Try our new research platform with insights from 80,000+ expert users
Ramesh RP - PeerSpot reviewer
Security Analyst at Halian
Real User
Has An Easy Setup In Place; However, Adding Certain Integration Features Would Make It A More Useful Solution
Pros and Cons
  • "I feel that the initial setup was straightforward and not complex."
  • "I am not sure whether Carbon Black CB Defense can be considered as a stable solution or not."

What is our primary use case?

Our primary use case for this solution involves addressing incidents related to malware outbreaks and malicious signatures.

What is most valuable?

Sandboxing is one of the features I found to be the most valuable in Carbon Black CB Defense.

What needs improvement?

It would be good if Splunk integration or something similar to Splunk integration is available for this solution.

For how long have I used the solution?

I have been using the latest version of Carbon Black CB Defense for the past year.

Buyer's Guide
VMware Carbon Black Endpoint
November 2024
Learn what your peers think about VMware Carbon Black Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,660 professionals have used our research since 2012.

What do I think about the stability of the solution?

I am not sure whether Carbon Black CB Defense can be considered to be a stable solution or not.

What do I think about the scalability of the solution?

I feel that this is a scalable solution. There are around 80 to 90 employees at our organization who are using Carbon Black CB Defense.

How are customer service and support?

I have never contacted the tech support team of Carbon Black CB Defense.

Which solution did I use previously and why did I switch?

In our organization, we have used CTF365 and iZOOlogic in the past. We didn't switch from those since we have a multiple-client setup. One client uses one EDR, while the other one uses the other EDR. So, the intention of having a multiple-client setup at our end is to help our clients, and it is not for the benefit of our company.

How was the initial setup?

I feel that the initial setup was straightforward and not complex. The deployment of the tool is carried out by our engineering team, consisting of 10 members. With the addition of the manager and the other management team members, the total number of individuals involved in the deployment comes to around 25. The engineering team, who are responsible for this activity, ensures the successful deployment of the solution with their expertise.

What other advice do I have?

I would like to see more integration with other platforms. I rate this solution a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
KarthikR1 - PeerSpot reviewer
Consultant at NCR Corporation
Real User
Top 5
We can instantly respond if a false positive occurs
Pros and Cons
  • "The product allows us to focus on endpoint and antivirus protection."
  • "The GUI and reporting should be addressed and the product's administration features need fine tuning."

What is our primary use case?

While there is an IR team that is responsible for managing EDR or deep analytics, our focus is on endpoint and antivirus protection. This is where we encounter signature updates. We look for false positives in their relation to file interpretation. Should anything occur, we can instantly respond. Instead of sending a sample and getting coverage, we can put a policy and place an immediate stop on the false positives.

What needs improvement?

While I consider the product to be top notch and am happy with it, its reporting aspects need to be addressed.

I would definitely recommend Carbon Black CB Defense to others who are contemplating using it, but its administration features need fine tuning. I believe this is already being addressed so that gaps can be filled as these relate to other leading technologies on the market.

The GUI and reporting should also be addressed.

For how long have I used the solution?

We have been using Carbon Black CB Defense for the past seven to eight months.

How are customer service and technical support?

I have not had occasion to make use of technical support, although I may have in the future, as I am the product person who is working with another experienced team and there is a process under way to migrate from McAfee to Carbon Black CB Defense. 

How was the initial setup?

The initial setup was a bit difficult since we had to do it manually or through the use of a script.

What's my experience with pricing, setup cost, and licensing?

The price for the solution is completely at government level, meaning one which is very high, although it is up to management to consider this criteria.

What other advice do I have?

Our company has over a thousand people who utilize the product. Going forward, everything will be managed by Carbon Black CB Defense.

I would rate it an eight out of ten. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
VMware Carbon Black Endpoint
November 2024
Learn what your peers think about VMware Carbon Black Endpoint. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,660 professionals have used our research since 2012.
reviewer1265103 - PeerSpot reviewer
Cyber Security Consultant with 1,001-5,000 employees
Real User
Very customizable with good documentation and an easy initial setup
Pros and Cons
  • "There's lots of very useful documentation online to help troubleshoot and learn about the product."
  • "I'm not sure as to the logic of how we've decided to customize it. We've only really used it since February and therefore there may be more to do on that front. That's why it's hard to say if something is missing or if we just aren't utilizing it."

