VMware Carbon Black Endpoint and ThreatLocker Protect compete in providing endpoint security solutions. Users are happier with VMware Carbon Black Endpoint's pricing and support but find ThreatLocker Protect's features superior, justifying its cost despite the higher price.
Features: VMware Carbon Black Endpoint is praised for its extensive monitoring, comprehensive threat detection, and advanced analytics. ThreatLocker Protect excels in robust application control, environmental lockdown features, and detailed audit trails.
Room for Improvement: VMware Carbon Black Endpoint users highlight performance issues, complex configurations, and occasional false positives. ThreatLocker Protect users call for more streamlined policy management, better integration capabilities, and improved user interface.
Ease of Deployment and Customer Service: VMware Carbon Black Endpoint has a straightforward deployment process praised for speed, with solid customer service. ThreatLocker Protect is also quick to deploy, but its customer service is more personalized and responsive.
Pricing and ROI: VMware Carbon Black Endpoint offers competitive pricing with good ROI. ThreatLocker Protect has a higher setup cost but delivers excellent ROI due to its advanced features and benefits.
ThreatLocker Protect offers zero-trust security, application whitelisting, and software control across endpoints. It blocks unauthorized software, manages application installations, and prevents malicious activity for enhanced cybersecurity.
ThreatLocker Protect enhances security by blocking unauthorized software and managing application installation across endpoints. Admins receive alerts for attempts to run unapproved applications, ensuring secure environments. Utilized by MSPs, MSSPs, and IT service providers, ThreatLocker Protect integrates into security stacks to improve access control and inventory management. While the solution provides remote management through a mobile app and offers comprehensive training and support, it requires improvements in training flexibility, policy update performance, the reporting system, and custom rule management for software developers.
What are the most important features?ThreatLocker Protect is commonly implemented across industries like healthcare, finance, education, and retail to maintain strict access controls, manage application installations, and ensure endpoint security. In healthcare, it prevents unauthorized software from compromising patient data. Financial institutions use ThreatLocker Protect to guard against unauthorized transactions and data breaches. Educational institutions rely on it to manage software access for staff and students, while retail businesses use it to secure point-of-sale systems and inventory management.
VMware Carbon Black Endpoint provides comprehensive endpoint security against ransomware, spyware, malware, and viruses, catering to both cloud and on-premise environments.
VMware Carbon Black Endpoint facilitates endpoint detection and response, threat hunting, application control, antivirus support, and protection for virtual and physical machines. Features include intelligent learning, whitelisting, and integration with other security tools, making it suitable for distributors, MSPs, and enterprises seeking advanced threat defense and real-time monitoring. With its capability to detect and stop malicious executables, it supports both offline and online environments and offers tools like command shell access for deeper investigation.
What are the key features of VMware Carbon Black Endpoint?VMware Carbon Black Endpoint is implemented across various industries including technology, healthcare, and finance. Organizations utilize it in cloud and hybrid environments, enhancing their security frameworks with real-time monitoring, intelligent learning, and robust threat detection capabilities tailored to their specific industry needs.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.