{"id":22920,"date":"2023-09-14T17:10:51","date_gmt":"2023-09-15T01:10:51","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/09\/14\/news-16650\/"},"modified":"2023-09-14T17:10:51","modified_gmt":"2023-09-15T01:10:51","slug":"news-16650","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/09\/14\/news-16650\/","title":{"rendered":"Malwarebytes wins every Q2 MRG Effitas award &#038; scores 100% on new phishing test"},"content":{"rendered":"<div>\n<p role=\"heading\" aria-level=\"1\" xml:lang=\"EN-US\" paraid=\"1051193533\" paraeid=\"{bdc987ad-03c8-4350-a93e-d7c283f7fa19}{82}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">MRG Effitas, a world leader in independent IT research, published their anti-malware efficacy assessment results for Q2 2023. <\/span><a href=\"https:\/\/www.malwarebytes.com\/business\/endpoint-protection\" target=\"_blank\" rel=\"noreferrer noopener\"><span data-contrast=\"none\" xml:lang=\"EN-US\">Malwarebytes Endpoint Protection (EP)<\/span><\/a><span data-contrast=\"none\" xml:lang=\"EN-US\"> achieved<\/span><span data-contrast=\"none\" xml:lang=\"EN-US\"> the highest possible score (100%)<\/span><span data-contrast=\"none\" xml:lang=\"EN-US\"> and received certifications for Level 1, Exploit, Online Banking, and Ransomware.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"514253150\" paraeid=\"{d5f751b0-88dc-48b8-86af-4c82f1cf0f89}{190}\"><span data-contrast=\"none\" xml:lang=\"EN-US\"><\/span><span data-contrast=\"none\" xml:lang=\"EN-US\">These results mark the eighth <\/span><span data-contrast=\"none\" xml:lang=\"EN-US\">time in a row<\/span><span data-contrast=\"none\" xml:lang=\"EN-US\"> we have received all certification awards, and we are now officially the <\/span><span data-contrast=\"none\" xml:lang=\"EN-US\">only vendor<\/span><span data-contrast=\"none\" xml:lang=\"EN-US\"> to win every single certification &amp; award in 2022 and so far into 2023.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<p xml:lang=\"EN-US\" paraid=\"514253150\" paraeid=\"{d5f751b0-88dc-48b8-86af-4c82f1cf0f89}{190}\"><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/09\/easset_upload_file61163_282264_e.png\" alt=\"\" width=\"2040\" height=\"622\" \/><span data-contrast=\"none\" xml:lang=\"EN-US\">MRG Effitas assesses a product&#8217;s ability to meet today&rsquo;s most pressing threats, including stopping zero-day malware, ransomware, exploits, and more&mdash;and doing so with speedy performance and low false positives.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/span><\/p>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"466908858\" paraeid=\"{d5f751b0-88dc-48b8-86af-4c82f1cf0f89}{250}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">In addition to their normal tests, for Q2 2023 MRG Effitas added two new tests to their Q2 2023 360&deg; Assessment &amp; Certification: the ITW Phishing Test and Phishing Simulator Test.&nbsp;&nbsp;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"792195884\" paraeid=\"{a38f76cf-e53d-496f-8050-b4d21838a2d9}{55}\"><strong><span data-contrast=\"none\" xml:lang=\"EN-US\">Malwarebytes <\/span><span data-contrast=\"none\" xml:lang=\"EN-US\">blocked 100% of phishing attempts <\/span><span data-contrast=\"none\" xml:lang=\"EN-US\">in BOTH the ITW Phishing Test and Phishing Simulator Test. In other words, Malwarebytes <\/span><span data-contrast=\"none\" xml:lang=\"EN-US\">was the only vendor in the Q2 2023 MRG test to both receive all 4 award logos AND block 100% of phishing attempts.&nbsp;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/strong><\/p>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"711958550\" paraeid=\"{a38f76cf-e53d-496f-8050-b4d21838a2d9}{116}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">How we were able to do it: <\/span><span data-contrast=\"none\" xml:lang=\"EN-US\">The signature and behavior-based detection techniques and proprietary anti-exploit technology<\/span><span data-contrast=\"none\" xml:lang=\"EN-US\"> of Malwarebytes EP allowed it to detect and block more malware than any other competitor on the Q2 test. In addition, the Web protection layer of our EP blocks access to and from known or suspicious Internet addresses, allowing us to ace the phishing tests.