{"id":7176,"date":"2022-09-07T11:31:19","date_gmt":"2022-09-07T08:31:19","guid":{"rendered":"https:\/\/cyberone.bg\/?page_id=7176"},"modified":"2022-09-07T13:20:21","modified_gmt":"2022-09-07T10:20:21","slug":"endpoint-protection","status":"publish","type":"page","link":"https:\/\/cyberone.bg\/en\/endpoint-protection","title":{"rendered":"Endpoint Protection"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"7176\" class=\"elementor elementor-7176 elementor-5342\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f983331 elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"f983331\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5fac18f ot-flex-column-vertical\" data-id=\"5fac18f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-31192d2 elementor-widget elementor-widget-iheading\" data-id=\"31192d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ An innovative solution to protect your devices<\/span>\r\n\t        <h2 class=\"main-heading\">Malwarebytes Endpoint Protection<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f562a13 elementor-widget elementor-widget-heading\" data-id=\"f562a13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">For cybercriminals, the primary target remains enterprise networks, where data, users and enterprise systems come together to generate and implement business processes. To protect your enterprise endpoints and prevent unauthorized parties from using them as entry points into your infrastructure, your IT security team should review ways to enhance your existing security. Implementing the full lifecycle of endpoint protection, from automatically blocking a common threat to quickly and appropriately responding to complex incidents, requires preventative technologies complemented by advanced defense capabilities.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ffca32b elementor-widget elementor-widget-heading\" data-id=\"ffca32b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\"><b>Malwarebytes Endpoint Protection<\/b> provides affordable security with massive visibility across all enterprise network endpoints together, with superior protection enabling the automation of routine tasks to detect, prioritize, investigate and neutralize sophisticated threats and APT-like attacks.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1eca01c elementor-widget elementor-widget-heading\" data-id=\"1eca01c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\"><b>CYBERONE<\/b> is an official partner of Malwarebytes and as such we can provide our customers with access to the Nebula\u00ae and Oneview\u00ae platforms as part of the service. Whether you use Endpoint Protection or Endpoint Protection and Response for your endpoints, we'll provide you with monitoring and support, as well as a 24\/7 emergency hotline.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4413432 elementor-widget elementor-widget-image\" data-id=\"4413432\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2500\" height=\"403\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2021\/10\/malwarebytes-logo-vector.svg\" class=\"attachment-full size-full wp-image-5676\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c2683a6 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c2683a6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-c78c094 ot-flex-column-vertical\" data-id=\"c78c094\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-30f5848 elementor-widget elementor-widget-iservice_box\" data-id=\"30f5848\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iservice_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"service-box s-box\">\r\n\t\t\t<span class=\"big-number\"><\/span>\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-correct\"><\/span>\t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5><a href=\"#general-info\">Information<\/a><\/h5>\r\n\t            <p><a href=\"#\">about Malwarebytes EP<\/a><\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-3685830 ot-flex-column-vertical\" data-id=\"3685830\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-403e727 elementor-widget elementor-widget-iservice_box\" data-id=\"403e727\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iservice_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"service-box s-box\">\r\n\t\t\t<span class=\"big-number\"><\/span>\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-correct\"><\/span>\t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5><a href=\"#capabilities\">Advantages<\/a><\/h5>\r\n\t            <p><a href=\"#capabilities\">and capabilities<\/a><\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-d000ccb ot-flex-column-vertical\" data-id=\"d000ccb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fa18db0 elementor-widget elementor-widget-iservice_box\" data-id=\"fa18db0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iservice_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"service-box s-box\">\r\n\t\t\t<span class=\"big-number\"><\/span>\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-correct\"><\/span>\t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5><a href=\"#edr\">Information<\/a><\/h5>\r\n\t            <p><a href=\"#edr\">about Malwarebytes EPR<\/a><\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9641323 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9641323\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-174bc8b ot-flex-column-vertical\" data-id=\"174bc8b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bdf95a7 elementor-widget elementor-widget-iservice_box\" data-id=\"bdf95a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iservice_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"service-box s-box\">\r\n\t\t\t<span class=\"big-number\"><\/span>\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-correct\"><\/span>\t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5><a href=\"#edr-vs-av\">Malwarebytes EP(R)<\/a><\/h5>\r\n\t            <p><a href=\"#edr-vs-av\">vs normal antivirus software<\/a><\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-b5be923 