Pro Video Engineering uses ThreatDown (by Malwarebytes) as our standard Endpoint Protection Platform (EPP) and, where contracted, Managed Detection and Response (MDR) solution to help protect customer systems from modern cyber threats.
This article explains what ThreatDown is, how it is used within customer environments, and what customers can expect in terms of protection, visibility, and responsibilities.
ThreatDown provides layered, behavior‑based protection against malware, ransomware, exploits, and advanced threats that traditional signature‑based antivirus solutions may not detect.
What is ThreatDown?
ThreatDown is an enterprise‑grade endpoint security platform that combines multiple security technologies into a single agent:
Next‑generation malware protection
Behavioral and heuristic threat detection
Exploit and ransomware mitigation
Centralized, cloud‑based management
Depending on the service package in place, ThreatDown may be deployed as:
Endpoint Protection Platform (EPP): Prevention‑focused endpoint security
Managed Detection & Response (MDR): EPP plus 24/7 monitoring and human‑led threat investigation and response
How Pro Video Engineering Uses ThreatDown
Endpoint Deployment
When included in a customer’s agreement, ThreatDown agents may be installed on supported systems, including:
Physical and virtual servers
Desktop workstations
Laptop computers
The agent runs in the background and is designed to operate with minimal impact on system performance.
Centralized Management
Endpoints are managed through ThreatDown’s secure cloud management console, which allows Pro Video Engineering to:
Apply and maintain security policies
Monitor endpoint health and protection status
Receive security alerts
Perform remote remediation actions where contractually permitted
Access to the management console is restricted using role‑based access controls.
Threat Monitoring & Response (MDR Only)
For customers with MDR coverage, ThreatDown provides:
24/7/365 security event monitoring by a dedicated security operations team
Validation and investigation of suspected threats
Containment actions such as process termination or endpoint isolation
Escalation and notification based on threat severity and contractual scope
Response actions and notification procedures are governed by the applicable Support Agreement or SLA.
Key Benefits
Proactive, behavior‑based threat prevention
Improved protection against ransomware and zero‑day attacks
Faster detection and response compared to traditional antivirus solutions
Lightweight agent with lower system overhead
Enterprise‑grade visibility without on‑premises management infrastructure
Subscription, Licensing & Availability
ThreatDown is offered by Pro Video Engineering as an à la carte, subscription‑based security service.
ThreatDown is not included by default with all system deployments or service agreements
Coverage requires an active subscription and properly assigned licenses
Only systems explicitly enrolled in ThreatDown are protected or monitored
Subscription costs, terms, and service levels vary based on EPP or MDR selection
If you are unsure whether your systems are covered under a ThreatDown subscription, or if you would like to add endpoint protection or upgrade to MDR services, please contact Pro Video Engineering.
Data Handling & Privacy
ThreatDown collects security‑related telemetry required to detect, investigate, and respond to threats. This may include:
File hashes and indicators of compromise
Process and application behavior
Operating system and endpoint metadata
Pro Video Engineering:
Does not access customer business data or user‑generated files
Does not monitor user activity unrelated to security events
Limits access to security data to authorized personnel only
All data collection and processing are governed by ThreatDown’s published security and privacy policies.
Customer Responsibilities
To ensure effective endpoint protection, customers are responsible for:
Maintaining supported and up‑to‑date operating systems
Allowing required outbound network connectivity for ThreatDown services
Not disabling, uninstalling, or tampering with the ThreatDown agent
Promptly reporting suspected security incidents to Pro Video Engineering
Limitations & Important Notes
ThreatDown does not replace the need for:
Regular operating system and application patching
Strong password policies and multi‑factor authentication
Network‑level security controls
Ongoing user security awareness training
Protection applies only to endpoints that are properly licensed and enrolled
The level of monitoring and response depends on whether EPP or MDR services are in place
Support & Incident Handling
Alerting, investigation, and response actions follow the terms of the active Support Agreement or SLA
Systems not covered by an active agreement may not be monitored or responded to
Emergency response or remediation outside contracted services may be billable
Questions or Changes
For questions about your ThreatDown deployment, coverage level, or to request additional endpoints or MDR services, please contact Pro Video Engineering Support.
This knowledge base article is provided for informational purposes only. Specific capabilities, response actions, coverage, and service levels may vary based on contract scope, licensing, and system eligibility.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article