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"674005305\" paraeid=\"{bdc987ad-03c8-4350-a93e-d7c283f7fa19}{170}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">As an integral foundation layer for our <\/span><a href=\"https:\/\/www.malwarebytes.com\/business\/edr\" target=\"_blank\" rel=\"noreferrer noopener\"><span data-contrast=\"none\" xml:lang=\"EN-US\">EDR <\/span><\/a><span data-contrast=\"none\" xml:lang=\"EN-US\">and <\/span><a href=\"https:\/\/www.malwarebytes.com\/business\/managed-detection-and-response\" target=\"_blank\" rel=\"noreferrer noopener\"><span data-contrast=\"none\" xml:lang=\"EN-US\">MDR <\/span><\/a><span data-contrast=\"none\" xml:lang=\"EN-US\">solutions, these results prove that Malwarebytes EP provides reliable and comprehensive protection against a wide range of threats.&nbsp;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"1060392781\" paraeid=\"{a38f76cf-e53d-496f-8050-b4d21838a2d9}{140}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">For the full results and to see how we stack up against competitors, our &#8220;<\/span><span data-contrast=\"none\" xml:lang=\"EN-US\">Endpoint Security Evaluation Guide<\/span><span data-contrast=\"none\" xml:lang=\"EN-US\">&#8221; eBook&mdash;based on MRG Effitas&#8217; independent lab assessment&mdash;is an essential tool for any organization looking to make an informed decision about endpoint security. Download below!<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<p xml:lang=\"EN-US\" paraid=\"1060392781\" paraeid=\"{a38f76cf-e53d-496f-8050-b4d21838a2d9}{140}\" style=\"text-align: center;\"><span class=\"blue-cta-bttn\" style=\"color: #ffffff;\"><a href=\"https:\/\/try.malwarebytes.com\/2023-mrg-effitas?utm_source=blog&amp;utm_medium=social&amp;utm_campaign=b2b_ws_global_mrg_effitas_167881798202\" style=\"color: #ffffff;\">GET THE ENDPOINT SECURITY EVALUATION GUIDE<\/a><\/span><\/p>\n<\/p><\/div>\n<div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"963864619\" paraeid=\"{bdc987ad-03c8-4350-a93e-d7c283f7fa19}{193}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">Let&rsquo;s dive into where we prevented more than the rest and how we were able to do it.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<\/p><\/div>\n<div>\n<h2 role=\"heading\" aria-level=\"3\" xml:lang=\"EN-US\" paraid=\"964180833\" paraeid=\"{bdc987ad-03c8-4350-a93e-d7c283f7fa19}{200}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">100% of phishing attempts blocked<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/h2>\n<\/p><\/div>\n<div>\n<p role=\"heading\" aria-level=\"3\" xml:lang=\"EN-US\" paraid=\"228934162\" paraeid=\"{bdc987ad-03c8-4350-a93e-d7c283f7fa19}{211}\"><span data-contrast=\"none\" xml:lang=\"EN-US\"><span data-ccp-parastyle=\"heading 3\">Given the frequency and risks associated with phishing attacks today, <\/span><span data-ccp-parastyle=\"heading 3\">it&rsquo;s<\/span><span data-ccp-parastyle=\"heading 3\"> clear that modern endpoint security needs to protect against these attacks<\/span><span data-ccp-parastyle=\"heading 3\">.&nbsp;&nbsp;<\/span><\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<\/p><\/div>\n<div>\n<p role=\"heading\" aria-level=\"3\" xml:lang=\"EN-US\" paraid=\"2022215505\" paraeid=\"{bdc987ad-03c8-4350-a93e-d7c283f7fa19}{222}\"><span data-contrast=\"none\" xml:lang=\"EN-US\"><span data-ccp-parastyle=\"heading 3\">According to Verizon, attackers used phishing for <\/span><span data-ccp-parastyle=\"heading 3\">initial<\/span><span data-ccp-parastyle=\"heading 3\"> access in 15% of data breaches in 2022. CISA also showed that, within the first 10 minutes of receiving a phishing email, 84% of employees took the bait. After successfully compromising a system through phishing, threat actors can further their attacks by dropping ransomware or stealing sensitive data, leading to costly financial and reputational damages.<\/span><\/span><span data-contrast=\"none\" xml:lang=\"EN-US\">&nbsp;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"1563045579\" paraeid=\"{bdc987ad-03c8-4350-a93e-d7c283f7fa19}{233}\"><strong><span data-contrast=\"none\" xml:lang=\"EN-US\">Malwarebytes blocked 100% of phishing attempts in BOTH the ITW Phishing Test and Phishing Simulator Test.&nbsp;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/strong><\/p>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"1862730045\" paraeid=\"{bdc987ad-03c8-4350-a93e-d7c283f7fa19}{247}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">How we were able to do it: Malwarebytes EP, the foundation for Malwarebytes EDR, features a Web protection layer that blocks access to and from known or suspicious Internet addresses.