ot-flex-column-vertical\" data-id=\"b5be923\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dd1739a elementor-widget elementor-widget-iservice_box\" data-id=\"dd1739a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iservice_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"service-box s-box\">\r\n\t\t\t<span class=\"big-number\"><\/span>\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-correct\"><\/span>\t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5><a href=\"#why-edr\">Why companies<\/a><\/h5>\r\n\t            <p><a href=\"#why-edr\">need EP(R)<\/a><\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-d9b0e56 ot-flex-column-vertical\" data-id=\"d9b0e56\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1d69a63 elementor-widget elementor-widget-iservice_box\" data-id=\"1d69a63\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iservice_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n\t\t<div class=\"service-box s-box\">\r\n\t\t\t<span class=\"big-number\"><\/span>\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-correct\"><\/span>\t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5><a href=\"#benefit-roi\">Benefits and ROI<\/a><\/h5>\r\n\t            <p><a href=\"#benefit-roi\">for your organization<\/a><\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d77ec2c elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"d77ec2c\" data-element_type=\"section\" data-e-type=\"section\" id=\"general-info\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2541bf9 ot-flex-column-vertical\" data-id=\"2541bf9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-91bf98c elementor-widget elementor-widget-iheading\" data-id=\"91bf98c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Additional information about the service<\/span>\r\n\t        <h2 class=\"main-heading\">Malwarebytes Endpoint Protection<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c2ab62e elementor-widget elementor-widget-heading\" data-id=\"c2ab62e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Malwarebytes (EP) for Windows and Mac can easily replace or complement other endpoint security solutions, including Microsoft Defender. The software is known for being a seamless, simple and cost-effective deployment solution through a single endpoint agent and offers robust integrations and compatibility.<br>\n- Non-disruptive, deployment within minutes (even on AD networks)<br>\n- One endpoint agent, for all Malwarebytes services, simple integration<br>\n- An intuitive cloud management console that is also used by our SOC.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29d598f elementor-widget elementor-widget-heading\" data-id=\"29d598f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Enter the world of Malwarebytes Endpoint Protection, a complete malware protection and removal solution with predictive threat detection, proactive threat blocking, and integrated end-to-end protection. Powered by Malwarebytes' cloud technologies, Endpoint Protection software provides flexible management and speed of their PC and server protection software for organizations of all sizes.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7673033 elementor-widget elementor-widget-heading\" data-id=\"7673033\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">With Malwarebytes cloud management software, you can easily scale to meet future requirements. Our cyber intelligence expertise provides you with a solution powered by threat intelligence from millions of endpoints, both business and consumer. Malwarebytes Nebula and OneView's REST API makes it easy to integrate with SIEM, SOAR, ITSM, etc. for further automation and compatibility.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3ecb356 ot-flex-column-vertical\" data-id=\"3ecb356\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-26dfb94 elementor-widget elementor-widget-image\" data-id=\"26dfb94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Cyber-attack-bro-1024x1024.png\" class=\"attachment-large size-large wp-image-6485\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Cyber-attack-bro-1024x1024.png 1024w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Cyber-attack-bro-300x300.png 300w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Cyber-attack-bro-150x150.png 150w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Cyber-attack-bro-768x768.png 768w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Cyber-attack-bro-1536x1536.png 1536w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Cyber-attack-bro-720x720.png 720w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/08\/Cyber-attack-bro.png 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b89ff70 elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"b89ff70\" data-element_type=\"section\" data-e-type=\"section\" id=\"capabilities\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f94793b ot-flex-column-vertical\" data-id=\"f94793b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bad7a5f elementor-widget elementor-widget-iheading\" data-id=\"bad7a5f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Advantages of our solution<\/span>\r\n\t        <h2 class=\"main-heading\">Advantages and opportunities<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6fc9557 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"6fc9557\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1a67de1 ot-flex-column-vertical\" data-id=\"1a67de1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0c6e5dc elementor-widget elementor-widget-iiconbox2\" data-id=\"0c6e5dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-code\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Comprehensive protection and speed<\/h5>\r\n\t            <p>Many endpoint security solutions flood endpoints with ever-growing databases of malware signatures, and this leads to poor performance due to heavy scanning algorithms. In contrast, Malwarebytes uses a single, low-demand agent that quickly identifies and blocks the execution of malicious code without affecting device performance.