Top Rated Carbon Black Next-Generation Antivirus Alternatives
167 Carbon Black Next-Generation Antivirus Reviews
Overall Review Sentiment for Carbon Black Next-Generation Antivirus
Log in to view review sentiment.

This software takes less time to investigate threats and block any attacker or malicious activity. Review collected by and hosted on G2.com.
This software has to be kept on updates to support it functions other than that no other dislike for this software as it functions very well with our systems. Review collected by and hosted on G2.com.
The best part about Carbon Black Response is the amount of data that is collected, they make no assumptions about what they think you want like other vendors do but provide almost all telemetry one could want in an EDR. Review collected by and hosted on G2.com.
Sluggishness of the console can sometimes cause issues. Review collected by and hosted on G2.com.
I like the capabilities that exist in CB response, the product is very agile and detailed Review collected by and hosted on G2.com.
portal can sometimes be slow and it takes too long to load Review collected by and hosted on G2.com.
The product dashboard allows ease of separating business units and still allowing ease of view. Review collected by and hosted on G2.com.
Very few applications have issue when agent is interrogating the program. Review collected by and hosted on G2.com.

I like the way this software consolidate threat intelligence for your environment to automatically detect suspicious behaviour. Review collected by and hosted on G2.com.
So far this software has not presented any serious drawback since we started using it. Review collected by and hosted on G2.com.

This software automatically collects and stores detailed data for post-incident investigation. Review collected by and hosted on G2.com.
its works poorly in remote areas where network coverage is low. Review collected by and hosted on G2.com.
The all-in-one dashboard to show all my devices easily. Also the minimal configuration needed. Review collected by and hosted on G2.com.
The live response piece can be tricky to use. Review collected by and hosted on G2.com.

It helps save time and has greater protection hence fewer threats. Review collected by and hosted on G2.com.
I don't have any major drawback for this program but sometimes it may run slowly. Review collected by and hosted on G2.com.
The insight gained into the endpoints. It helps with hunting, investigating/response, and even troubleshooting. Review collected by and hosted on G2.com.
There are some hiccups that we went through, but you find that with any product. Review collected by and hosted on G2.com.

Its ability to give when and where the attack was able to compromise the system and its resolution. Review collected by and hosted on G2.com.
Somehow complex but a very nice software I like it. Review collected by and hosted on G2.com.