What is our primary use case?

Basically we use the solution for protecting and detecting misuse of end-users while using their end-points to access the internet, especially for browsing websites, or suspicious activity as far as misusing their web browser. It protects them from web-based attacks such as DDos (Denial of Service) or ransomware. 

What is most valuable?

What I find most interesting is the performance of the end-point client, as well as the capability of detecting any activity on the end-user while using their browsers to navigate the internet. 

To monitor that activity from a security standpoint, detecting cross-site scripting or SQL injection activities that might be coming out from the browser. That's a very needed feature that allows it to distribute the security across the company and not centralizing it only on the firewalls or in the intrusion detection systems. 

The solution is quite customizable.

It's easy to set up the solution.

There's lots of very useful documentation online to help troubleshoot and learn about the product.

What needs improvement?

I can't think of any feature that needs to be enhanced or reviewed at this time.

Some of the features that I see as an end-user, unfortunately, I haven't been able to see from a project management standpoint. I'm not sure if we're actually taking advantage of all the available features. I don't know if it's because we haven't configured it yet, or we are not using it. 

I'm not sure as to the logic of how we've decided to customize it. We've only really used it since February and therefore there may be more to do on that front. That's why it's hard to say if something is missing or if we just aren't utilizing it.

For how long have I used the solution?

I've been using the solution for about a year and a half.

What do I think about the stability of the solution?

It's pretty stable. We haven't heard of any issues and we don't know yet about usage and security issues outside of the performance or any stabilities in the product itself. So far I would say that I consider it stable - very stable in fact.

What do I think about the scalability of the solution?

Given the number of people that are using it, I would consider it as scalable without having specific details on the performance, on the central management, or the management points. I would say that, due to the behavior of the solution with the end-users, it's a good solution. It is scalable.

How are customer service and technical support?

I haven't used technical support myself just yet. I've only really gone as far as looking at their documentation on their website, including the blog, user support page, and other related documentation. I would say that is good. It's enough. 

There is more than enough information for tech-savvy people, and knowledgeable people that are looking for specific things. There are details telling them how to fix certain issues related to the product, or how to manage some of the product software. I would say that the documentation and the support are okay. It's what I would use personally. I prefer either looking at the documentation myself and then calling the call center after that if it's still necessary.

How was the initial setup?

We found the initial setup to be relatively straightforward. It's easy. It's not complex at all.

The time it takes to deploy depends upon the number of end-points that you are deploying. That said, as far as I know, it took us probably six to nine months. This is due to the fact that there were some other technical issues not related to the service. That was my understanding at the time.

What other advice do I have?

We're just customers and end-users. We don't implement this solution for clients or anything like that.

I'm not sure which version of the solution I'm using. It might be the latest, however, I can't say for sure. We use it at a bank for our endpoints. Therefore, it's likely the latest.

There are between 20,000-30,000 people using the solution within our organization. It's definitely 20,000 at least.

I would advise others to basically set the expectations as far as the features they expect or need from a security solution. This solution can't solve problems related to security practices within the company. Internal policies must be in place. Then, figure out how to integrate this solution and its available features into your internal security protocols. 

Overall, I would rate the solution at a nine out of ten. We've been pretty happy with the product so far.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1439934 - PeerSpot reviewer
Infrastructure and support manager at a healthcare company with 51-200 employees
Real User
Amazing EDR that is responsive but there is no support for MAC and Linux
Pros and Cons
  • "The EDR and reports were helpful in improving our organization."
  • "Based on all the security roles and the release privilege, it could take time for an application to be whitelisted and approved for use."

What is our primary use case?

We used it for EDR, as well as endpoint protection, the whitelisting feature.

How has it helped my organization?

The EDR and reports were helpful in improving our organization.

What is most valuable?

The EDR was amazing. It was very responsive. It did an excellent job of providing us the information we needed in a timely fashion, as long as the latest agent was up-to-date on the client.