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-fdde9cb ot-flex-column-vertical\" data-id=\"fdde9cb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ad9ebd4 elementor-widget elementor-widget-iiconbox2\" data-id=\"ad9ebd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-world-globe\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Sophisticated web protection<\/h5>\r\n\t            <p>The Web Protection module proactively prevents users from accessing malicious sites, malicious ads, scam networks, and suspicious URLs, as well as downloading potentially unwanted programs and those that would lead to potentially unwanted modifications. You can also add additional blacklisted or whitelisted domains, depending on your organization's policies.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6b47694 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"6b47694\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-fcd20b6 ot-flex-column-vertical\" data-id=\"fcd20b6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a04841 elementor-widget elementor-widget-iiconbox2\" data-id=\"9a04841\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-data\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>The right kind of Machine learning<\/h5>\r\n\t            <p>Instead of training for malware, Malwarebytes' Machine Learning model is trained to recognize good software - properly signed code from known vendors. The result is a predictive malware inference that becomes faster to determine and more accurate over time.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-14050ee ot-flex-column-vertical\" data-id=\"14050ee\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7b288de elementor-widget elementor-widget-iiconbox2\" data-id=\"7b288de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-best\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>The fastest threat intelligence on the market<\/h5>\r\n\t            <p>Take advantage of malware detection and remediation information collected from millions of enterprise and private end devices. Even new, unidentified malware is usually eliminated before it can affect your endpoints because its runtime behavior is actively monitored.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-79425ef elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"79425ef\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2934d1a ot-flex-column-vertical\" data-id=\"2934d1a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7ef0ba5 elementor-widget elementor-widget-iiconbox2\" data-id=\"7ef0ba5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-shield\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Protected devices and services<\/h5>\r\n\t            <p>Malwarebytes secures your devices by blocking public exploits, stopping unauthorized code execution, and interrupting communication with proven malicious malware servers to dramatically reduce the risk of your organization being compromised.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7d9a5e5 ot-flex-column-vertical\" data-id=\"7d9a5e5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f46285e elementor-widget elementor-widget-iiconbox2\" data-id=\"f46285e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-laptop\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Behavior-based blocking<\/h5>\r\n\t            <p>Malwarebytes performs constant behavior-based analysis, provides near-real-time identification of behavior that is clearly malicious, and automatically blocks the threat, providing the most proactive and intelligent protection on the market today.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2505a61 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"2505a61\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8f31349 ot-flex-column-vertical\" data-id=\"8f31349\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3af3333 elementor-widget elementor-widget-iiconbox2\" data-id=\"3af3333\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-iot\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>All Cloud management<\/h5>\r\n\t            <p>A full suite of endpoint protection functionality and automation capabilities, managed by the Malwarebytes Nebula cloud platform and accessible from an intuitive user interface, make fighting malware a matter of clicks, not writing codes, scripts and workarounds.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-6675046 ot-flex-column-vertical\" data-id=\"6675046\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bdab7f9 elementor-widget elementor-widget-iiconbox2\" data-id=\"bdab7f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-ui\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Prevention of 0day attacks<\/h5>\r\n\t            <p>Malwarebytes applies the analysis of so-called payloads that do not appear in the unified signature database and tries to find anomalies to identify and block malware that tries to exploit hidden vulnerabilities in your organization's operating systems and applications.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2ac8596 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"2ac8596\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-88fdff6 ot-flex-column-vertical\" data-id=\"88fdff6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a7bef2 elementor-widget elementor-widget-iiconbox2\" data-id=\"3a7bef2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-sketch\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Tracks infection, successfully quarantines<\/h5>\r\n\t            <p>Malwarebytes Linking Engine tracks every installation, modification, and process instantiation\u2014including executables in memory that other anti-malware packages miss\u2014taking a complete inventory of the threat, enabling complete remediation. Separately, the customer and security professionals have a complete history of every single change and action in the form of an intuitive interface.