Top Rated Carbon Black EDR Alternatives
86 Carbon Black EDR Reviews
Overall Review Sentiment for Carbon Black EDR
Log in to view review sentiment.

This software take less time to investigate threats ,suspicious and malicious behaviours. Review collected by and hosted on G2.com.
Since installation of this software we have not seen any problem related to it hence no dislike . It works well with us. Review collected by and hosted on G2.com.

This software takes less time to investigate threats and block any attacker or malicious activity. Review collected by and hosted on G2.com.
This software has to be kept on updates to support it functions other than that no other dislike for this software as it functions very well with our systems. Review collected by and hosted on G2.com.
The best part about Carbon Black Response is the amount of data that is collected, they make no assumptions about what they think you want like other vendors do but provide almost all telemetry one could want in an EDR. Review collected by and hosted on G2.com.
Sluggishness of the console can sometimes cause issues. Review collected by and hosted on G2.com.
I like the capabilities that exist in CB response, the product is very agile and detailed Review collected by and hosted on G2.com.
portal can sometimes be slow and it takes too long to load Review collected by and hosted on G2.com.

I like the way this software consolidate threat intelligence for your environment to automatically detect suspicious behaviour. Review collected by and hosted on G2.com.
So far this software has not presented any serious drawback since we started using it. Review collected by and hosted on G2.com.

This software automatically collects and stores detailed data for post-incident investigation. Review collected by and hosted on G2.com.
its works poorly in remote areas where network coverage is low. Review collected by and hosted on G2.com.
The all-in-one dashboard to show all my devices easily. Also the minimal configuration needed. Review collected by and hosted on G2.com.
The live response piece can be tricky to use. Review collected by and hosted on G2.com.

It helps save time and has greater protection hence fewer threats. Review collected by and hosted on G2.com.
I don't have any major drawback for this program but sometimes it may run slowly. Review collected by and hosted on G2.com.

Its ability to give when and where the attack was able to compromise the system and its resolution. Review collected by and hosted on G2.com.
Somehow complex but a very nice software I like it. Review collected by and hosted on G2.com.
I like this platform because it detects and responds to advanced attacks with unfiltered visibility Review collected by and hosted on G2.com.
The software works on well enabled networks and Android devices Review collected by and hosted on G2.com.