What needs improvement?

The whitelisting system, and the concept of it, overall, is pretty decent. The problem with the whitelisting capability is that it's pretty archaic. Based on all the security roles and the release privilege, it could take time for an application to be whitelisted and approved for use.

The Mac support needs improvement, as it had next to none.

The biggest problem we had was the Mac support. It had very little, and my C-suite is almost exclusively Mac, as is my marketing and development department.

For how long have I used the solution?

We had used the Carbon Black CB Defense for two years. We changed to another solution approximately nine months ago.

We were using the latest version at the time.

What do I think about the stability of the solution?

The stability of the on-premises servers had no issues but the resource allocation on the clients was a bit high, especially with having to run two agents. The detection agent, the Whitelist, and the control agent.

What do I think about the scalability of the solution?

We didn't have any problems scaling this solution.

It did the job. It was great for Windows, but it had no Mac support and had nothing for Linux, which makes it hard.

We had 150 users in our organization. Their roles varied from CSF departments through to my C-suite.

How are customer service and technical support?

Technical support seemed pretty good and I didn't have any problems with it. 

If we had a problem or a question, and they would get back to us in a reasonable amount of time. 

The only place that we ran into trouble was with Macs. That's my general theme here with Carbon Black, unfortunately.

I would rate them an eight or a nine. They were good for the most part.

Which solution did I use previously and why did I switch?

Previously, we were on the Kaspersky Enterprise Solution for a couple of years. It was a signature-based system. Signature-based systems are getting easier to get around by the attackers these days, so we swapped over to something that is a little closer to attack vectors, which says, don't run anything that we don't approve.

How was the initial setup?

The initial setup was moderate.

What other advice do I have?

For others who are interested in using Carbon Black, I would recommend checking your use case. If your use case is Linux and Mac, then it will be problematic, based on my experience.

These days, with VMware taking them over, I'm willing to bet that that's going to change.

I see some redemption in their future, with VMware owning them. VMware is a very strong player in the workspace, and especially with their workspace tool that VMware's building to work with Windows, Mac, and Linux clients, in order to do VDI.

For the Windows endpoints, it was incredibly useful, nothing got through it, which is a bad thing in some cases because we hadn't tagged the certificate platform appropriately. So, it's a bit of an improvement needed there, but the biggest complaint is around the operating systems not being available.

I would rate Carbon Black CB Defense a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1344240 - PeerSpot reviewer
IT Infrastructure - Global Head at a comms service provider with 10,001+ employees
Real User
Good security with a straightforward setup but requires better compatibility with other solutions
Pros and Cons
  • "The initial setup is pretty straightforward."
  • "The solution needs better overall compatibility with other products."

What is our primary use case?

We primarily use the solution as endpoint security.

What is most valuable?

The security, specifically the endpoint security that the solution provides, is its most valuable aspect.

The initial setup is pretty straightforward.

What needs improvement?

The solution needs better overall compatibility with other products.

For how long have I used the solution?

I've been using the solution for less than a year. I've only really been using it for the last one or two quarters of this fiscal year. It hasn't been a very long time yet.

What do I think about the stability of the solution?

The solution is quite stable. We find it to be a reliable product. There aren't bugs or glitches. It doesn't crash or freeze.

What do I think about the scalability of the solution?

The solution can scale if you need it to. That's not a problem at all.

We have more than 10,000 people using the solution currently.

How are customer service and technical support?

When it comes to technical support, so far it's been good. We've been pretty satisfied with their level of support. They are responsive and knowledgeable and we know we can get help when we need it.

Which solution did I use previously and why did I switch?

We were not using any other product before we started using this solution. That said, we registered for other products too and finally decided to go with Carbon Black after trying out other options.

How was the initial setup?

The initial setup isn't really complex. It's pretty straightforward. Those implementing the solution shouldn't have a problem getting it up and running.

The deployment only really took a few months. It was an okay process.

You need very little maintenance on the product. We have about two people here who manage it without any issues.

What other advice do I have?

