MTH is a common abbreviation for what services.
What is Managed Threat Hunting?
Assess threat exposure by identifying and prioritizing action against software vulnerabilities by matching them against an up-to-date inventory of installed drivers, software and operating system modules.
What is Vulnerability Assessment?
Protects endpoints by limiting end user ability to uninstall Malwarebytes. This also prevents malicious threats from stopping, modifying, or deleting Malwarebytes.
What is Tamper Protection?
Standardized qualification criteria including metrics, decision process and criteria, identifying the pain and economic buyer, champion and competition that allows leadership to obtain essential data related to the deal and both managers and sales leadership to quickly identify areas that they can assist a rep in progressing the deal.
What is MEDDIC?
Enables them to safeguard their employees from web-based threats, ensuring secure and seamless browsing experiences. Real-time blocking of dangerous ads, malicious sites, phishing attempts, tracking scripts to ensure safe browsing. Supported for Windows endpoints and Chrome, Edge, and Brave Browers.
What is Browser Guard?
What are the Differentiators of MTH and MDR.
What is Managed Threat Hunting is automated alert scanning that correlates EDR data against external and internal threat intelligence feeds, prioritizing threats and escalating the most critical with clear, step-by-step, response guidance while Managed Detection & Response is 24x7x365 monitoring by our experts, who analyze, respond to, and remediate threats on your behalf (even those that escape technological detection)
Allows customers to prevent unsafe, unwanted, unused, and outdated applications from launching on managed Windows endpoints.
What is Application Block?
Collects and displays endpoint details, including installed software, updates, startup programs, and more.
What is Asset Management?
Where we find everything you need to know to sell Malwarebytes products and services: Content, Enablement and Sales Newsletter.
What is Content and Learning Hub?
Enables customers to protect Windows workstations from network-based threats.
What is Firewall Management?
MDR offers 2 levels of remediation. What are those 2 options.
What is Managed and Guided?
Ensuring defenses are up to date across your ecosystem by accelerating identification, deployment, installation, and verification of operating system and application code revisions, across device operating systems and a wide range of third-party applications.
What is Patch Management?
This Controls the ability to use USB storage devices on endpoints. Can be in the form of Read only access to the device: Allow copying files from the device and block modifying or copying files to the device OR Block access to the device: Block modifying and copying files to the device.
What is Device Control?
The process for a customer to get a SOC 2 Type II report from us.
What is Initiate NDA from Account Page which takes you to Ironclad (if not already on file) and then reach out to security team for a copy once NDA is completed?
Proofpoint, Check Point, and Mimecast are all examples of competitors that would offer this solution on our roadmap.
What is Email Security?
This EDR feature allows freeform threat hunting across all devices
What is Flight Recorder Search
Organizations use this to secure their environment against phishing attacks and other cyberthreats. Through this service, businesses assign control over what users can access, limit access to websites potentially posing malware risk, and reduce remediation demands on their IT teams.
What is DNS Filtering?
3 of the 5 Behavior-based Protection Layers in Endpoint Protection.
What is Application Hardening, Exploit Mitigation, Application Behavior, Anomaly Detection, Machine Learning Ransomware Mitigation
Application built using information from Opswat.
What is Vulnerability and Patch Management?
Type of firewall solution that ThreatDown offers.
What is Host-Based Firewall?
Software firewall that is installed on an endpoint and protections only that endpoint.
The 3 modes of Endpoint Isolation.
What is Network Isolation, Process Isolation, and Desktop Isolation?
Which Publisher is the DNS Filtering partnership carried out with?
What is CloudFlare?
Ability to investigate attacks, collect forensic data, and remediate detections on remote endpoints. Authorized Super Admins can securely access their endpoints remotely with Malwarebytes Nebula.
What is Active Response Shell?
Situation that qualifies as a Severity 1 issue for support.
What is emergency situation in which the Software is inoperable, produces incorrect results, or fails catastrophically?
A unified security platform that integrates data from multiple security tools ( Endpoints, identity, firewall, network, web, email etc.)
What is Managed Xtended Detection and Response (MXDR)?