Best Software for 2025 is now live!
Product Avatar Image

Carbon Black

Show rating breakdown
163 reviews
  • 4 profiles
  • 6 categories
Average star rating
4.4
Serving customers since
2002
Profile Type
Category

All Profiles

Profile Filters
Profile Type
Category
Product Avatar Image
Product Avatar Image
Product Avatar Image
Carbon Black Next-Generation Antivirus

167 reviews

Product Avatar Image
Carbon Black EDR

86 reviews

Carbon Black EDR is an incident response and threat hunting solution designed for security teams with offline environments or on-premises requirements. Carbon Black EDR continuously records and stores comprehensive endpoint activity data, so that security professionals can hunt threats in real time and visualize the complete attack kill chain. Top SOC teams, IR firms and MSSPs have adopted Carbon Black EDR as a core component of their detection and response capability stack. Carbon Black EDR is available via MSSP or directly via on-premises deployment, virtual private cloud or software as a service.

Product Avatar Image
Carbon Black App Control

46 reviews

Carbon Black App Control can lock down your environment, prevent unwanted changes and ensure continuous compliance with regulatory mandates. Employing a Positive Security Model, which enables a default/deny security posture, Carbon Black App Control continuously protects against cyber-threats that evade traditional security defenses. App Control does not rely on a library or “list” of files to maintain, which can easily become outdated. Instead, it employs multiple approval methods, including IT & Cloud Driven Trust, Trusted Publishers, Custom Rules and validated External Sources.

Product Avatar Image
Carbon Black Cloud

37 reviews

CB Defense (on the PSC) is a next-generation anti-virus solution for desktops, laptops, and servers that protects computers from the full spectrum of modern cyber attacks, delivering the best endpoint protection with the least amount of work.

Profile Name

Star Rating

113
43
8
2
1

Carbon Black Reviews

Review Filters
Profile Name
Star Rating
113
43
8
2
1
Abhijeet K.
AK
Abhijeet K.
Radhe Radhe 💫 || Security Researcher || Bug Hunter || Web Application Penetration Tester || Hall of fame in "NASA" 🏆 ||
10/28/2024
Validated Reviewer
Review source: G2 invite
Incentivized Review

My experience with the product was great!

The Corbon Black EDR is a powerfull cybersecurity solution designed to provide real time visibility into endpoint activities, enabling advanced threat detection and rapid incident response.
HD
Hardik D.
10/23/2024
Validated Reviewer
Review source: G2 invite
Incentivized Review

Powerful Endpoint Visibility and Threat Hunting Tool

Carbon Black EDR excels in presenting deep visibility into endpoint hobby, that is critical for real-time danger detection and response. The ability to speedy search thru enormous quantities of endpoint statistics permits for comprehensive danger searching and investigation. Its centralized dashboard offers intuitive monitoring of all belongings, making it clean to detect and respond to suspicious activity throughout the network.
Martins O.
MO
Martins O.
Cyber Security Analyst
10/21/2024
Validated Reviewer
Review source: G2 invite
Incentivized Review

Endpoint Detection & Response (EDR) Software

Carbon Black EDR has ability to monitors endpoint abd capture how data is processes, file execution and file paths, the network connection. It help stop malicious processes and block attacks in real time

About

Contact

HQ Location:
Waltham, MA

Social

What is Carbon Black?

Carbon Black empowers top security teams to close the Risk Gap they face today. Specific directed attacks are now the cybercrime norm, and no business is exempt. There’s increasing cyber-insurance scrutiny, and government regulations continue to get stricter. In this context, security teams can no longer rely on general security platforms alone. Rather, teams must be empowered with deeper visibility and more control in order to tailor response to their unique environment. With Carbon Black, security teams have unprecedented ability to see directed attacks, contain potential impact, change policies with no user interruption, prevent repeat incidents, and measure what they stopped.

Details

Year Founded
2002