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-01425f6 ot-flex-column-vertical\" data-id=\"01425f6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ea7397a elementor-widget elementor-widget-iiconbox2\" data-id=\"ea7397a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        \t\t\t    \t\t        <span class=\"flaticon-ui\"><\/span>\t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Analyzes risks to save your IT team time<\/h5>\r\n\t            <p>Our solution provides extensive threat analysis along with an assessment of their potential impact. Your IT team can save time and effectively communicate potential impacts and risks to executive management.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-eea2181 elementor-widget elementor-widget-image\" data-id=\"eea2181\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"799\" height=\"250\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2021\/10\/mw_process.png\" class=\"attachment-large size-large wp-image-5697\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2021\/10\/mw_process.png 799w, https:\/\/cyberone.bg\/wp-content\/uploads\/2021\/10\/mw_process-300x94.png 300w, https:\/\/cyberone.bg\/wp-content\/uploads\/2021\/10\/mw_process-768x240.png 768w, https:\/\/cyberone.bg\/wp-content\/uploads\/2021\/10\/mw_process-720x225.png 720w\" sizes=\"(max-width: 799px) 100vw, 799px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b17edae elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"b17edae\" data-element_type=\"section\" data-e-type=\"section\" id=\"edr\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fa83dc6 ot-flex-column-vertical\" data-id=\"fa83dc6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f1d6837 elementor-widget elementor-widget-iheading\" data-id=\"f1d6837\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Antivirus software solution... and more<\/span>\r\n\t        <h2 class=\"main-heading\">Malwarebytes Endpoint Protection and Response<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9c8136 elementor-widget elementor-widget-heading\" data-id=\"b9c8136\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\"><b>Malwarebytes EDR <\/b>includes integrated endpoint protection and automated adaptive detection techniques that learn at every stage of the threat detection process. Unlike more reactive signature-based solutions that allow malware to run before it actually starts working, Malwarebytes Endpoint Protection\nEDR detects and blocks threats before devices are infected. Malwarebytes EDR proactively and accurately detects and prevents both malicious code and suspicious behavior.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8334d39 elementor-widget elementor-widget-heading\" data-id=\"8334d39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">The software uses unique Machine Learning technology to detect not only known threats, but also to find unknown ones. Malwarebytes EDR boasts higher accuracy and lower false-positives than the normal product designed for smaller organizations, which is why they have one of the lowest false-positive rates in the industry. Granular isolation capabilities prevent lateral movement in an active attack, allowing you to quarantine and completely isolate individual machines, subnets, or groups and continue active remediation and investigation activities.<br>\n- Detects 0day threats with very few false positives.<br>\n- Granular isolation for Windows processes, networks, and desktops.<br>\n- Removes executables, artifacts, and changes to settings and registries.<br><\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e8c42e elementor-widget elementor-widget-heading\" data-id=\"4e8c42e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">For Windows platforms, Malwarebytes EDR includes a unique 72-hour ransomware recovery technology that can turn back the clock and quickly return your business and its documents to a previous state. If an attack affects user files, Malwarebytes can easily roll back those changes to restore files that were encrypted, deleted, or modified in a ransomware attack.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-046018c elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"046018c\" data-element_type=\"section\" data-e-type=\"section\" id=\"edr-vs-av\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4de91be ot-flex-column-vertical\" data-id=\"4de91be\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0869be8 elementor-widget elementor-widget-iheading\" data-id=\"0869be8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Advantages and <strike>disadvantages<\/strike><\/span>\r\n\t        <h2 class=\"main-heading\">EDR vs traditional antivirus software<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43ea420 elementor-widget elementor-widget-heading\" data-id=\"43ea420\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">On the one hand, you have out-of-the-box antivirus software designed for the user who wants to protect multiple personal devices on their home network at home. An antivirus program stops computer viruses, but it can also stop modern threats such as some ransomware, adware, and Trojan malware.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a151a4 elementor-widget elementor-widget-heading\" data-id=\"6a151a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">On the other hand, you have EDR for the business user protecting hundreds, potentially thousands of end devices simultaneously. The devices can be personal employee devices (BYOD) as well as workstations that are governed by the company's corporate policies.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8a1c3e elementor-widget elementor-widget-heading\" data-id=\"d8a1c3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">When it comes to threat analysis, the typical user just wants to know that their devices are protected. Counting and reporting does not extend much beyond how many threats and what types of threats were blocked in a given period of time. This is not enough for a business user. Security administrators need to know \u201cWhat happened to my endpoints before and what is happening to my endpoints now?