Try our new research platform with insights from 80,000+ expert users

ThreatLocker Protect vs VMware Carbon Black Endpoint comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024
 

Categories and Ranking

ThreatLocker Protect
Ranking in Endpoint Protection Platform (EPP)
13th
Ranking in Ransomware Protection
6th
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
17
Ranking in other categories
Network Access Control (NAC) (5th), Advanced Threat Protection (ATP) (8th), Application Control (4th), ZTNA (8th)
VMware Carbon Black Endpoint
Ranking in Endpoint Protection Platform (EPP)
18th
Ranking in Ransomware Protection
4th
Average Rating
7.8
Number of Reviews
63
Ranking in other categories
Security Incident Response (1st), Endpoint Detection and Response (EDR) (15th)
 

Mindshare comparison

As of November 2024, in the Endpoint Protection Platform (EPP) category, the mindshare of ThreatLocker Protect is 0.7%, down from 0.8% compared to the previous year. The mindshare of VMware Carbon Black Endpoint is 2.0%, down from 2.6% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Roy Richardson - PeerSpot reviewer
Nov 28, 2023
Integration is simple, deployment is straightforward, and extensive well-written documentation is available online
We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running. We utilize Ringfencing to establish guardrails around implementations, ensuring that applications operate within defined boundaries. We leverage network access control to granularly control interactions between computer systems and servers. This enables us to restrict communication between specific applications, even within a locked-down environment. We employ storage control to impose additional security measures on data storage. This includes controlling access to network shares, network files, and folders, as well as USB storage devices. We can whitelist specific devices based on their serial numbers or allow access based on predefined conditions. We rely on ThreatLocker's Cyber Hero support, which provides exceptional assistance and responsiveness. At any time, we can initiate a chat session and receive immediate support. If the issue requires escalation, it is promptly handled. Cyber Hero support also plays a crucial role in vetting application updates. When a user attempts to install or update an application, and the update has not been approved from a security standpoint, it is blocked by ThreatLocker. A notification is presented to the user, informing them of the block and providing an option to justify the application's need. These requests are then reviewed by ThreatLocker's Cyber Hero support team, who evaluate them against our security criteria and make an informed decision to allow or deny the application. We utilize ThreatLocker's elevated control feature for applications that require administrator-level access. We avoid granting full administrative privileges to end users, as this elevates the risk of compromise if the device is infiltrated. Instead, elevated control allows us to precisely define the execution conditions for specific applications, such as QuickBooks updates. By verifying the application's signature and certificate, we can enable the update to run with administrative privileges while restricting the user's overall administrative access. Integrating ThreatLocker with other products is simple and only requires a few clicks. ThreatLocker's deployment is also very straightforward. The company provides extensive and well-written online documentation, which is continuously being improved. They also offer a variety of training resources, including university courses, training videos, webinars, and conferences. I have no complaints about the level of support and knowledge transfer provided by the company. ThreatLocker is also developing a new reporting tool, which I had the opportunity to beta test. The company has also been showcasing the new reporting tool at conferences. The new reporting tool provides a level of detail that is unmatched by any other product on the market.
Durai  Singh - PeerSpot reviewer
Oct 25, 2023
The solution is expensive, support is poor, and it takes time to understand the product
Customers want solutions that provide endpoint detection and response. The traditional antivirus solutions and the market trend are changing. Customers are asking for the latest technologies. Carbon Black has very good market strategies. We do the marketing activities and promote the product to the…

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The unified alerts are useful."
"We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running."
"Feature-wise, the learning mode and the fact that it's blocking everything are the most valuable. I don't see why more companies don't use the type of product."
"The application whitelisting feature allows us to block and manage approved applications effectively. It ensures that no one can install an application on our systems unless it is approved by me, which is very efficient."
"While it can be frustrating at times, we appreciate the low-level security provided by the application whitelist."
"The most valuable feature is selective elevation, which allows elevating an individual process to admin privilege without granting admin privilege to that user, which has been by far the most useful feature outside of the overall solution itself."
"Allowlisting, in general, is valuable because it allows us to have a lot more granular control over what is executed on a desktop. We are also able to ringfence known vectors of attack through Office applications, email, browsers, etc."
"Application control, ring-fencing, and storage control are the most important features, followed closely by elevation."
"I like its protection very much. It protects and allows us to lock the environment pretty tightly. Nothing that is not approved through Carbon Black can run in the environment. There is no default. Everything goes through Carbon Black Protect, and everything has to be first approved. Every software is considered to be guilty before prove innocent."
"Some of the valuable features I have found are the online documentation of the solution is well organized and thorough. I like the simplicity of bypass and the visualization of the active components."
"It uses machine learning and behavioral analytics for advanced threat detection and response."
"The EDR and reports were helpful in improving our organization."
"This product has the capability of uploading scripts to the tool and this is a very comprehensive feature."
"The best feature of this solution is that we have a live response, which is really tailored to our needs."
"Carbon Black CB Defense has helped improve my organization by allowing us to have better data so that we can do correlation and get visibility into the alerts."
"One of the most valuable features is that it will block vulnerable sites. If there was a connection between one of our devices to a known malware site, it will block it."
 

