# ThreatDown Reviews
**Vendor:** Malwarebytes  
**Category:** [Endpoint Protection Platforms](https://www.g2.com/categories/endpoint-protection-platforms)  
**Average Rating:** 4.6/5.0  
**Total Reviews:** 1,083
## About ThreatDown
ThreatDown is an all-in-one cybersecurity platform that delivers enterprise-grade protection without the complexity. Built to make advanced cybersecurity accessible without adding headcount. ThreatDown MDR monitors your environment around the clock, investigates alerts on your behalf, and takes action to contain threats before they spread— delivering the protection of an in-house SOC without the cost. One lightweight agent. One cloud-based console. ThreatDown brings endpoint and identity security together with patch management, vulnerability assessment, DNS filtering, and email security—eliminating tool sprawl and reducing operational overhead. Native EDR and ITDR telemetry connects user activity with endpoint behavior, giving teams the full attack story so they can detect and respond faster. Backed by nearly two decades of Malwarebytes expertise, ThreatDown pairs award-winning detection with a patented remediation engine that removes every trace of malware to prevent reinfection. It stops ransomware, credential theft, zero-day exploits, phishing, and human-operated attacks—and goes further with built-in ransomware rollback to help organizations recover quickly. Deploy in minutes. See value fast. Recognized as an MRG Effitas Product of the Year and a G2 Leader, ThreatDown is consistently rated for ease of use, rapid deployment, and high-quality support. ThreatDown Solutions ThreatDown MDR (Managed Detection and Response) delivers 24/7/365 human-led threat monitoring, investigation, and remediation powered by Malwarebytes detection and AI-driven engines—closing the security resource gap and reducing risk from unknown threats. ThreatDown EDR (Endpoint Detection and Response) protects against ransomware, zero-day exploits, phishing, and human-operated attacks that bypass prevention layers, with the tools to detect, investigate, and contain threats. ThreatDown ITDR (Identity Threat Detection and Response) stops identity-based attacks by continuously monitoring credential, privilege, and access behavior across Active Directory, Microsoft Entra ID, and Okta. Native correlation with EDR delivers unified endpoint-to-identity visibility and response—closing the post-authentication gap that IAM and MFA leave open. For Partners Our multi-tenant ThreatDown OneView platform enables MSPs and IT admins to streamline operations with centralized management of customer endpoints, license subscriptions, reporting, and global policies. With products and services like Endpoint Detection and Response (EDR), Managed Detection and Response (MDR) and the rest of our technologies in our portfolio, partners can offer the right product or service to each customer, tailored to their specific needs. Find out more about our partner program at https://www.threatdown.com/partner-program.



## ThreatDown Pros & Cons
**What users like:**

- Users highlight the **ease of use** of ThreatDown, finding deployment and integration straightforward and intuitive. (99 reviews)
- Users appreciate the **user-friendly interface and robust integration** of ThreatDown, making proactive security management effortless. (68 reviews)
- Users praise ThreatDown for its **effective threat prevention and comprehensive endpoint security** , ensuring safety across all devices. (59 reviews)
- Users value the **effective threat detection** of ThreatDown, providing peace of mind while browsing and securing data. (56 reviews)
- Users praise the **responsive customer support** of ThreatDown, highlighting quick replies and effective solutions from the team. (54 reviews)
- Users highlight the **effective protection** ThreatDown provides against malware, ensuring robust security for their systems. (53 reviews)
- Easy Management (40 reviews)
- Easy Installation (36 reviews)
- Dashboard Usability (34 reviews)
- Centralized Management (33 reviews)

**What users dislike:**

- Users report **poor customer support** , lacking easy troubleshooting options and training resources for effective usage. (23 reviews)
- Users note a **lack of clarity** in security scoring and feature discrepancies across platforms, hindering effective use. (22 reviews)
- Users find the **missing features** in ThreatDown, especially firewall integration and module selection, quite limiting and frustrating. (20 reviews)
- Users request improved measures to reduce **false positives** , as frequent alerts complicate the ThreatDown experience. (18 reviews)
- Users report **communication issues** with ThreatDown, citing inconsistencies in customer service and the absence of chat support. (16 reviews)
- Users experience **poor support services** with ThreatDown, leading to frustration and unresolved technical issues. (15 reviews)
- Users often face **agent issues** impacting device identification and the uninstallation process, complicating their experience. (13 reviews)
- Delay Issues (13 reviews)
- Learning Curve (13 reviews)
- Limited Features (13 reviews)


