Product Avatar Image

Carbon Black

Show rating breakdown
163 reviews
  • 4 profiles
  • 6 categories
Average star rating
4.4
Serving customers since
2002
Profile Type
Category

All Profiles

Profile Filters
Profile Type
Category
Product Avatar Image
Product Avatar Image
Product Avatar Image
Carbon Black Next-Generation Antivirus

167 reviews

Product Avatar Image
Carbon Black EDR

86 reviews

Carbon Black EDR is an incident response and threat hunting solution designed for security teams with offline environments or on-premises requirements. Carbon Black EDR continuously records and stores comprehensive endpoint activity data, so that security professionals can hunt threats in real time and visualize the complete attack kill chain. Top SOC teams, IR firms and MSSPs have adopted Carbon Black EDR as a core component of their detection and response capability stack. Carbon Black EDR is available via MSSP or directly via on-premises deployment, virtual private cloud or software as a service.

Product Avatar Image
Carbon Black App Control

46 reviews

Carbon Black App Control can lock down your environment, prevent unwanted changes and ensure continuous compliance with regulatory mandates. Employing a Positive Security Model, which enables a default/deny security posture, Carbon Black App Control continuously protects against cyber-threats that evade traditional security defenses. App Control does not rely on a library or “list” of files to maintain, which can easily become outdated. Instead, it employs multiple approval methods, including IT & Cloud Driven Trust, Trusted Publishers, Custom Rules and validated External Sources.

Product Avatar Image
Carbon Black Cloud

37 reviews

CB Defense (on the PSC) is a next-generation anti-virus solution for desktops, laptops, and servers that protects computers from the full spectrum of modern cyber attacks, delivering the best endpoint protection with the least amount of work.

Product Avatar Image
You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.

Applivery

16 reviews

Product Description

Mobile Apps distribution system for Continuous deployment, Beta testing, Feedback, Bug reporting & Enterprise App distribution.

Profile Name

Star Rating

113
43
8
2
1

Carbon Black Reviews

Review Filters
Profile Name
Star Rating
113
43
8
2
1
Michael H.
MH
Michael H.
Network Security Architect
01/23/2016
Validated Reviewer
Verified Current User
Review source: Organic

Carbon Black - Detect and Respond

Cb has provided us visibility into threat behavior beyond any product out there today. The ability to ban malicious files, create feeds, watch lists, open API, integrations with many other products (and ability to add other products easily), Live Response, isolation and much more, make Cb the differentiator over any other ETDR product on the market today. Carbon Black provides the ability to also go back in time, which defeats a lot of other products in the space that only can go back a short period of time without disrupting the endpoint. The centralized infrastructure methodology makes sense for Cb as it technically can save money vs other products that will run CPU/mem to the max and begin to overwhelm the workstation/server. Cb is a very lightweight sensor, we see around 0-1% CPU, and 10-28Mb of memory. 28Mb on the high end for instances where it is a busy server like TMG or Exchange. Cb is deployed to around 60k endpoints with no issues. We've had minor hiccups over time caused by Cb, but nothing widespread and nothing that wasn't fixed on the new patch level etc. Working with Cb is probably one of the best things about the product. The PM team, engineering, executive team are all great people. Not forgetting the sales team, they are good people too. Everyone at Cb is committed to working and ensuring their product is the best. We have been with Cb since 4.2 and it has really grown a lot since. the API - is probably one of the most important features to Carbon Black that many products out there fail at. The ability to automate and orchestrate a lot of threat hunting, or even remediation tasks is incredible. Many products fail at this part, or place in API in after the fact. Cb is also 100% committed to ensuring the API is very flexible. They have some of the best developers working it. Integrations - Cb allows for many integrations, whether ones they've created or ones you create. It's very flexible. Splunk - we use the cb-event-forwarder to dump most all data to Splunk. This allows us to quickly perform analytics on raw endpoint data. With this, we've taken our detection and response to the next level.
Kyle C.
KC
Kyle C.
Systems Engineering Specialist - Endpoint Security UT and CO at Palo Alto Networks
01/04/2016
Validated Reviewer
Review source: G2 invite on behalf of seller
Incentivized Review

Great incident response tool

Real time analysis of what files are doing on your endpoints.
JH
Jared H.
Senior Network Analyst at Clark County, Nevada
12/13/2015
Validated Reviewer
Verified Current User
Review source: G2 invite on behalf of seller
Incentivized Review

If you want to see the anatomy of an attack...

Ability to record and replay events and tuning capability to record fewer event types for nodes with limited connectivity or low bandwidth. Excellent forensic tool for understanding how an attack occurred.

About

Contact

HQ Location:
Waltham, MA

Social

What is Carbon Black?

Carbon Black empowers top security teams to close the Risk Gap they face today. Specific directed attacks are now the cybercrime norm, and no business is exempt. There’s increasing cyber-insurance scrutiny, and government regulations continue to get stricter. In this context, security teams can no longer rely on general security platforms alone. Rather, teams must be empowered with deeper visibility and more control in order to tailor response to their unique environment. With Carbon Black, security teams have unprecedented ability to see directed attacks, contain potential impact, change policies with no user interruption, prevent repeat incidents, and measure what they stopped.

Details

Year Founded
2002