Top Rated Carbon Black EDR Alternatives
86 Carbon Black EDR Reviews
Overall Review Sentiment for Carbon Black EDR
Log in to view review sentiment.
The way this EDR tool uses intelligence in detecting sophisticated attacks and threats . This is a great tool for investigation for analyst team in soc operations . Review collected by and hosted on G2.com.
Some times the carbon black EDR tool is being slow when performing the hunt and running the searches for host investigation . Apart from this it also gives certail false positives. Review collected by and hosted on G2.com.
Soc radar EDR solution is the most useful tool in my environment, interface is vibrant and practical to increase ease of use.
As a platform user, I can say that I have experience with these tools that will save the day. Review collected by and hosted on G2.com.
Sometimes logs couldn't correlate correctly and it couldn't send the logs to the SIEM solution on time. Review collected by and hosted on G2.com.

Endpoint protection that prevents advanced threats or attacks, it is also applicable for business of all sizes Review collected by and hosted on G2.com.
Nothing as such I observed or I came across Review collected by and hosted on G2.com.
Control over endpoints, easy to manage from central portal.
We can refer to friends & other companies Review collected by and hosted on G2.com.
No. auto detection.
Some more security features to be added.
ZTN features required Review collected by and hosted on G2.com.
The ease of installation was great. The alerting and dashboard makes it very to keep tabs on all endpoints. Review collected by and hosted on G2.com.
The hardening process was a bit time consuming and there was quite a few false positives in the beginning but once we got past that, the service has been impeccable. Review collected by and hosted on G2.com.
Very effective tool in identifying and investigating threats to data. Review collected by and hosted on G2.com.
The only issue is lack of visibility inside the browsers (Chrome, Firefox, IE etc). We cannot tell what in the browser (plugin, js etc) is actually responsible for the activity. That is a major blindspot. Review collected by and hosted on G2.com.
Replacing Antivirus and L3 firewall functions with effective monitoring and Detection Review collected by and hosted on G2.com.
Even more fine tuning in false positive Triggers with AI and Machine Learning will improve efficiency Review collected by and hosted on G2.com.

I love Carbon Blacks EDR platform. It provides visibility into our endpoints and alerts on abnormal endpoint activities. Carbon Black is an anomaly-based detection system that monitors for inconsistent behavior. Traditional EDR programs are signature-based and alert on known threats. Review collected by and hosted on G2.com.
When we first deployed Carbon Black, we saw a significant amount of false positives. It would be best to have either a fully dedicated FTE or system management needs to be outsourced. Having a professional company manage Carbon Black is the only way to go. Review collected by and hosted on G2.com.
Best part of the EDR is very light weight agent and its easy to deploy. We can manage and push the policy from the centralized place. Its has great UI and Best lastest signature to preventing the system . Review collected by and hosted on G2.com.
We haven't faced any probelm with the Carbon Black EDR Review collected by and hosted on G2.com.

The best in the market(provide proactive detections based on Behaviour and silent threats on the endpoints) Review collected by and hosted on G2.com.
The Alerting part can be customized (So that the analyst can create custom rules more creative and detect insider threats and PUPs) Review collected by and hosted on G2.com.