&nbsp;<\/span><\/p>\n<p xml:lang=\"EN-US\" paraid=\"1862730045\" paraeid=\"{bdc987ad-03c8-4350-a93e-d7c283f7fa19}{247}\"><span data-contrast=\"none\" xml:lang=\"EN-US\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/09\/easset_upload_file4865_282264_e.png\" alt=\"\" width=\"668\" height=\"556\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/span><\/p>\n<\/p><\/div>\n<div>\n<h2 xml:lang=\"EN-US\" paraid=\"1454498851\" paraeid=\"{b84f59bc-0e29-4de8-9b04-6ef92189f839}{3}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">100% of ransomware blocked<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/h2>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"70925872\" paraeid=\"{b84f59bc-0e29-4de8-9b04-6ef92189f839}{10}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">Using a blend of signature and signature-less technologies, the anti-ransomware layer of Malwarebytes EP constantly monitors endpoint systems and automatically kills processes associated with ransomware activity.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span>&nbsp;<\/p>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"1701657716\" paraeid=\"{b7ef71f1-58ee-4004-93d9-30d6f57a10dd}{33}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">MRG Effitas tested security products for 30 ransomware samples. In addition, they tested four ransomware simulator samples created in-house, ensuring the security product could only rely on its behavior scanning modules. To test for false positives, a device running Malwarebytes EP also ran three benign programs designed to mimic ransomware behavior.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"2108099740\" paraeid=\"{b7ef71f1-58ee-4004-93d9-30d6f57a10dd}{71}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">Malwarebytes blocked 100 percent of ransomware threats in the MRG Effitas assessment and did so with no false positives, allowing the three benign programs to run. For this we earned the 360&deg; Ransomware Certification.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span>&nbsp;<\/p>\n<p xml:lang=\"EN-US\" paraid=\"2108099740\" paraeid=\"{b7ef71f1-58ee-4004-93d9-30d6f57a10dd}{71}\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/09\/easset_upload_file86436_282264_e.png\" alt=\"\" width=\"1503\" height=\"917\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"786670561\" paraeid=\"{b84f59bc-0e29-4de8-9b04-6ef92189f839}{41}\" style=\"text-align: center;\"><span data-contrast=\"none\" xml:lang=\"EN-US\">Nebula view of detected ransomware activity&nbsp;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<\/p><\/div>\n<div>\n<h2 role=\"heading\" aria-level=\"3\" xml:lang=\"EN-US\" paraid=\"477368665\" paraeid=\"{b84f59bc-0e29-4de8-9b04-6ef92189f839}{50}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">100% of banking malware blocked<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/h2>\n<\/p><\/div>\n<div>\n<p role=\"heading\" aria-level=\"3\" xml:lang=\"EN-US\" paraid=\"729761799\" paraeid=\"{b7ef71f1-58ee-4004-93d9-30d6f57a10dd}{109}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">In 2021, <\/span><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2022\/12\/malwarebytes-outperforms-competition-in-latest-mrg-effitas-assessment#:~:text=37%25%20of%20banking%20malware%20attacks%20targeted%20corporate%20users.\" target=\"_blank\" rel=\"noreferrer noopener\"><span data-contrast=\"none\" xml:lang=\"EN-US\">37% of banking malware attacks targeted corporate users<\/span><\/a><span data-contrast=\"none\" xml:lang=\"EN-US\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<\/p><\/div>\n<div>\n<p role=\"heading\" aria-level=\"3\" xml:lang=\"EN-US\" paraid=\"1542829768\" paraeid=\"{b7ef71f1-58ee-4004-93d9-30d6f57a10dd}{124}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">We were one of the few vendors who earned a 360&deg; Online Banking Certification, which means Malwarebytes EP stopped 100% of threats designed to steal financial information and money from victim&#8217;s accounts. To outperform the others, our unique detection technology again came into play.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<\/p><\/div>\n<div>\n<p role=\"heading\" aria-level=\"3\" xml:lang=\"EN-US\" paraid=\"289991006\" paraeid=\"{b7ef71f1-58ee-4004-93d9-30d6f57a10dd}{163}\"><span data-contrast=\"none\" xml:lang=\"EN-US\"><span data-ccp-parastyle=\"heading 3\">Malwarebytes EP autoblocked 100% of the 25 financial malware samples, the <\/span><span data-ccp-parastyle=\"heading 3\">Magecart<\/span><span data-ccp-parastyle=\"heading 3\"> credit card-skimming attack, and Botnets designed to steal credentials.