{"id":23320,"date":"2023-11-07T06:10:03","date_gmt":"2023-11-07T14:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/11\/07\/news-17050\/"},"modified":"2023-11-07T06:10:03","modified_gmt":"2023-11-07T14:10:03","slug":"news-17050","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/11\/07\/news-17050\/","title":{"rendered":"ThreatDown: A new chapter for Malwarebytes"},"content":{"rendered":"\n<p>Since I started Malwarebytes 15 years ago the threat landscape has changed. Our offerings have evolved. And now the next chapter of our journey begins today.&nbsp;&nbsp;<\/p>\n<p>How did we get here?&nbsp;<\/p>\n<p>My first cyber \u201ccombatant\u201d was an early form of adware running amok on my family\u2019s computer. Removing it was a team effort, and it led to the creation of the first iteration of Malwarebytes, a free tool built to help everyday people find and remove malware from their computers, without needing to scour forums, write code, or run scripts like I had.&nbsp;&nbsp;<\/p>\n<p>Malwarebytes turned out to be extremely popular. It did what no other product could, find malware and remove every trace. Although designed as a free tool for individuals, IT professionals downloaded it in droves. The vast amount of malware infections that common AV tools missed proved that organizations needed better detection as well as our remediation.&nbsp;&nbsp;<\/p>\n<p>Malwarebytes for Business was born.&nbsp;&nbsp;<\/p>\n<p>Organizations today must protect against more than malware. There are ransomware gangs, crypto-scammers, Advanced Persistent Threat groups, data exfiltration and extortion schemes, big-money exploits, disastrous zero-days, brute force attacks, Living-Off-the-Land techniques\u2014that anti-virus detection doesn\u2019t find\u2014and fast evolving social engineering tactics that will only advance with the broad availability of generative AI.&nbsp;&nbsp;<\/p>\n<p>But with the rapid increase of attack surfaces, security products have multiplied and become increasingly complex to deploy and manage. Many IT organizations are struggling with the number of consoles and increasing costs. Most don\u2019t have enough cybersecurity staff or budget to take down threat levels.&nbsp;<\/p>\n<p>For more than a decade, Malwarebytes has provided resource constrained IT organizations with the necessary tools to stop cybercriminals across the entire threat spectrum\u2014from attack surface reduction; through prevention, detection, and response; to remediation. Time and time again our products are tested, proven, and recognized, year after year, quarter after quarter. Importantly, we\u2019ve also made security simpler. Delivered in one lightweight agent, using one console, IT organizations can manage thousands of endpoints and vast security capabilities at once.&nbsp;&nbsp;<\/p>\n<p>Today, we launch a name that reflects the full scope of our business product line, the serious daily battle with adversaries on behalf of organizations, and embodies our mission \u2013 security that overpowers threats, not IT.\u202f\u202f&nbsp;&nbsp;<\/p>\n<p>I want to personally introduce you to \u201c<a href=\"http:\/\/www.threatdown.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">ThreatDown<\/a>, powered by Malwarebytes.\u201d The ThreatDown platform is focused on the problem we heard about most from our corporate customers, institutions and partners. No, not securing the software supply chain, cracking down on zero-day vulnerabilities, or stopping the growing spate of ransomware attacks (though all of those also rank high in importance).&nbsp;&nbsp;<\/p>\n<p>The biggest problem, simply enough, is complexity.&nbsp;&nbsp;<\/p>\n<p>For too long, even the most well-intentioned cybersecurity vendors and researchers have issued security recommendations in a vacuum, assuming every business has the same budget, staff size, and IT resources. Under this guise, the products our industry has sold are hardly \u201csolutions\u201d\u2014they are proposals.&nbsp;&nbsp;<\/p>\n<p>We know this isn\u2019t working for most organizations.&nbsp;&nbsp;<\/p>\n<p><a href=\"https:\/\/blogs.idc.com\/2023\/02\/21\/3-concrete-steps-smbs-should-take-now\/\" target=\"_blank\" rel=\"noreferrer noopener\">According to IDC,<\/a> 60 percent of mid-market companies only have 1 \u2013 4 full time IT people, making complex integrations, installations, or management of tech tools formidable. Similar research also shows that a simple configuration change could take IT teams a few hours, while more complex changes can take several days or even weeks, and that companies deploy an average of 55 different cybersecurity tools\u2014each with their own cloud-based console, agent, and management requirements.&nbsp;&nbsp;<\/p>\n<p>ThreatDown understands that meaningful cybersecurity \u201csolutions\u201d must consider an organization\u2019s ability to implement and embrace a security product and its toolset. This is why the ThreatDown portfolio isn\u2019t a list of individual products for organizations to figure out.&nbsp;&nbsp;<\/p>\n<p>Today we\u2019re also launching four ThreatDown Bundles that combine award-winning layers of protection, threat intelligence, and human expertise for IT-constrained organizations of all sizes and skill levels. These new bundles help organizations take down threats, while also taking down complexity and cost. Every bundle includes our Security Advisor, which provides a security score to illustrate a company\u2019s current level of protection, offers guidance on how to make improvements and enables IT to take immediate action.&nbsp;<\/p>\n<p>This is just the beginning.&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n<p>Fifteen years ago, with enormous help from around the world, we started something special with Malwarebytes. Today, we are doing that again.&nbsp;<\/p>\n<p>Join me as we overpower threats and empower IT together.&nbsp;&nbsp;<\/p>\n<p>Visit <a href=\"http:\/\/www.threatdown.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">www.threatdown.com<\/a> to learn more. &nbsp;<\/p>\n<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/11\/threatdown-a-new-chapter-for-malwarebytes\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> An evolution in cybersecurity is needed. It starts with us. Announcing ThreatDown. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[1001,32,30468],"class_list":["post-23320","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-business","tag-news","tag-threatdown"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23320"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23320\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}