ThreatDown EPP & MDR – Customer Overview

Created by Nicholas Longnecker, Modified on Wed, 4 Feb at 1:36 PM by Nicholas Longnecker

Pro Video Engineering uses ThreatDown (by Malwarebytes) as our standard Endpoint Protection Platform (EPP) and, where contracted, Managed Detection and Response (MDR) solution to help protect customer systems from modern cyber threats.

This article explains what ThreatDown is, how it is used within customer environments, and what customers can expect in terms of protection, visibility, and responsibilities.

ThreatDown provides layered, behavior‑based protection against malware, ransomware, exploits, and advanced threats that traditional signature‑based antivirus solutions may not detect.


What is ThreatDown?

ThreatDown is an enterprise‑grade endpoint security platform that combines multiple security technologies into a single agent:

  • Next‑generation malware protection

  • Behavioral and heuristic threat detection

  • Exploit and ransomware mitigation

  • Centralized, cloud‑based management

Depending on the service package in place, ThreatDown may be deployed as:

  • Endpoint Protection Platform (EPP): Prevention‑focused endpoint security

  • Managed Detection & Response (MDR): EPP plus 24/7 monitoring and human‑led threat investigation and response


How Pro Video Engineering Uses ThreatDown

Endpoint Deployment

When included in a customer’s agreement, ThreatDown agents may be installed on supported systems, including:

  • Physical and virtual servers

  • Desktop workstations

  • Laptop computers

The agent runs in the background and is designed to operate with minimal impact on system performance.


Centralized Management

Endpoints are managed through ThreatDown’s secure cloud management console, which allows Pro Video Engineering to:

  • Apply and maintain security policies

  • Monitor endpoint health and protection status

  • Receive security alerts

  • Perform remote remediation actions where contractually permitted

Access to the management console is restricted using role‑based access controls.


Threat Monitoring & Response (MDR Only)

For customers with MDR coverage, ThreatDown provides:

  • 24/7/365 security event monitoring by a dedicated security operations team

  • Validation and investigation of suspected threats

  • Containment actions such as process termination or endpoint isolation

  • Escalation and notification based on threat severity and contractual scope

Response actions and notification procedures are governed by the applicable Support Agreement or SLA.


Key Benefits

  • Proactive, behavior‑based threat prevention

  • Improved protection against ransomware and zero‑day attacks

  • Faster detection and response compared to traditional antivirus solutions

  • Lightweight agent with lower system overhead

  • Enterprise‑grade visibility without on‑premises management infrastructure


Subscription, Licensing & Availability

ThreatDown is offered by Pro Video Engineering as an à la carte, subscription‑based security service.

  • ThreatDown is not included by default with all system deployments or service agreements

  • Coverage requires an active subscription and properly assigned licenses

  • Only systems explicitly enrolled in ThreatDown are protected or monitored

  • Subscription costs, terms, and service levels vary based on EPP or MDR selection

If you are unsure whether your systems are covered under a ThreatDown subscription, or if you would like to add endpoint protection or upgrade to MDR services, please contact Pro Video Engineering.


Data Handling & Privacy

ThreatDown collects security‑related telemetry required to detect, investigate, and respond to threats. This may include:

  • File hashes and indicators of compromise

  • Process and application behavior

  • Operating system and endpoint metadata

Pro Video Engineering:

  • Does not access customer business data or user‑generated files

  • Does not monitor user activity unrelated to security events

  • Limits access to security data to authorized personnel only

All data collection and processing are governed by ThreatDown’s published security and privacy policies.


Customer Responsibilities

To ensure effective endpoint protection, customers are responsible for:

  • Maintaining supported and up‑to‑date operating systems

  • Allowing required outbound network connectivity for ThreatDown services

  • Not disabling, uninstalling, or tampering with the ThreatDown agent

  • Promptly reporting suspected security incidents to Pro Video Engineering


Limitations & Important Notes

  • ThreatDown does not replace the need for:

    • Regular operating system and application patching

    • Strong password policies and multi‑factor authentication

    • Network‑level security controls

    • Ongoing user security awareness training

  • Protection applies only to endpoints that are properly licensed and enrolled

  • The level of monitoring and response depends on whether EPP or MDR services are in place


Support & Incident Handling

  • Alerting, investigation, and response actions follow the terms of the active Support Agreement or SLA

  • Systems not covered by an active agreement may not be monitored or responded to

  • Emergency response or remediation outside contracted services may be billable


Questions or Changes

For questions about your ThreatDown deployment, coverage level, or to request additional endpoints or MDR services, please contact Pro Video Engineering Support.



This knowledge base article is provided for informational purposes only. Specific capabilities, response actions, coverage, and service levels may vary based on contract scope, licensing, and system eligibility.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons

Feedback sent

We appreciate your effort and will try to fix the article