Product Avatar Image

Carbon Black

Show rating breakdown
163 reviews
  • 4 profiles
  • 6 categories
Average star rating
4.4
Serving customers since
2002
Profile Type
Category

All Profiles

Profile Filters
Profile Type
Category
Product Avatar Image
Product Avatar Image
Product Avatar Image
Carbon Black Next-Generation Antivirus

167 reviews

Product Avatar Image
Carbon Black EDR

86 reviews

Carbon Black EDR is an incident response and threat hunting solution designed for security teams with offline environments or on-premises requirements. Carbon Black EDR continuously records and stores comprehensive endpoint activity data, so that security professionals can hunt threats in real time and visualize the complete attack kill chain. Top SOC teams, IR firms and MSSPs have adopted Carbon Black EDR as a core component of their detection and response capability stack. Carbon Black EDR is available via MSSP or directly via on-premises deployment, virtual private cloud or software as a service.

Product Avatar Image
Carbon Black App Control

46 reviews

Carbon Black App Control can lock down your environment, prevent unwanted changes and ensure continuous compliance with regulatory mandates. Employing a Positive Security Model, which enables a default/deny security posture, Carbon Black App Control continuously protects against cyber-threats that evade traditional security defenses. App Control does not rely on a library or “list” of files to maintain, which can easily become outdated. Instead, it employs multiple approval methods, including IT & Cloud Driven Trust, Trusted Publishers, Custom Rules and validated External Sources.

Product Avatar Image
Carbon Black Cloud

37 reviews

CB Defense (on the PSC) is a next-generation anti-virus solution for desktops, laptops, and servers that protects computers from the full spectrum of modern cyber attacks, delivering the best endpoint protection with the least amount of work.

Profile Name

Star Rating

113
43
8
2
1

Carbon Black Reviews

Review Filters
Profile Name
Star Rating
113
43
8
2
1
Salome W.
SW
Salome W.
IT Specialist at ICT Africa
08/08/2019
Validated Reviewer
Review source: G2 invite
Incentivized Review

Restrict cyber attackers activity and uncover hidden threats with automated threat response.

This software offers a quick quality investigation and one is able to know what happened at every stage of the attack. Detect suspicious behavior automatically.
Caolan M.
CM
Caolan M.
Project Manager at iProspect
08/08/2019
Validated Reviewer
Review source: G2 invite
Incentivized Review

A User-Friendly Protection

Positivity of this application is its ability to control device that helps me to vie and to allow / disallow the usage of certain devices in my certain environment also software blocking tool that is a little bit annoying for some organization but for some like mine where we use only some certain applications and software’s it’s a good choice. Granular Policy setting of this application can detect and block unknown malware and viruses. Intuitive user of this application helps in better understanding of the application as compare to reading its whole manual and live response is also quite appreciable in it.
Nancy W.
NW
Nancy W.
IT Specialist at ICT Africa
08/07/2019
Validated Reviewer
Review source: G2 invite
Incentivized Review

Handle cyber attacks and threats with CB Response

This software take less time to investigate and validate threats after which it respond by clearing them from system.

About

Contact

HQ Location:
Waltham, MA

Social

What is Carbon Black?

Carbon Black empowers top security teams to close the Risk Gap they face today. Specific directed attacks are now the cybercrime norm, and no business is exempt. There’s increasing cyber-insurance scrutiny, and government regulations continue to get stricter. In this context, security teams can no longer rely on general security platforms alone. Rather, teams must be empowered with deeper visibility and more control in order to tailor response to their unique environment. With Carbon Black, security teams have unprecedented ability to see directed attacks, contain potential impact, change policies with no user interruption, prevent repeat incidents, and measure what they stopped.

Details

Year Founded
2002