Carbon Black Endpoint is Life Saver
Use Cases and Deployment Scope
Pros
- Malicious Software and process detection
- Suspicious Login Attempts
- Root User Account of Attacks and Machines.
Cons
- Ability to Attach Carbon Black Endpoint to non-Computing Devices such as Firewall appliances
- Ability to Perform Deep Scans without using CLI so IT can ask users to run them instead of our intervention.
- Automatic Enrollment for new device joined to our domain.
Return on Investment
- Recent Brute Force Attack was quickly mitigated with Carbon Black Endpoint's detection
- Easy removal and uninstall of Sensor on legacy/decommissioned devices
- Can be difficult to deploy via Citrix VDI but do-able