&nbsp;<\/span><\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<\/p><\/div>\n<div>\n<h2 role=\"heading\" aria-level=\"3\" xml:lang=\"EN-US\" paraid=\"1911752556\" paraeid=\"{b7ef71f1-58ee-4004-93d9-30d6f57a10dd}{220}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">100% of zero-day threats blocked<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/h2>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"2139040808\" paraeid=\"{b84f59bc-0e29-4de8-9b04-6ef92189f839}{93}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">One of the many strong suits of our detection is that it can detect malware that has never been seen before, also called zero-day malware. Again, we were one of the only vendors to detect and block these pernicious threats, <\/span><a href=\"https:\/\/www.morphisec.com\/hubfs\/2020%20State%20of%20Endpoint%20Security%20Final.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><span data-contrast=\"none\" xml:lang=\"EN-US\">which account for 80% of successful breaches<\/span><\/a><span data-contrast=\"none\" xml:lang=\"EN-US\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span>&nbsp;<\/p>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"522957658\" paraeid=\"{b7ef71f1-58ee-4004-93d9-30d6f57a10dd}{234}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">Built on machine learning (ML) and behavioral analysis techniques, our behavior-based detection enabled Malwarebytes EP to detect and autoblock 100% of all zero-day threats. For this, as well as blocking all Botnets, we earned the 360&deg; Level 1 Certification.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span>&nbsp;<\/p>\n<\/p><\/div>\n<div>\n<h2 xml:lang=\"EN-US\" paraid=\"708999535\" paraeid=\"{7d2dd31b-7d0c-4084-a571-7e341ca74116}{3}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">100% of exploits blocked<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/h2>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"1333203551\" paraeid=\"{b84f59bc-0e29-4de8-9b04-6ef92189f839}{118}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">The anti-exploit feature of Malwarebytes EP protects organizations from one of the most advanced cyber attacks: zero-day exploits targeting browser and application vulnerabilities. <\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"657769648\" paraeid=\"{7d2dd31b-7d0c-4084-a571-7e341ca74116}{105}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">But don&rsquo;t take our word for it: MRG Effitas used 8 different exploitation techniques to try and deliver a malicious payload on a device running Malwarebytes EP&mdash;but they didn&rsquo;t get very far.<\/span><span data-contrast=\"none\" xml:lang=\"EN-US\"> <\/span><span data-contrast=\"none\" xml:lang=\"EN-US\">Malwarebytes earned the 360&deg; Exploit Certification for autoblocked 100% of Exploit\/Fileless attacks, entirely protecting the system from infection.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span>&nbsp;<\/p>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"2057353059\" paraeid=\"{7d2dd31b-7d0c-4084-a571-7e341ca74116}{226}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">We were one of the few to earn the 360&deg; Exploit Certification all thanks to our proprietary anti-exploit technology, which wraps vulnerable programs in four defensive layers that prevent an exploit from installing its payload, or even executing initial shellcode.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<br \/><\/span><\/p>\n<p xml:lang=\"EN-US\" paraid=\"2057353059\" paraeid=\"{7d2dd31b-7d0c-4084-a571-7e341ca74116}{226}\" style=\"text-align: center;\"><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/09\/easset_upload_file95460_282264_e.png\" alt=\"\" width=\"1275\" height=\"928\" \/><\/span><\/p>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"441356748\" paraeid=\"{b84f59bc-0e29-4de8-9b04-6ef92189f839}{139}\" style=\"text-align: center;\"><span data-contrast=\"auto\" xml:lang=\"EN-US\"><\/span><span data-contrast=\"none\" xml:lang=\"EN-US\">Our four layers of exploit protection<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span>&nbsp;<\/p>\n<p