\u201d Traditional antivirus software is not good at answering these questions, but this is where EDR excels. At any given time, EDR has a view on\nthe daily functions of the endpoint. When something outside of normal computer operations and functions occurs, administrators are alerted, presented with the full range of incident information, and given a number of options for action. <br><br>\n\n<b>Some capabilities that Malwarebytes EDR offers that are different from traditional antivirus software<\/b><br>\n- Isolate the computer from the network<br>\n- Isolate the user from the computer<br>\n- Shutdown, isolation and control over active processes<br>\n- Update installed software, operating system, software agent of Malwarebytes<br>\n- Possibility of full tracking of each process, what and how it performed over time, including sub-processes, impacts on other processes, etc.<br>\n- Ability to recover files affected by Ransomware in 72 hours. back.<br>\n- Ability to create detailed exceptions for files that are misdiagnosed as virus\/malicious. (IP, MD5 hash, SHA1 hash, wildcard name, folder, full path exclusions)<br>\n- Ability to apply detailed policies for different software settings on protected computers.<br>\n- Ability to apply automatic notification for different events, criticality, categories, etc.<br>\n- Option to add additional threats you wish to be blocked.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0f4f2da elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"0f4f2da\" data-element_type=\"section\" data-e-type=\"section\" id=\"why-edr\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9f5706b ot-flex-column-vertical\" data-id=\"9f5706b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e998bd elementor-widget elementor-widget-iheading\" data-id=\"7e998bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ The free antivirus you downloaded from the internet is not enough...<\/span>\r\n\t        <h2 class=\"main-heading\">Why do companies need EDR software?<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-043893c elementor-widget elementor-widget-heading\" data-id=\"043893c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">The biggest threat at the moment are so-called ransomware attacks. In a really huge part of the business, it happens that even with the help of 1 compromised computer, malicious individuals access information and data for the entire company. What follows after that is usually stealing (downloading) the compromised data and infecting key company assets with Ransomware for extortion purposes.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5288e05 elementor-widget elementor-widget-heading\" data-id=\"5288e05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Over the years, this practice has proven to be the MOST PROFITABLE for malicious hackers and they take advantage of it to make a quick profit. Many huge companies, some of them international giants, were extorted for millions. Some of them paid, some didn't, but most importantly, each of these companies suffered untold losses - both financial and reputational.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-785f9a5 elementor-widget elementor-widget-heading\" data-id=\"785f9a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">Organizations of all sizes are being targeted by gangs of cybercriminals looking for big results from companies that operate with valuable and\/or confidential information. Local authorities, schools, hospitals and managed service providers (MSPs) are just as likely to fall victim to a hack or ransomware infection.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6876f55 elementor-widget elementor-widget-image\" data-id=\"6876f55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"460\" height=\"259\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/01\/ransomware_stats.png\" class=\"attachment-full size-full wp-image-5733\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/01\/ransomware_stats.png 460w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/01\/ransomware_stats-300x169.png 300w\" sizes=\"(max-width: 460px) 100vw, 460px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-31226e3 elementor-section-content-middle elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"31226e3\" data-element_type=\"section\" data-e-type=\"section\" id=\"benefit-roi\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2288194 ot-flex-column-vertical\" data-id=\"2288194\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b909595 elementor-widget elementor-widget-iheading\" data-id=\"b909595\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ Investing in your cyber defense is always preferable to potential losses<\/span>\r\n\t        <h2 class=\"main-heading\">Benefits and return on investment<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f60fef elementor-widget elementor-widget-heading\" data-id=\"5f60fef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">The biggest threat at the moment are so-called ransomware attacks. In a really huge part of the business, it happens that even with the help of 1 compromised computer, malicious individuals access information and data for the entire company. What follows after that is usually stealing (downloading) the compromised data and infecting key company assets with Ransomware for extortion purposes.<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-9f8f030 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"9f8f030\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-cfcde00 ot-flex-column-vertical\" data-id=\"cfcde00\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24d13ce elementor-widget elementor-widget-iiconbox2\" data-id=\"24d13ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        <i aria-hidden=\"true\" class=\"fab fa-searchengin\"><\/i>\t\t\t    \t\t        \t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Incident detection<\/h5>\r\n\t            <p>EP\/EDR software solutions detect incidents that might otherwise go unnoticed. This technology proactively analyzes everything that happens on the computer to detect indicators of malicious activity. Additionally, because it collects events from all sources on the network, the system can reconstruct the timeline of an attack to help determine its nature and impact. The platform communicates recommendations to security controls \u2013 for example, changing settings or computer configuration.