Carbon Black App Control vs. Cisco Secure Workload

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Carbon Black App Control
Score 7.4 out of 10
N/A
Carbon Black App Control is an application control product, used to lock down servers and critical systems, prevent unwanted changes and ensure continuous compliance with regulatory mandates.N/A
Cisco Secure Workload
Score 8.0 out of 10
N/A
The Cisco Secure Workload (formerly Tetration) platform offers holistic workload protection for multicloud data centers by enabling a zero-trust model using segmentation. This approach allows users to identify security incidents faster, contain lateral movement, and reduce the attack surface. Tetration's infrastructure-agnostic approach supports both on-premises and public cloud workloads.N/A
Pricing
Carbon Black App ControlCisco Secure Workload
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Carbon Black App ControlCisco Secure Workload
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoYes
Entry-level Setup FeeNo setup feeNo setup fee
Additional DetailsCisco Secure Workload software is licensed based on the number of workload equivalents or devices (endpoints) depending on the agent or sensor type being used. Telemetry data can be collected using agents, supported by other supported sensors or collectors, in any combination. Policy enforcement is enabled through agents with enforcement capability with infrastructure enforcement delivered through Cisco Secure Firewall Integration, Application Delivery Controllers (ADCs), and Security Groups in public cloud infrastructure or orchestrated via streamed Kafka policy. Workload is defined as a virtual machine, bare-metal server, or container host and includes server and desktop operating systems.
More Pricing Information
Community Pulse
Carbon Black App ControlCisco Secure Workload
Best Alternatives
Carbon Black App ControlCisco Secure Workload
Small Businesses
GitLab
GitLab
Score 8.7 out of 10

No answers on this topic

Medium-sized Companies
Veracode
Veracode
Score 9.1 out of 10

No answers on this topic

Enterprises
Veracode
Veracode
Score 9.1 out of 10

No answers on this topic

All AlternativesView all alternativesView all alternatives
User Ratings
Carbon Black App ControlCisco Secure Workload
Likelihood to Recommend
10.0
(3 ratings)
7.3
(1 ratings)
User Testimonials
Carbon Black App ControlCisco Secure Workload
Likelihood to Recommend
Broadcom
Cb Protect is best suited somewhere where you want to maximize the lockdown of workstations. So moving past no local admin rights to blocking specific applications and peripherals. The idea would be to have a list of applications you want to run, and then anything else is not able to be used. As stated prior, if you have a very fluid environment where you are having all sorts of new applications installed frequently (I feel for you!!) this is still do-able, but it misses the general idea. I think especially in environments that are more sensitive to new applications, like banks, healthcare systems etc, this is a good fit. The ability to look at application levels, drift, unapproved software etc is very useful.
Read full review
Cisco
The biggest challenge with this product is it crosses lines. You need somebody who can support servers as well as somebody who supports the infrastructure. And that's usually two different jobs, two different job titles, two different departments. So if you have a lot of silos within your organization and you have groups that don't work particularly well together between the server team and the network team, you will have problems developing and working on this product. If your server team and your network team work well together, then you'll have a lot fewer problems, it'll work pretty well. But if your server team and your network team are like oil and water don't bother.
Read full review
Pros
Broadcom
  • Controls file writes, executions of the scripts
  • Defends from process injections, memory protection
  • Visibility and lock down posibilities
Read full review
Cisco
No answers on this topic
Cons
Broadcom
  • Perhaps more specific training.
Read full review
Cisco
No answers on this topic
Alternatives Considered
Broadcom
The big difference between Protect and Barkly/AMP is how exactly it goes about what it's doing. Protect is application whitelisting and program reputation. So the way it's protecting you is using a proprietary reputation service, and hash values to identify applications, and then hitting a list of whitelisted programs to decide if you are able to run that or not, based on the policy you are in. There is a LOT of value in that. We actually are working on transitioning to Cisco Advanced Malware Protection (AMP). The main reason is cost (about the same cost as Cb Protect, but with (most of) the featureset of all 3 Carbon Black products for less than 1/3 of the total spend. AMP works differently, looking at a reputation service powered by Cisco's Talos cloud. You don't really have application whitelisting, but that also reduces how many "requests" you get for applications. So I'll have to find a different way to do whitelisting and USB blocking and the like, but I'm getting more visibility across my network and also built in antivirus (TETRA engine - ClamAV with some work). Barkly is an add that we are looking to put in as it looks at behavior of programs. So specifically it watches for privilege elevation and the like. Thus far all the big name problem children (WannaCry, other ransomware problems) have been caught natively in Barkly day 0.
Read full review
Cisco
No answers on this topic
Return on Investment
Broadcom
  • App Control can ensure Continuous Compliance.
  • Solution can reduce expenses on different security software.
  • Nowadays Zero Trust approach is very important for any organization and Application control is one of the main parts of it.
Read full review
Cisco
No answers on this topic
ScreenShots

Cisco Secure Workload Screenshots

Screenshot of Secure Workload DashboardScreenshot of Secure Workload Policy CanvasScreenshot of Secure Workload Flow Logs and Telemetry