## ThreatDown Discussions
  - [Does Malwarebytes work on servers?](https://www.g2.com/discussions/does-malwarebytes-work-on-servers) - 1 comment, 2 upvotes
  - [How to allow program in App Data to be used](https://www.g2.com/discussions/how-to-allow-program-in-app-data-to-be-used) - 2 comments, 2 upvotes
  - [Is it possible to use run more thorough &#39;complete&#39; scans manually?](https://www.g2.com/discussions/33880-is-it-possible-to-use-run-more-thorough-complete-scans-manually) - 1 comment, 1 upvote
  - [Using Malwarebytes EDR in a midsize company needs extra investment for web filter?](https://www.g2.com/discussions/using-malwarebytes-edr-in-a-midsize-company-needs-extra-investment-for-web-filter) - 4 comments, 1 upvote
  - [How are anti-virus softwares made?](https://www.g2.com/discussions/how-are-anti-virus-softwares-made) - 1 comment, 1 upvote

- [View ThreatDown pricing details and edition comparison](https://www.g2.com/products/threatdown/reviews?page=88&section=pricing&secure%5Bexpires_at%5D=2026-05-13+09%3A09%3A44+-0500&secure%5Bsession_id%5D=080057ac-07c5-43f8-8979-03eeee11180b&secure%5Btoken%5D=48fe2ac7dd28678a0d9bd7e39f37d58382fb0e0e929e4a4c672c927b384cb4cb&format=llm_user)
## ThreatDown Integrations
  - [ConnectWise Automate](https://www.g2.com/products/connectwise-automate/reviews)
  - [Datto RMM](https://www.g2.com/products/datto-rmm/reviews)
  - [HCL BigFix](https://www.g2.com/products/hcl-technologies-hcl-bigfix/reviews)
  - [Jira](https://www.g2.com/products/jira/reviews)
  - [Kaseya BMS](https://www.g2.com/products/kaseya-bms/reviews)
  - [Kaseya VSA](https://www.g2.com/products/kaseya-vsa/reviews)
  - [Microsoft Entra ID](https://www.g2.com/products/microsoft-entra-id/reviews)
  - [Microsoft Outlook](https://www.g2.com/products/microsoft-outlook/reviews)
  - [Microsoft Sentinel](https://www.g2.com/products/microsoft-sentinel/reviews)
  - [Microsoft Teams](https://www.g2.com/products/microsoft-teams/reviews)
  - [Palo Alto Networks Cortex XSOAR](https://www.g2.com/products/palo-alto-networks-cortex-xsoar/reviews)
  - [Slack](https://www.g2.com/products/slack/reviews)
  - [Splashtop Remote Access](https://www.g2.com/products/splashtop-remote-access/reviews)
  - [Splunk Enterprise Security](https://www.g2.com/products/splunk-enterprise-security/reviews)
  - [Swimlane](https://www.g2.com/products/swimlane/reviews)
  - [Symantec End-user Endpoint Security](https://www.g2.com/products/symantec-end-user-endpoint-security/reviews)
  - [Torq AI SOC Platform](https://www.g2.com/products/torq-ai-soc-platform/reviews)
  - [Wazuh](https://www.g2.com/products/wazuh/reviews)
  - [Webroot Business Endpoint Protection](https://www.g2.com/products/webroot-business-endpoint-protection/reviews)

## ThreatDown Features
**Administration**
- Compliance
- Web Control
- Application Control
- Asset Management
- Device Control

**Platform Features**
- 24/7 support
- Proactive report alerts
- Application  control
- Proactive threat hunting
- Rapid response time
- Customizeable reports
- Managed Services

**Generative AI**
- AI Text Generation
- AI Text Summarization

**Generative AI**
- AI Text Summarization

**Services - Endpoint Detection & Response (EDR) **
- Managed Services

**System Control**
- Device Control
- Web Control
- Application Control
- Asset Management
- System Isolation

**Functionality**
- System Isolation
- Firewall
- Endpoint Intelligence
- Malware Detection

**Automation Capabilities**
- Automated remediation
- Automated investigation
- AI Agents

**Vulnerability Prevention**
- Endpoint Intelligence
- Firewall
- Malware Detection

**Analysis**
- Automated Remediation
- Incident Reports
- Behavioral Analysis

**Security Management**
- Incident Reports
- Security Validation
- Compliance 

## Top ThreatDown Alternatives
  - [CrowdStrike Falcon Endpoint Protection Platform](https://www.g2.com/products/crowdstrike-falcon-endpoint-protection-platform/reviews) - 4.6/5.0 (372 reviews)
  - [ESET PROTECT](https://www.g2.com/products/eset-protect/reviews) - 4.6/5.0 (937 reviews)
  - [SentinelOne Singularity Endpoint](https://www.g2.com/products/sentinelone-singularity-endpoint/reviews) - 4.7/5.0 (195 reviews)

