Top Rated Carbon Black EDR Alternatives
86 Carbon Black EDR Reviews
Overall Review Sentiment for Carbon Black EDR
Log in to view review sentiment.
The installation process is very easy. The server can be up and running in less than one our and the agent's installation process is very simple. The endpoints visibility provided by the CB agent has allowed our security analyst to respond to incidents in a very efficient and quick way. Review collected by and hosted on G2.com.
The white listing process is still complicated. CB provide an awesome collection of feeds, however the process of white listing some of the feed's reports is still complicated. They should improve that. Review collected by and hosted on G2.com.
Cb Response is helpful in detecting malware that gets recompiled so that there are not any anti-malware hits. However, the malware still does the same thing with WMI or Powershell, which still gets triggered in Cb Response. Review collected by and hosted on G2.com.
For some of the threat feeds that are based on IP addreses or URLs may generate false positives. You can still leave them enabled to enrich the context in the process search results but not really alert with them. Review collected by and hosted on G2.com.

research and analysis of amenzasas can last a long time, but thanks CB Response we can complete the search in a few minutes, because thanks to its incredible tools gives us greater efficiency allowing us to save time and money, it is also possible to access the full activity record of each endpoint, even when offline. Review collected by and hosted on G2.com.
I really like this solution, I can say that it has a very intuitive and comfortable interface and I can not find anything that I do not like. Their functions are correct and they do a very efficient job. Review collected by and hosted on G2.com.
Enhanced logging and investigate components quickly helps us to quickly identify problem and start resolving before it spread. CB response hunts threat immediately rather than approaching security. Review collected by and hosted on G2.com.
Everything seems to be good if you can afford price of software. I found pricing little bit expensive. Review collected by and hosted on G2.com.

This software offers a quick quality investigation and one is able to know what happened at every stage of the attack. Detect suspicious behavior automatically. Review collected by and hosted on G2.com.
No dislikes for this software we enjoy its services to the maximum. Review collected by and hosted on G2.com.

I like The way Investigations that typically take days or weeks can be completed in just minutes. CB Response captures comprehensive information about endpoint events, giving security professionals a clear understanding of what happened.more itssophisticated detection combines various systems to Isolate and Automatically counter threats. Review collected by and hosted on G2.com.
No major drawbacks but more expertise and training is required in admin usage and also some aspects of installation. Review collected by and hosted on G2.com.

This software has the ability to quickly detect and spot an attacker block them before any harmful activity is done. Review collected by and hosted on G2.com.
No dislike for this software we love it and how it has helped us stay secure and safe. Review collected by and hosted on G2.com.

I like the way this software captures comprehensive information about endpoints, giving the experts clear picture of what is going on. Review collected by and hosted on G2.com.
I have not used this software for long. So far I can't complaint since I have not seen any single point of failure. Review collected by and hosted on G2.com.

This software fast search and visualise the process tree and timelines to pinpoint threats,it isolates any infected system and removes suspicious files to prevent spread to other areas, Review collected by and hosted on G2.com.
No dislike for this software,I works fully since it's installation Review collected by and hosted on G2.com.

This software take less time to investigate and validate threats after which it respond by clearing them from system. Review collected by and hosted on G2.com.
This software requires updating to current trend over a system connected to the internet. Review collected by and hosted on G2.com.