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2bdd3d8 ot-flex-column-vertical\" data-id=\"2bdd3d8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a4a0bb5 elementor-widget elementor-widget-iiconbox2\" data-id=\"a4a0bb5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        <i aria-hidden=\"true\" class=\"fas fa-clipboard-check\"><\/i>\t\t\t    \t\t        \t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Compliance with regulations<\/h5>\r\n\t            <p>Companies use EP and EDR software to meet compliance requirements by generating reports that address all recorded security events among these sources. Without such software, the organization must manually manage all antivirus software and report\/scan on demand and manually. A number of industries have mandatory security controls, some of which include the requirement for next-generation anti-virus software or centralized cybersecurity systems.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-acd26f3 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"acd26f3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-bcf1d01 ot-flex-column-vertical\" data-id=\"bcf1d01\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eb502ff elementor-widget elementor-widget-iiconbox2\" data-id=\"eb502ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        <i aria-hidden=\"true\" class=\"fas fa-user-check\"><\/i>\t\t\t    \t\t        \t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>Better efficiency of the IT department<\/h5>\r\n\t            <p>EP\/EDR tools can greatly improve your efficiency when it comes to understanding and handling events in your IT environment. You can view security log data from many different hosts on your system from a single interface. This speeds up the incident handling process in several ways. First, the ability to easily see log data (logs) from the hosts in your environment. This allows your IT team to quickly identify and respond if necessary to the problem. Second, centralized data allows you to easily identify hosts that have been affected by an attack or security incident.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4d3b4c3 ot-flex-column-vertical\" data-id=\"4d3b4c3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-de0d20f elementor-widget elementor-widget-iiconbox2\" data-id=\"de0d20f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iiconbox2.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"icon-box-s2 s1\">\r\n\t\t\t<div class=\"icon-main\">\r\n\t\t        <i aria-hidden=\"true\" class=\"far fa-hand-spock\"><\/i>\t\t\t    \t\t        \t\t        \t        <\/div>\r\n\t        <div class=\"content-box\">\r\n\t            <h5>One solution to several problems<\/h5>\r\n\t            <p>Companies typically use multiple different security solutions at the same time. This is due to the fact that each security solution has its flaws and shortcomings, and accordingly, with a newly identified risk, the company simply implements new software. Malwarebytes offers a cyber security solution that deals with the problems of dangerous emails, malicious domains, outdated software that allows the computer\/system to be compromised, targeted attacks with popular vulnerabilities, as well as traditional Adware\/Spyware problems that usually fly under the radar of most security software due to their innocuous nature.<\/p>\r\n\t        <\/div>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-17ebfad ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"17ebfad\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-96991de ot-flex-column-vertical\" data-id=\"96991de\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a50d744 elementor-widget elementor-widget-image\" data-id=\"a50d744\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1580\" height=\"869\" src=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/01\/oneview_preview.png\" class=\"attachment-full size-full wp-image-5741\" alt=\"\" srcset=\"https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/01\/oneview_preview.png 1580w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/01\/oneview_preview-300x165.png 300w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/01\/oneview_preview-1024x563.png 1024w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/01\/oneview_preview-768x422.png 768w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/01\/oneview_preview-1536x845.png 1536w, https:\/\/cyberone.bg\/wp-content\/uploads\/2022\/01\/oneview_preview-720x396.png 720w\" sizes=\"(max-width: 1580px) 100vw, 1580px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ An innovative solution to protect your devices Malwarebytes Endpoint Protection For cybercriminals, the primary target remains enterprise networks, where data, users and enterprise systems come together to generate and implement business processes. To protect your enterprise endpoints and prevent unauthorized parties from using them as entry points into your infrastructure, your IT security team [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7176","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7176","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=7176"}],"version-history":[{"count":27,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7176\/revisions"}],"predecessor-version":[{"id":7212,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/pages\/7176\/revisions\/7212"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=7176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}