{"id":44801,"date":"2024-03-20T21:11:18","date_gmt":"2024-03-20T21:11:18","guid":{"rendered":"https:\/\/www.pax8.com\/en-us\/?post_type=vendors&#038;p=44801"},"modified":"2025-11-17T17:57:34","modified_gmt":"2025-11-17T17:57:34","slug":"threatdown","status":"publish","type":"vendors","link":"https:\/\/www.pax8.com\/en-us\/vendors\/threatdown\/","title":{"rendered":"ThreatDown"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>ThreatDown is on a mission to overpower threats and empower IT by removing the complexity of detecting and stopping today\u2019s most advanced threats.<\/p>\n","protected":false},"featured_media":47849,"menu_order":0,"template":"","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"categories":[199,111,200,173,91,114],"class_list":["post-44801","vendors","type-vendors","status-publish","has-post-thumbnail","hentry","category-edr-endpoint-detection-response","category-endpoint-security","category-mdr-managed-detection-response","category-network-security","category-security","category-web-security"],"acf":{"vendor_name":"ThreatDown","short_description":"ThreatDown, powered by Malwarebytes, is on a mission to overpower threats and empower IT by removing the complexity of detecting and stopping today\u2019s most advanced threats. With the rapid increase of attack surfaces, security products have multiplied and become increasingly complicated to deploy and manage for IT organizations with limited resources. ThreatDown solutions pair technology with services to streamline security and provide robust protection that\u2019s efficient and cost-effective. Core to the ThreatDown DNA is a decade-plus of experience detecting and eliminating malware that others missed.  \r\n&nbsp;\r\nThreatDown extends the Malwarebytes superior remediation to all threat types, combining endpoint protection, Endpoint Detection and Response (EDR), and Managed Detection and Response (MDR) to cover all stages of an attack, managed services to augment resource-constrained IT teams, and Security Advisor to instantly maximize security postures. ThreatDown, powered by Malwarebytes \u2014 take down threats, complexity, and costs. ","greyscale_logo":"","colored_logo":"","products":[{"product":"<h4><strong>Security<\/strong><\/h4>\r\n<br>&nbsp;<br>\r\n<h5>Endpoint security<\/h5>\r\n<br>&nbsp;<br>\r\n<ul>\r\n\t<li>ThreatDown OneView<\/li>\r\n<\/ul>"},{"product":"<h4>&nbsp;<\/h4>\r\n<br>&nbsp;<br>\r\n<h5>Network security<\/h5>\r\n<br>&nbsp;<br>\r\n<ul>\r\n\t<li>ThreatDown OneView<\/li>\r\n<\/ul>"},{"product":"<h5>Web security<\/h5>\r\n<br>&nbsp;<br>\r\n<ul>\r\n\t<li>ThreatDown OneView<\/li>\r\n<\/ul>"},{"product":"<h5>EDR (Endpoint Detection and Response)<\/h5>\r\n<br>&nbsp;<br>\r\n<ul>\r\n\t<li>ThreatDown OneView<\/li>\r\n<\/ul>"},{"product":"<h5>MDR (Managed Detection and Response)<\/h5>\r\n<br>&nbsp;<br>\r\n<ul>\r\n\t<li>ThreatDown OneView<\/li>\r\n<\/ul>"},{"product":"&nbsp;"}],"resource_url":"https:\/\/www.pax8.com\/en-us\/vendors\/threatdown\/resources\/","vendor_flag":"null"},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/vendors\/44801","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/vendors"}],"about":[{"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/types\/vendors"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/media\/47849"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/media?parent=44801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/en-us\/wp-json\/wp\/v2\/categories?post=44801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}