I use the solution for any endpoint in a system, such as a host. The EDR can detect any malicious activity, such as malware, anomalous behavior, or any other possibility of a threat.
Firstly, we use it as part of our Zero Trust networking solution as it acts as a mitigating response for any vulnerabilities with applications or the operating system. Secondly, we use it to track device compliance to check whether things are updated because it collects so much information about devices. Most importantly, we use it for peace of mind knowing that we have a flexible and robust solution for endpoint security.
My clients are in a range of verticals, so we have clients in healthcare, education, manufacturing, etc. We provide solutions to anybody who's insightful enough and forethinking enough to understand that cybersecurity is not like insurance. So my use cases are all across the board. But, essentially, my customer base boils down to anyone who doesn't want to get owned by a ransomware attack. My company chooses the best-in-breed technology for tools, then adds cybersecurity management services on top of that.
Senior Manager at a financial services firm with 1,001-5,000 employees
Real User
2020-02-13T07:50:54Z
Feb 13, 2020
We use Carbon Black for detection and response. So we receive alerts from Carbon Black if it detects any malicious activity. We also use it to quarantine any devices that we may need to isolate due to the security risk that it presents.
Senior Software Developer Engineer at Diyar United Company
Reseller
2019-08-07T06:15:00Z
Aug 7, 2019
Our primary use case is to detect any abnormal activity happening on the endpoint. Carbon Black Response works like CCTV which monitors every activity and every single process running on the operating system. We use it on Windows, Linux, and Mac. Once there is an abnormal action, there is a notification that is sent to the administrator. The administrator will open up the GUI, the console for the Carbon Black Response, and start doing his investigation to get to the root cause for the issue if there is one.
Senior Information Security Specialist at a tech services company with 1,001-5,000 employees
Real User
2019-07-01T07:59:00Z
Jul 1, 2019
We use it for platform metrics, for all use cases. This is the only thing that works, this product. Carbon black is a process listener. You can call back all processes, each process on the client side or the server side. You can retrieve all the information on a process level, and you can combine all the things with an end use case.
SOC Analyst at a tech services company with 201-500 employees
Real User
2019-07-01T07:59:00Z
Jul 1, 2019
I did some tests when they came out with the solution because my manager wants an assessment with Carbon Black. I tested the solution for two weeks. It was good.
Fortify Endpoint and Workload Protection
Legacy approaches fall short as cybercriminals update tactics and obscure their actions. Get advanced cybersecurity fueled by behavioral analytics to spot minor fluctuations and adapt in response.
Recognize New Threats
Analyze attackers’ behavior patterns to detect and stop never-before-seen attacks with continuous endpoint activity data monitoring. Don’t get stuck analyzing only what’s worked in the past.
Simplify Your Security Stack
Streamline the...
We use VMware Carbon Black Cloud for endpoint detection and response.
I use VMware Carbon Black Cloud for endpoint protection, serving as a defense against malware and viruses on client devices.
I use the solution for any endpoint in a system, such as a host. The EDR can detect any malicious activity, such as malware, anomalous behavior, or any other possibility of a threat.
Firstly, we use it as part of our Zero Trust networking solution as it acts as a mitigating response for any vulnerabilities with applications or the operating system. Secondly, we use it to track device compliance to check whether things are updated because it collects so much information about devices. Most importantly, we use it for peace of mind knowing that we have a flexible and robust solution for endpoint security.
I use the solution to do back-end architecture and management for a response.
My clients are in a range of verticals, so we have clients in healthcare, education, manufacturing, etc. We provide solutions to anybody who's insightful enough and forethinking enough to understand that cybersecurity is not like insurance. So my use cases are all across the board. But, essentially, my customer base boils down to anyone who doesn't want to get owned by a ransomware attack. My company chooses the best-in-breed technology for tools, then adds cybersecurity management services on top of that.
We use Carbon Black for detection and response. So we receive alerts from Carbon Black if it detects any malicious activity. We also use it to quarantine any devices that we may need to isolate due to the security risk that it presents.
Our primary use case is to detect any abnormal activity happening on the endpoint. Carbon Black Response works like CCTV which monitors every activity and every single process running on the operating system. We use it on Windows, Linux, and Mac. Once there is an abnormal action, there is a notification that is sent to the administrator. The administrator will open up the GUI, the console for the Carbon Black Response, and start doing his investigation to get to the root cause for the issue if there is one.
Our primary usage for this solution is as an endpoint response. We use Carbon Black as a threat line of defense for the endpoints.
We use it for platform metrics, for all use cases. This is the only thing that works, this product. Carbon black is a process listener. You can call back all processes, each process on the client side or the server side. You can retrieve all the information on a process level, and you can combine all the things with an end use case.
I did some tests when they came out with the solution because my manager wants an assessment with Carbon Black. I tested the solution for two weeks. It was good.