Best Software for 2025 is now live!
Product Avatar Image

Carbon Black

Show rating breakdown
163 reviews
  • 4 profiles
  • 6 categories
Average star rating
4.4
Serving customers since
2002
Profile Type
Category

All Profiles

Profile Filters
Profile Type
Category
Product Avatar Image
Product Avatar Image
Product Avatar Image
Carbon Black Next-Generation Antivirus

167 reviews

Product Avatar Image
Carbon Black EDR

86 reviews

Carbon Black EDR is an incident response and threat hunting solution designed for security teams with offline environments or on-premises requirements. Carbon Black EDR continuously records and stores comprehensive endpoint activity data, so that security professionals can hunt threats in real time and visualize the complete attack kill chain. Top SOC teams, IR firms and MSSPs have adopted Carbon Black EDR as a core component of their detection and response capability stack. Carbon Black EDR is available via MSSP or directly via on-premises deployment, virtual private cloud or software as a service.

Product Avatar Image
Carbon Black App Control

46 reviews

Carbon Black App Control can lock down your environment, prevent unwanted changes and ensure continuous compliance with regulatory mandates. Employing a Positive Security Model, which enables a default/deny security posture, Carbon Black App Control continuously protects against cyber-threats that evade traditional security defenses. App Control does not rely on a library or “list” of files to maintain, which can easily become outdated. Instead, it employs multiple approval methods, including IT & Cloud Driven Trust, Trusted Publishers, Custom Rules and validated External Sources.

Product Avatar Image
Carbon Black Cloud

37 reviews

CB Defense (on the PSC) is a next-generation anti-virus solution for desktops, laptops, and servers that protects computers from the full spectrum of modern cyber attacks, delivering the best endpoint protection with the least amount of work.

Profile Name

Star Rating

113
43
8
2
1

Carbon Black Reviews

Review Filters
Profile Name
Star Rating
113
43
8
2
1
KM
Kevin M.
07/13/2020
Validated Reviewer
Review source: Organic

Carbon Black Response - the standard

I can find what I am looking for when I need it. The product providers us with rich telemetry and can pretty much find anything on a machine where many others cannot. Isolate functions very well and it fast. Most SOC/Incident Response providers use this tool so its best to have this in your organization and deployed already.
Robert G.
RG
Robert G.
Systems Engineer for Healthcare
12/30/2019
Validated Reviewer
Verified Current User
Review source: Seller invite
Incentivized Review

A free FTE in every box! And a good night's sleep!

The fact that the User Exchange is loaded with the very experts a company would call if they had an incident and needed help. It truly is like getting a free FTE for being a customer! Having endpoints in high enforcement so that only the files that are approved are allowed to run. The ability to single out the most threatening endpoints. Now a part of VMWare so the wonderful people of Carbon Black will do even more amazing things!
SS
Scott S.
Controller
12/06/2019
Validated Reviewer
Review source: G2 invite
Incentivized Review

Deployment Is Easy.

Making and maintaining policies is very straightforward, quick, easier and granular, and you can decide which systems and users you want to authorize.

About

Contact

HQ Location:
Waltham, MA

Social

What is Carbon Black?

Carbon Black empowers top security teams to close the Risk Gap they face today. Specific directed attacks are now the cybercrime norm, and no business is exempt. There’s increasing cyber-insurance scrutiny, and government regulations continue to get stricter. In this context, security teams can no longer rely on general security platforms alone. Rather, teams must be empowered with deeper visibility and more control in order to tailor response to their unique environment. With Carbon Black, security teams have unprecedented ability to see directed attacks, contain potential impact, change policies with no user interruption, prevent repeat incidents, and measure what they stopped.

Details

Year Founded
2002