TrustRadius: an HG Insights company

Carbon Black App Control

Score8.4 out of 10

18 Reviews and Ratings

What is Carbon Black App Control?

Carbon Black App Control is an application control product, used to lock down servers and critical systems, prevent unwanted changes and ensure continuous compliance with regulatory mandates.

VMware Carbon Black App Control

Pros

  • Ease of use
  • One dashboard to review all the information
  • Advanced threat protection

Cons

  • Perhaps more specific training.

Return on Investment

  • Dashboards are easy to understand for management
  • We feel more secure than we were on our previous platform

Alternatives Considered

Kaspersky Endpoint Security

Other Software Used

Nutanix AOS, Microsoft 365 (formerly Office 365), Cohesity

Protect critical systems with highly effective application control solution

Use Cases and Deployment Scope

We choose VMware Carbon Black App Control for the application whitelisting and execution control solution. It is more suitable for fixed devices but with rules, you can do anything you need and implement the solution in a dynamic environment, any critical infrastructure will benefit from it. Also if it is properly deployed you can avoid using many security agents and, therefore, offload most intensive checks.

Pros

  • Controls file writes, executions of the scripts
  • Defends from process injections, memory protection
  • Visibility and lock down posibilities

Cons

  • More frequently updates of "Software Updaters".
  • Possibilities to tag within Yara rules.
  • Overall it is the best whitelisting solution I have used.

Most Important Features

  • Protection of the legacy systems running on unsupported operating systems.
  • Prevention of unwanted changes to system configuration and sensitive files/folders.
  • Possibility to make automated approval of trusted software by the publisher, trust level, etc.

Return on Investment

  • App Control can ensure Continuous Compliance.
  • Solution can reduce expenses on different security software.
  • Nowadays Zero Trust approach is very important for any organization and Application control is one of the main parts of it.

Alternatives Considered

VMware Carbon Black EDR and VMware Carbon Black Endpoint

Other Software Used

VMware Carbon Black Endpoint, VMware Carbon Black EDR, Logsign

Protection you can count on

Pros

  • Device Control - you can view and allow/disallow the ability for certain devices to be used in your environment. Specifically we used this with USB drives. If you have one you want to use - whitelist the serial number. The rest can't be used. Simple and easy.
  • Software blocking. If you have an extremely dynamic software base (I doubt this is likely) this could get a bit annoying, but for most organizations like ours where we have specific applications that are required, and then the rest are a bit of an afterthought, it's easy to whitelist the correct applications that you want to be able to run in your environment. The rest can't run (in high enforcement). Users are able to easily request new applications, and you can set certain groups to be able to approve it on their own.
  • Solid platform - with few exceptions setting up new software was very easy (Dragon Medical was a bit tricky, but worked through it with support). Once you have your rules set up and the initial setup done, you tend not to have to do much of anything except to update on occasion and deal with a few requests for applications to be unblocked, or publishes approved.

Cons

  • Cost - Cb Protect is part of now a 3 fold protection offering by Carbon Black. The other parts give you visibility and a more traditional antivirus (Conifer I believe). Once you price all three together, things get expensive. You get what you pay for I guess, as alternatives cost less, but you do lose out on features.
  • On-Prem - I don't believe this has changed, but when we first set up the only option was on-prem. This has a LOT of benefits, but with more mobile users, it can become a bit of a hassle for management and updating policies. A cloud option, or cloud connector would be nice.
  • Application whitelisting outperforms traditional AV/Malware protection but also takes a bit more babysitting. You end up spending a lot of time looking at new programs etc coming down the pipe. A great example is products that self update. These can become a pain as the product updates typically don't show up as signed, or not signed the way Protect looks for, so you end up whitelisting them as they come up, and depending on how often and how many you have in the environment it can be annoying.
  • Protect is nice, but you really need to also have Response to see a holistic view. Else you're going endpoint to endpoint if you are breached/infected, and that gets tedious quickly. However this also adds to the cost.

Return on Investment

  • Protect took care of our objective, which was to protect the endpoints against rogue software and to help with preventing users from installing software that wasn't necessary/desired.

Alternatives Considered

Barkly

Other Software Used

Cisco Sourcefire SNORT, eClinicalWorks, VMware ESXi