Jump to content

Endpoint Protection vs Endpoint Security?

Recommended Posts

Dear Malwarebytes,

What is the differences between Endpoint Protection and Endpoint Security besides telling me one is Server based and one is Cloud based.
I need to know more in details as well as the pros and cons between the two.

I heard some said that the Cloud based is better protection because it uses newer technologies? Please clarify for me.


Link to post
Share on other sites
  • Staff

Here are some excerpts from some previous answers to this question.


On 9/19/2017 at 10:07 AM, djacobson said:

Endpoint Protection is our latest product. It is based on the new MB3 technology; Anti-Malware, Anti-Exploit, Anti-Rootkit and Anti-Ransomware technology are all combined into one single modular client. It centrally manages all endpoints via a software as a service login that you can access anywhere. Endpoint Protection - https://www.malwarebytes.com/pdf/datasheets/MBEPDatasheet.pdf

Endpoint Security is our legacy program. It centrally manages Anti-Malware and Anti-Exploit via an on-premises install to a local server. Anti-Malware, Anti-Exploit, Anti-Rootkit and Anti-Ransomware technology are all separate programs in this version. Anti-Rootkit and Anti-Ransomware are standalone only tools in this version and are not centrally manageable. Endpoint Security - https://www.malwarebytes.com/pdf/datasheets/MBESDatasheet.pdf


On 11/26/2018 at 2:28 PM, djacobson said:

There's quite a few MBES versus MBEP posts in the business section, I'll skip this portion as it is extensive, and Kalrand hit the main point of it. Though I won't leave you empty handed, the most complete way to get an idea of differences would be the check out the admin guides:

MBES Admin guide - https://support.malwarebytes.com/docs/DOC-1723
MBEP Admin guide - https://support.malwarebytes.com/docs/DOC-1802

The GDPR question, we are fully compliant. 

In MBEP, no user identifying information is saved. The data collected from the machines is the program's operational state, an encrypted version of the file sample we detected if there is a hit, and if we removed it or not.

MBES is on-premises and integrates with AD, it saves all client info to an SQL database, it is up to the admin to keep this database secure.


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    No registered users viewing this page.

Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.