventing Managed Security Services’ Detection and Response

Related: MDR Vendor eSentire Banks $325M at ‘Unicorn’ Valuation

Related: HelpSystems to Acquire MDR Services Firm Alert Logic

Related: MDR Provider Critical Start Lands $215 Million Growth Investment

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Endpoint Security

Gigabyte has announced BIOS updates that remove a recently identified backdoor feature in hundreds of its motherboards.

Endpoint Security

Several major companies have published advisories in response to the Downfall vulnerability affecting Intel CPUs.

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Endpoint Security

The Zero Day Dilemma

CISO Strategy

Varied viewpoints as related security concepts take on similar traits create substantial confusion among security teams trying to evaluate and purchase security technologies.

Endpoint Security

When establishing visibility and security controls across endpoints, security professionals need to understand that each endpoint bears some or all responsibility for its own...