TrustRadius: an HG Insights company

Carbon Black EDR

Score8.1 out of 10

29 Reviews and Ratings

What is Carbon Black EDR?

Carbon Black EDR is an on-premise incident response and threat hunting solution designed for security operations center (SOC) teams with offline environments or on-premises requirements.

Categories & Use Cases

Protect your endpoint with Carbon Black EDR

Use Cases and Deployment Scope

VMware Carbon Black EDR is used for investigation of endpoint. It helps in looking out for any malicious activity in the host machines. We get various information about the activity like in which machine the event is occurring, occurrence time and what all events are being performed in the endpoint. It helps in checking all the network connections made by the machine , any modification in the files made in the machine, all the processes that are running in the machine can be checked using VMware Carbon Black EDR. It helps in creating custom watchlist of events also it has threat feeds for investigation.

Pros

  • Helps in tracking network connections made by machine
  • Process Tree which show series of workflow which clear and easy to understand.
  • Enables to go live into the machine and investigate

Cons

  • Number of false positive which are triggered due to threat feeds are sometimes more needs to be fine tuned by the client.
  • In very rare scenarios processes are not captured properly.

Return on Investment

  • It is helping to protect us from potential loss of revenue that would be caused by malware or a compromised account.
  • It took some time in deploying in the environment , but that time is much worth it because of the results we are getting now.
  • It helps in hunting, which help us check and protect our environment from any cyber attacks.

Alternatives Considered

Microsoft Defender for Endpoint (formerly Microsoft Defender ATP)

Other Software Used

Microsoft Azure, Amazon WorkSpaces (VDI), Amazon Web Services

Cb Response is great for endpoint investigation and response

Pros

  • Process tree view of endpoint activity
  • Ability to pull files from host
  • Threat Intelligence integration
  • Isolate a host

Cons

  • Needs more defensive abilities

Return on Investment

  • Increased visibility across the enterprise for threats
  • Rapid ability to investigate and remediate threats

Alternatives Considered

FireEye Endpoint Security