Try our new research platform with insights from 80,000+ expert users

Binary Defense MDR vs VMware Carbon Black Endpoint comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Binary Defense MDR
Average Rating
9.2
Reviews Sentiment
7.7
Number of Reviews
16
Ranking in other categories
Managed Detection and Response (MDR) (9th)
VMware Carbon Black Endpoint
Average Rating
7.8
Reviews Sentiment
6.8
Number of Reviews
63
Ranking in other categories
Endpoint Protection Platform (EPP) (33rd), Security Incident Response (4th), Endpoint Detection and Response (EDR) (27th), Ransomware Protection (7th)
 

Mindshare comparison

Binary Defense MDR and VMware Carbon Black Endpoint aren’t in the same category and serve different purposes. Binary Defense MDR is designed for Managed Detection and Response (MDR) and holds a mindshare of 0.6%, down 0.6% compared to last year.
VMware Carbon Black Endpoint, on the other hand, focuses on Endpoint Protection Platform (EPP), holds 1.8% mindshare, down 2.2% since last year.
Managed Detection and Response (MDR) Market Share Distribution
ProductMarket Share (%)
Binary Defense MDR0.6%
CrowdStrike Falcon Complete MDR10.3%
Huntress Managed EDR9.5%
Other79.6%
Managed Detection and Response (MDR)
Endpoint Protection Platform (EPP) Market Share Distribution
ProductMarket Share (%)
VMware Carbon Black Endpoint1.8%
Microsoft Defender for Endpoint9.9%
CrowdStrike Falcon7.9%
Other80.4%
Endpoint Protection Platform (EPP)
 

Featured Reviews

Rich Ullom - PeerSpot reviewer
Worth the money, fantastic communication, and fast service with an average response time of about four minutes on an alert
This is my third SOC. I have never had anybody react as well. So, it's hard for me to provide something that they could do better because I'm really happy with them. I just signed another three-year contract with them. I don't find any downside to them, but if I have to put one, it would be consistent manpower or staffing. The only area where the solution can be improved is going to be with people. As they grow, they are struggling with the same thing that every other company is, which is getting talent and getting that talent to stay, but they've just revised their tiering system to go from a flat analyst and manager to a three-tier solution where it goes through two or three before it gets elevated. That seems to have worked out well, so if one level misses it, the next one picks it up, and it works out fine. Consistent staffing is the only challenge they have because when you're hiring level-one analysts, you go through them pretty quickly. You'll probably hire them at 50K or 55K, and after they do it for a year, they find out they can make 85K somewhere else, and they bounce. So, their turnover is a little high, but that's it.
Nikunj Kamboj - PeerSpot reviewer
Integrates well with our existing SIEM tool and helps in identifying suspicious activities
The solution's integration with our existing security infrastructure is good. Whenever we have any alert in VMware Carbon Black Endpoint, we can easily that alert in our SIEM tool and check logs from the SIEM tool itself. VMware Carbon Black Endpoint is just a secondary security tool for us, and we are just monitoring the alerts from it. The solution's behavioral analytics feature helps in identifying suspicious activities pretty well. Whenever we have even a small thing, we get an alert. The solution is deployed on the cloud in our organization. Performance-wise, the solution is doing great in terms of connecting to the host directly. Performing a malware scan usually takes a lot of time, more than 24 hours. A malware scan is something that we do only on Carbon Black for the old endpoint devices and servers. It used to take sometimes three days to perform. I would recommend the solution to other users. Overall, I rate the solution an eight out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"With Binary Defense, we don't just get an alert, but also a detailed rundown of why they're alerting us on it. They tell us what was executed, or the username, script, or IP. That way, we're not wasting time investigating."
"The most valuable features are the SIEM and the ticketing function; the latter is very smooth and easy to read and understand. We don't have any issues looking at the ticketing information when we're trying to identify what's going on."
"The customization has been the most valuable aspect and was really the reason we ended up selecting Binary Defense. They worked with us to provide exactly the level of support, features, response, and collaboration we needed."
"Binary Defense is comprehensive. We see most of the questionable activity. Once you see things a couple of times and are familiar with the processes, you know what those are. The level of activity is definitely favorable."
"The speed at which their services are reactive is valuable. Nowadays, when a threat hits an endpoint, you've got minutes, not hours or days. Their average response time is about four minutes on an alert. For anything that needs to be sent to us, it's about fourteen minutes, which is pretty good. They're the third SOC that I've used in fifteen years. By far, they are the quickest ones to act. When you're looking at prevention, that's a key factor."
"Among the valuable features are the agent, continuous reporting, and dashboard. It has all the features we need and we haven't had to customize it, other than turning on certain features that we wanted."
"One of the main benefits of Binary Defense MDR is the ability to easily meet with their support team to discuss any issues we encounter."
"The biggest aspect for us is that they are able to conform to our environment and utilize our tools. That way, we still maintain ownership of all the data and access to the applications, and we never lose control of the ability to run the solution ourselves if we need to."
"The data analysis is the most valuable because of the whitelist database. It is different than standard IDS solutions."
"The tool is pretty stable."
"The software uses very few resources; it is almost invisible to the end user."
"The new feature that we're deploying, the new offering from Carbon Black, is MDR, which stands for manage, detect, and response. It's the most valuable feature because Carbon Black will be continuously checking the logs, and they will be advising us on how to improve some of the policies as well as review the logs. If there are any nefarious agents or things happening on the end points, they will know."
"The best feature of this solution is that we have a live response, which is really tailored to our needs."
"I found it very valuable as a whole. It is good at detecting anything and has kept us very safe. It is also very easy to use."
"The initial setup is pretty straightforward."
"You can deploy it through the cloud so that even if your stuff is outside of your controlled environment, you are still under control, based on the policies you create. The policies are controlled through the cloud. For example, if I don't allow anyone to do a certain activity or to install a particular app, and a consultant or a partner who is not part of our environment is doing so, it will stop them as well."
 