We're just a customer. We don't have any business affiliation with Carbon Black.

We're currently using the latest version of the solution.

Overall, I would rate the solution seven out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Senior Manager, IT Security and Compliance / CISO at Superior Energy Services, Inc.
Real User
Detects and protects against malicious executable files, allows investigation using CLI
Pros and Cons
  • "The most valuable feature is that it detects and stops malicious executables."
  • "This solution works well but needs lots of tuning and optimization."

What is our primary use case?

We use this solution for endpoint security and protection.

What is most valuable?

The most valuable feature is that it detects and stops malicious executables.

Admins can use the portal to obtain a command shell on an endpoint to perform further investigation.

What needs improvement?

This solution works well but needs lots of tuning and optimization.

For how long have I used the solution?

We have been using this solution for two months.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
ICT/Systems Application Engineer at Honeywell
Real User
Top 20
Works well and instantly, responsive technical support, with high scalability
Pros and Cons
  • "The whole purpose of the product, like application control, is very good, and also if you need to update some policies, it works well and instantly."
  • "I would like to see the user credentials feature improved. I would also like to see more reporting features and better ways to roll the reports out."

What is our primary use case?

Our primary use case is for application control.

What is most valuable?

The whole purpose of the product, like application control, is very good, and also if you need to update some policies, it works well and instantly.

What needs improvement?

I would like to see the user credentials feature improved. I would also like to see more reporting features and better ways to roll the reports out.

For how long have I used the solution?

I have been using Carbon Black CB Defense for more than a year.

What do I think about the stability of the solution?

I would say the stability is high a nine on a scale of one to ten.

What do I think about the scalability of the solution?

On a scale of one to ten, I would give it a nine for being highly scalable.

How are customer service and support?

Technical support is pretty responsive. I have not had to use them a lot and when we need them we route them through our team.

How was the initial setup?

The initial setup was straightforward I had some minor issues with the web application I logged in and fixed them. The initial deployment only took about half a day. We have deployed to around one hundred systems.

What about the implementation team?

The deployment was done in-house.

What's my experience with pricing, setup cost, and licensing?

The pricing is annually based and operates through another department than mine.

What other advice do I have?

I would rate Carbon Black CB Defense an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
reviewer1465668 - PeerSpot reviewer
Senior NOC Security Engineer at a wholesaler/distributor with 51-200 employees
MSP
Implementation and upgrading difficult but operates well
Pros and Cons
  • "Once the solution is installed and configured correctly it does not require a lot of hands-on attention until you need upgrading."
  • "There are many different controls that are needed to be put into place for upgrading that makes it difficult. Having to re-engineer your IT infrastructure to match their software, as opposed to having it integrate and work independently causes difficulties. When there is an update to any software everyone has to be involved."

What is our primary use case?

My clients are using this solution for security as their frontline defense. They are using a whitelist that has all known software allowed.

What is most valuable?

Once the solution is installed and configured correctly it does not require a lot of hands-on attention until you need upgrading.

What needs improvement?

There are many different controls that are needed to be put into place for upgrading that makes it difficult. Having to re-engineer your IT infrastructure to match their software, as opposed to having it integrate and work independently causes difficulties. When there is an update to any software everyone has to be involved.

For how long have I used the solution?

I have been using this solution for approximately six years.

What do I think about the stability of the solution?

The solution has been working well, nothing stands out as an issue.

What do I think about the scalability of the solution?

I have found this solution to be highly scalable. We have clients that are large-size companies using this solution.

How are customer service and technical support?

The technical support was great when we used them.

I rate the technical support of Carbon Black CB Defense a nine out of ten.

How was the initial setup?

The solutions provider has made great strides in the last four years making it easier to implement. However, the way their architecture is makes it difficult, the installation is quite a cumbersome process to integrate everything together.

What other advice do I have?

My advice to those wanting to implement this solution is it not easy and it takes time and money.

I rate Carbon Black CB Defense a five out of ten.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free VMware Carbon Black Endpoint Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2024
Buyer's Guide
Download our free VMware Carbon Black Endpoint Report and get advice and tips from experienced pros sharing their opinions.