Likelihood to Recommend
Cb Protect is best suited somewhere where you want to maximize the lockdown of workstations. So moving past no local admin rights to blocking specific applications and peripherals. The idea would be to have a list of applications you want to run, and then anything else is not able to be used. As stated prior, if you have a very fluid environment where you are having all sorts of new applications installed frequently (I feel for you!!) this is still do-able, but it misses the general idea. I think especially in environments that are more sensitive to new applications, like banks, healthcare systems etc, this is a good fit. The ability to look at application levels, drift, unapproved software etc is very useful.
- Device Control - you can view and allow/disallow the ability for certain devices to be used in your environment. Specifically we used this with USB drives. If you have one you want to use - whitelist the serial number. The rest can't be used. Simple and easy.
- Software blocking. If you have an extremely dynamic software base (I doubt this is likely) this could get a bit annoying, but for most organizations like ours where we have specific applications that are required, and then the rest are a bit of an afterthought, it's easy to whitelist the correct applications that you want to be able to run in your environment. The rest can't run (in high enforcement). Users are able to easily request new applications, and you can set certain groups to be able to approve it on their own.
- Solid platform - with few exceptions setting up new software was very easy (Dragon Medical was a bit tricky, but worked through it with support). Once you have your rules set up and the initial setup done, you tend not to have to do much of anything except to update on occasion and deal with a few requests for applications to be unblocked, or publishes approved.
- Cost - Cb Protect is part of now a 3 fold protection offering by Carbon Black. The other parts give you visibility and a more traditional antivirus (Conifer I believe). Once you price all three together, things get expensive. You get what you pay for I guess, as alternatives cost less, but you do lose out on features.
- On-Prem - I don't believe this has changed, but when we first set up the only option was on-prem. This has a LOT of benefits, but with more mobile users, it can become a bit of a hassle for management and updating policies. A cloud option, or cloud connector would be nice.
- Application whitelisting outperforms traditional AV/Malware protection but also takes a bit more babysitting. You end up spending a lot of time looking at new programs etc coming down the pipe. A great example is products that self update. These can become a pain as the product updates typically don't show up as signed, or not signed the way Protect looks for, so you end up whitelisting them as they come up, and depending on how often and how many you have in the environment it can be annoying.
- Protect is nice, but you really need to also have Response to see a holistic view. Else you're going endpoint to endpoint if you are breached/infected, and that gets tedious quickly. However this also adds to the cost.
The big difference between Protect and Barkly/AMP is how exactly it goes about what it's doing. Protect is application whitelisting and program reputation. So the way it's protecting you is using a proprietary reputation service, and hash values to identify applications, and then hitting a list of whitelisted programs to decide if you are able to run that or not, based on the policy you are in. There is a LOT of value in that.We actually are working on transitioning to Cisco Advanced Malware Protection (AMP). The main reason is cost (about the same cost as Cb Protect, but with (most of) the featureset of all 3 Carbon Black products for less than 1/3 of the total spend. AMP works differently, looking at a reputation service powered by Cisco's Talos cloud. You don't really have application whitelisting, but that also reduces how many "requests" you get for applications. So I'll have to find a different way to do whitelisting and USB blocking and the like, but I'm getting more visibility across my network and also built in antivirus (TETRA engine - ClamAV with some work).Barkly is an add that we are looking to put in as it looks at behavior of programs. So specifically it watches for privilege elevation and the like. Thus far all the big name problem children (WannaCry, other ransomware problems) have been caught natively in Barkly day 0.
Return on Investment
- Protect took care of our objective, which was to protect the endpoints against rogue software and to help with preventing users from installing software that wasn't necessary/desired.
Premium Consulting/Integration Services—
Entry-level set up fee?