Best Software for 2025 is now live!
Save to My Lists
Claimed
Claimed

Carbon Black Cloud Features

Top Rated Carbon Black Cloud Alternatives

Filter for Features

Administration

Compliance

Monitors assets and enforces security policies to audit assets and infrastructure security.

Not enough data

Web Control

Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network.

Not enough data

Application Control

Blocks endpoint users from accessing restricted applications.

Not enough data

Asset Management

Keeps records of each network asset and its activity. Discovers new assets accessing the network.

Not enough data

Device Control

Manages user network accessibility on laptops and mobile devices.

Not enough data

Functionality

System Isolation

Cuts off network connection or temporarily inactivate applications until incidents are remedied.

Not enough data

Firewall

Protects endpoint devices from a variety of attacks and malware threats.

Not enough data

Endpoint Intelligence

Analysis for users to examine threat intelligence data specific to their endpoint devices.

Not enough data

Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

Not enough data

Analysis

Automated Remediation

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

Not enough data

Incident Reports

Produces reports detailing trends and vulnerabilities related to their network and infrastructure.

Not enough data

Behavioral Analysis

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.

Not enough data

Detection & Response

Response Automation

Reduces time spent remedying issues manually. Resolves common network security incidents quickly.

Not enough data

Threat Hunting

Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks.

Not enough data

Rule-Based Detection

Allows administrators to set rules specified to detect issues related to issues such as sensitive data misuse, system misconfiguration, lateral movement, and/or non-compliance.

Not enough data

Real-Time Detection

Constantly monitors system to detect anomalies in real time.

Not enough data

Management

Extensibility

Allows for customized support for hybrid environments

Not enough data

Workflow Automation

Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.

Not enough data

Unified Visibility

Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.

Not enough data

Analytics

Threat Intelligence

Stores information related to common threats and how to resolve them once incidents occur.

Not enough data

Artificial Intelligence & Machine Learning

Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis.

Not enough data

Data Collection

Collects information from multiple sources to cross reference and build contextual to correlate intelligence.

Not enough data