Cons

"I would like to get more reports from Binary Defense about what they're blocking."
"It's hard to think of anything that they need to improve on, but just to point out something, I would like to see them provide advanced XDR."
"The only area I see for improvement with Binary Defense is their service portal. It could benefit from some enhancements."
"We found that an earlier version of the agent had high memory usage and that was a bit concerning, but we raised the concern with their support team and they immediately replied that they had noticed the same thing and had a candidate fix already available... it totally fixed the issue."
"While my understanding is that they're working on this, I would like to see some more of the quantification or reporting."
"We should be able to isolate devices faster. They should shorten the time between clicking on a device to contain it and carrying out the action. That would be a welcome improvement."
"I would like to see more frequent check-ins with our security status."
"We found a couple of bugs in the user interface."
"There is room for improvement in the support and service team."
"I am not sure whether Carbon Black CB Defense can be considered as a stable solution or not."
"When you view the triage, it will show you everything within a given time frame, and not only the attack that caused the alert, which is what I want to see. It shows you all the events during that time, and that can be quite confusing."
"Carbon Black needs to do a better job of proving their platform in the industry, and providing a bit more access to do industry testing with real world examples to help prove their platform."
"Based on all the security roles and the release privilege, it could take time for an application to be whitelisted and approved for use."
"Integration is difficult, but CB Defense is more powerful than others. It is difficult to implement but easy to pick up many detections."
"What was rolled out to my company are mixed versions of Carbon Black CB Defense, so what I'd like to see in the next release is more synchronization, where it can detect the endpoint that's running an old version and suggest updates."
"This solution works well but needs lots of tuning and optimization."
 

Pricing and Cost Advice

"It has been good. We have saved money, and we have a better product."
"The solution's price is spot on; if anything, it's slightly below the norm for most services. Compared to building the same team internally, it would cost more to create the same amount of capability than what we get from an external team. Price-wise, Binary Defense is in a great spot."
"It's valued at the right price. Even with the number of endpoints we have, we don't feel that it's a lot more than any competitor. In fact, it might be less expensive when you look at the fact that you're getting a full flex SOC out of it along with the tools."
"The pricing is very good. They are definitely competitive and they were lower at the time that we went with them."
"From the initial cost that Binary Defense came in with, we pared it down quite a bit over the course of 30 or 60 days. My leadership would say that their cost was high, but realistically, they were in line with the market."
"Binary Defense has changed its pricing model from being primarily based on the volume of data to one based on escalations and incidents they handle."
"Binary Defense MDR is priced competitively and may be slightly lower than CrowdStrike."
"The pricing isn't that bad, it's very competitive. I don't feel that it's over-priced and I don't feel that it's under-priced."
"It's reasonable in price"
"The pricing is annually based and operates through another department than mine."
"The product is quite reasonable."
"I am not really involved in the pricing of this product. But, from my understanding, it is OK for us."
"The pricing [is] more or less the same as other similar solutions."
"This is a really expensive product and we pay licensing fees on a yearly basis."
"The platform is expensive."
"CB Defense is available on a yearly subscription and is priced by the number of endpoints."
report
Use our free recommendation engine to learn which Managed Detection and Response (MDR) solutions are best for your needs.
872,008 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Healthcare Company
8%
Manufacturing Company
7%
Financial Services Firm
6%
Financial Services Firm
12%
Computer Software Company
12%
Government
9%
Manufacturing Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business5
Midsize Enterprise4
Large Enterprise7
By reviewers
Company SizeCount
Small Business31
Midsize Enterprise9
Large Enterprise30
 

Questions from the Community

What do you like most about Binary Defense MDR?
The most valuable feature is reviewing tickets and the notes added by technicians.
What is your experience regarding pricing and costs for Binary Defense MDR?
It has been good. We have saved money, and we have a better product. We are a company that has become an enterprise from a small medium business in two years. Our company passed a certain dollar ma...
What needs improvement with Binary Defense MDR?
We are going to have a meeting with them the following Monday. It will be our first quarterly business review. Half of it is going to be looking at new products and new functions that they are brin...
What to choose: an endpoint antivirus, an EDR solution or both?
I can recommend Carbon Black, an award-winning next-gen anti-virus (NGAV) and endpoint detection and response (EDR) security solution. The CB Predictive Security Cloud platform combines multiple hi...
What's the difference between Carbon Black CB Response and Carbon Black CB Defense?
Carbon Black offers two different levels of Endpoint Detection and Response. One is the VM Carbon Black Cloud Endpoint Standard (CB Defense), and the other is the Carbon Black Endpoint Detection an...
What do you like most about Carbon Black CB Defense?
VMware Carbon Black Endpoint is a highly stable solution.
 

Also Known As

Binary Defense Vision, Binary Defense Managed Detection and Response, Binary Defense Managed Detection & Response
Carbon Black CB Defense, Bit9, Confer
 

Overview

 

Sample Customers

Securitas USA, Black Hills Energy, Lincoln Electric,The J.M. Smuckers Company, New York Community Bank, State of Connecticut, NCR
Netflix, Progress Residential, Indeed, Hologic, Gentle Giant, Samsung Research America
Find out what your peers are saying about CrowdStrike, Huntress, Field Effect and others in Managed Detection and Response (MDR). Updated: October 2025.
872,008 professionals have used our research since 2012.