Try our new research platform with insights from 80,000+ expert users

Secureworks Red Cloak Threat Detection and Response [EOL] vs VMware Carbon Black Endpoint comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Secureworks Red Cloak Threa...
Average Rating
8.0
Number of Reviews
1
Ranking in other categories
No ranking in other categories
VMware Carbon Black Endpoint
Average Rating
7.8
Reviews Sentiment
7.0
Number of Reviews
63
Ranking in other categories
Endpoint Protection Platform (EPP) (20th), Security Incident Response (1st), Endpoint Detection and Response (EDR) (15th), Ransomware Protection (4th)
 

Featured Reviews

reviewer1646754 - PeerSpot reviewer
Simple deployment with good reports and dashboard
In terms of what could be improved, there are a lot of things identified and there is a lot of continuous improvement. A lot of the things are of a short time frame and a lot are way out. There was a tuning process but nothing specifically to call out. As for what could be included in the next release, we are working on the basic feature set. There are probably some things that, as we move through it, we'll come across that are deficient but right now we are not that far along to know. I don't want to say that they could not do certain advancement. For example, there are some automated network response portions that we want to turn up, but we're not ready for that. I don't even know what the capabilities are there, but that's something that, probably in the next 24 months, we will move forward on.
Matthew Weisler - PeerSpot reviewer
Great granularity for policies or applications without needing hash values
The solution is cloud based which makes it easy to use for remote devices or work-at-home situations. The solution supports full trust or signature-based approvals. You can get very granular and band out policies or applications without having to do hash values. You can band through the entire environment by execution of the name or desk IDXE. This can be achieved on the policy side because of the signature, IOC, or naming convention itself. This is very effective for pushing more blockage or removing threats across the board. The solution has a very nice API on the back end for remoting into a system and executing scripts or utilizing self automation. This is useful for monitoring several different companies in a workspace or workbook-type format. For example, I report and send out mass emails from a clickable button in an Excel workbook. The APIs all exist for each client. I push out automatic endpoint monitoring and reports every single day at a particular time, with a simple clickable button that serves as a scheduled task for fifty clients.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The features that I have found most valuable are that the search capabilities are easy to use. The dashboards are good. The reports are good. It is just simple from a deployment standpoint - that was easy."
"The triage feature that shows you the whole chain of the malware is useful."
"The initial setup is pretty straightforward."
"Some of the valuable features I have found are the online documentation of the solution is well organized and thorough. I like the simplicity of bypass and the visualization of the active components."
"The most valuable feature of the solution stems from the fact that it is one of the best EDR tools in the market."
"The solution is very useful and easy to handle. You don't need much intervention with this product."
"I like the historical features, interface, and integration."
"The initial setup was fairly easy."
"I found it very valuable as a whole. It is good at detecting anything and has kept us very safe. It is also very easy to use."
 

Cons

"There are some automated network response portions that we want to turn up."
"It would be nice to have additional forensic tools that you can build into the back end."
"This solution works well but needs lots of tuning and optimization."
"The initial setup is complex."
"Certain settings have limitations. For example, I cannot manually block some malware activities."
"Integration is difficult, but CB Defense is more powerful than others. It is difficult to implement but easy to pick up many detections."
"A search bar in the investigation page and some AI-related tasks like outgoing alerts, or recent tactics that are being used in the market, must be embedded in the tool so that it's easier to find alerts."
"The solution has to mature on container security and a lot of cloud environment security."
"There could be more knowledge. I think they made a mistake when they took away the Check Point integration, because it provides more automation and also more threat intelligence."
 

Pricing and Cost Advice

Information not available
"The platform is expensive."
"Price-wise, VMware Carbon Black Endpoint is a highly-priced solution. Regarding the licensing cost of the solution, one needs to opt for an annual subscription."
"The solution has almost the same price as other different kinds of infrastructures, but it offers a lot of different features."
"I am not really involved in the pricing of this product. But, from my understanding, it is OK for us."
"The product’s price is less expensive than other vendors."
"Its pricing was very good, which is one of the reasons I went to it as an alternative. It is on a yearly basis. There are no additional fees."
"VMware Carbon Black Endpoint is an expensive product."
"CB Defense is available on a yearly subscription and is priced by the number of endpoints."
report
Use our free recommendation engine to learn which Security Incident Response solutions are best for your needs.
832,138 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Financial Services Firm
11%
Manufacturing Company
8%
Healthcare Company
6%
Computer Software Company
15%
Financial Services Firm
10%
Government
9%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What to choose: an endpoint antivirus, an EDR solution or both?
I can recommend Carbon Black, an award-winning next-gen anti-virus (NGAV) and endpoint detection and response (EDR) security solution. The CB Predictive Security Cloud platform combines multiple hi...
What's the difference between Carbon Black CB Response and Carbon Black CB Defense?
Carbon Black offers two different levels of Endpoint Detection and Response. One is the VM Carbon Black Cloud Endpoint Standard (CB Defense), and the other is the Carbon Black Endpoint Detection an...
What do you like most about Carbon Black CB Defense?
VMware Carbon Black Endpoint is a highly stable solution.
 

Also Known As

Red Cloak Threat Detection and Response, Red Cloak TDR
Carbon Black CB Defense, Bit9, Confer
 

Overview

 

Sample Customers

Ricoh
Netflix, Progress Residential, Indeed, Hologic, Gentle Giant, Samsung Research America
Find out what your peers are saying about VMware, ServiceNow, IBM and others in Security Incident Response. Updated: January 2025.
832,138 professionals have used our research since 2012.