xml:lang=\"EN-US\" paraid=\"441356748\" paraeid=\"{b84f59bc-0e29-4de8-9b04-6ef92189f839}{139}\" style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/09\/easset_upload_file66438_282264_e.png\" alt=\"\" width=\"1600\" height=\"803\" \/><\/p>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"2009914261\" paraeid=\"{b84f59bc-0e29-4de8-9b04-6ef92189f839}{159}\" style=\"text-align: center;\"><span data-contrast=\"none\" xml:lang=\"EN-US\">Anti-exploit settings in Nebula<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<\/p><\/div>\n<div>\n<h2 role=\"heading\" aria-level=\"3\" xml:lang=\"EN-US\" paraid=\"1936340287\" paraeid=\"{b84f59bc-0e29-4de8-9b04-6ef92189f839}{168}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">Consistency is key<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/h2>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"1144261635\" paraeid=\"{b84f59bc-0e29-4de8-9b04-6ef92189f839}{179}\"><span data-contrast=\"none\" xml:lang=\"EN-US\"><\/span><span data-contrast=\"none\" xml:lang=\"EN-US\">If there is one shining take away from this accomplishment, it&rsquo;s that consistency is key.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"1073259310\" paraeid=\"{7d2dd31b-7d0c-4084-a571-7e341ca74116}{27}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">You don&rsquo;t want a security solution that passes rigorous tests like MRG Effitas only some of the time. You want a solution that passes them with flying colors all of the time. Clearly, Malwarebytes EP, and by extension our <\/span><a href=\"https:\/\/www.malwarebytes.com\/business\/edr\" target=\"_blank\" rel=\"noreferrer noopener\"><span data-contrast=\"none\" xml:lang=\"EN-US\">EDR <\/span><\/a><span data-contrast=\"none\" xml:lang=\"EN-US\">and <\/span><a href=\"https:\/\/www.malwarebytes.com\/business\/managed-detection-and-response\" target=\"_blank\" rel=\"noreferrer noopener\"><span data-contrast=\"none\" xml:lang=\"EN-US\">MDR<\/span><\/a><span data-contrast=\"none\" xml:lang=\"EN-US\">, is that solution.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span>&nbsp;<\/p>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"533614701\" paraeid=\"{b84f59bc-0e29-4de8-9b04-6ef92189f839}{201}\"><span data-contrast=\"none\" xml:lang=\"EN-US\">For organizations that are concerned their current solution may not be up-to-par, the MRG Effitas assessment has demonstrated that Malwarebytes for Business &mdash;more constantly than anybody else&mdash;has what it takes to keep your business safe from today&rsquo;s most pressing cyberthreats.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">&nbsp;<\/span><\/p>\n<\/p><\/div>\n<div>\n<p xml:lang=\"EN-US\" paraid=\"1060392781\" paraeid=\"{a38f76cf-e53d-496f-8050-b4d21838a2d9}{140}\" style=\"text-align: center;\"><span class=\"blue-cta-bttn\" style=\"color: #ffffff;\"><a href=\"https:\/\/try.malwarebytes.com\/2023-mrg-effitas?utm_source=blog&amp;utm_medium=social&amp;utm_campaign=b2b_ws_global_mrg_effitas_167881798202\" style=\"color: #ffffff;\">GET THE&nbsp;F<\/a>ULL RESULTS HERE<\/span><\/p>\n<p xml:lang=\"EN-US\" paraid=\"426695959\" paraeid=\"{b84f59bc-0e29-4de8-9b04-6ef92189f839}{208}\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/09\/easset_upload_file51647_282264_e.png\" alt=\"\" width=\"1460\" height=\"1416\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/09\/malwarebytes-wins-every-q2-mrg-effitas-award-scores-100-on-new-phishing-test\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/business\" rel=\"category tag\">Business<\/a><\/p>\n<p>Dive into where we prevented more than the rest and how we were able to do it.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/09\/malwarebytes-wins-every-q2-mrg-effitas-award-scores-100-on-new-phishing-test\" title=\"Malwarebytes wins every Q2 MRG Effitas award &#038; scores 100% on new phishing test \">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/09\/malwarebytes-wins-every-q2-mrg-effitas-award-scores-100-on-new-phishing-test\">Malwarebytes wins every Q2 MRG Effitas award &#038; scores 100% on new phishing test <\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[1001],"class_list":["post-22920","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-business"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22920","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22920"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22920\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22920"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22920"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}