Cons

"We identified several areas that we would like to see improved."
"Something we have come up against a couple of times is that we have two clients that are software developers. They create software that doesn't have digital signatures and that's not easy to categorize or whitelist with ThreatLocker. We have to go in and make custom rules to allow them to do their work and to be protected from malicious threats."
"The portal can be a little overwhelming at times from an administration point of view. It displays a lot of information, and it's all useful. However, sometimes there is too much on the screen to sift through, especially if you're trying to diagnose a client's problem with a piece of software. Maybe something has stopped working since they updated it, and we need to see if ThreatLocker is blocking a component of that software."
"There are some times when applications get submitted, the hashes don't really line up."
"The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself."
"If you have a thousand computers with ThreatLocker agents on them, when you approve or create a new policy saying that Adobe Reader that matches this hashtag and meets certain criteria is allowed to be installed, it applies at the top level or the organization level. It applies to every computer in the company. When you make that new policy and push it out and it goes out and updates all of the clients. Unfortunately, at this time, it does not look like they stagger the push-out."
"It would be beneficial to have a tighter integration into PSA systems so that approvals can be done directly without having to leave the PSA."
"The reporting could be improved."
"The solution would be more effective if there was a way to block automatically based on behavior."
"This solution could have greater granular control on how certain applications work."
"The product's stability could be improved."
"Carbon Black CB Defense has helped improve my organization by allowing us to have better data so that we can do correlation and get visibility into the alerts."
"In the past, we've seen some stability issues in the latest version releases. We tend to hang back one version just to make sure issues are fully resolved to avoid user disruption."
"Occasionally, we'll have issues with the latest version and they'll basically tell us that they will improve it in the next iteration. They need to work on their version release quality."
"The solution needs better overall compatibility with other products."
"I would like to see the user credentials feature improved. I would also like to see more reporting features and better ways to roll the reports out."
 

Pricing and Cost Advice

"I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
"The pricing is fair and there is no hard sell."
"Although the pricing seems good, there have been inconsistencies in contract negotiations."
"I find ThreatLocker's pricing to be reasonable for the services it provides."
"The pricing works fine for me. It's very reasonably priced."
"ThreatLocker's pricing seems justifiable."
"The price of ThreatLocker Allowlisting is reasonable in the market, but it is not fantastic."
"Considering what this product does, ThreatLocker is very well-priced, if not too nicely priced for the customer."
"The pricing is annually based and operates through another department than mine."
"Its pricing was very good, which is one of the reasons I went to it as an alternative. It is on a yearly basis. There are no additional fees."
"VMware Carbon Black Endpoint is an expensive product."
"I am not really involved in the pricing of this product. But, from my understanding, it is OK for us."
"This is a really expensive product and we pay licensing fees on a yearly basis."
"The cost is a considerable factor, but the benefit factor is the most important. When you compare it with other products, the price is high. Carbon Black will negotiate the price."
"The license is annual. It's a standard license."
"The pricing [is] more or less the same as other similar solutions."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
815,854 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
37%
Retailer
7%
Government
6%
Financial Services Firm
5%
Computer Software Company
15%
Financial Services Firm
10%
Government
10%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What needs improvement with ThreatLocker Allowlisting?
I'm not sure if I'm using it wrong; however, I find that I have to babysit it too much. I've found that if a user opens a file from another location, it might trigger an approval process. The same ...
What to choose: an endpoint antivirus, an EDR solution or both?
I can recommend Carbon Black, an award-winning next-gen anti-virus (NGAV) and endpoint detection and response (EDR) security solution. The CB Predictive Security Cloud platform combines multiple hi...
What's the difference between Carbon Black CB Response and Carbon Black CB Defense?
Carbon Black offers two different levels of Endpoint Detection and Response. One is the VM Carbon Black Cloud Endpoint Standard (CB Defense), and the other is the Carbon Black Endpoint Detection an...
What do you like most about Carbon Black CB Defense?
VMware Carbon Black Endpoint is a highly stable solution.
 

Also Known As

ThreatLocker Allowlisting, ThreatLocker Network Control, ThreatLocker Ringfencing
Carbon Black CB Defense, Bit9, Confer
 

Overview

 

Sample Customers

Information Not Available
Netflix, Progress Residential, Indeed, Hologic, Gentle Giant, Samsung Research America
Find out what your peers are saying about ThreatLocker Protect vs. VMware Carbon Black Endpoint and other solutions. Updated: October 2024.
815,854 professionals have used our research since 2012.