What users are saying about
9 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener'>trScore algorithm: Learn more.</a>
Score 8.3 out of 100
16 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener'>trScore algorithm: Learn more.</a>
Score 8.6 out of 100

Feature Set Ratings

    Incident Response Platforms

    D3 Security

    Feature Set Not Supported
    N/A
    8.3

    VMware Carbon Black EDR

    83%
    VMware Carbon Black EDR ranks higher in 6/6 features

    Company-wide Incident Reporting

    N/A
    0 Ratings
    9.0
    90%
    2 Ratings

    Integration with Other Security Systems

    N/A
    0 Ratings
    8.0
    80%
    2 Ratings

    Attack Chain Visualization

    N/A
    0 Ratings
    9.0
    90%
    2 Ratings

    Centralized Dashboard

    N/A
    0 Ratings
    9.0
    90%
    2 Ratings

    Machine Learning to Prevent Incidents

    N/A
    0 Ratings
    7.0
    70%
    2 Ratings

    Live Response for Rapid Remediation

    N/A
    0 Ratings
    8.0
    80%
    2 Ratings

    Attribute Ratings

    • D3 Security is rated higher in 1 area: Likelihood to Recommend

    Likelihood to Recommend

    8.2

    D3 Security

    82%
    6 Ratings
    8.0

    VMware Carbon Black EDR

    80%
    2 Ratings

    Likelihood to Recommend

    D3 Security

    D3 is clearly tailoring their approach to large organizations with a significant geographical footprint who are largely in need of a tool that provides robust analytics and activity graphing to analyze productivity and supervisory efficiency at the executive level. However, small to medium-sized organizations and those with narrow geographical footprints may find the investment vastly more expensive than the return. The implementation of minimum purchasing guidelines means that smaller departments will be forced into purchasing tools they have little to no use for, and medium-size departments will be paying a high price for features they do find helpful but could get elsewhere for a substantially lower price. Additionally, small to medium-sized users may find that D3's focus on large organizational level tools is less helpful than some smaller competitor's software which provides a number of capabilities with more operational relevance for environments like office buildings, college campuses, university police departments, and housing associations. Overall, I would recommend D3 to large organizations who have need of the advanced tools included in their more expensive modules. The lack of some smaller levels of customization, 1st line operational features, and the high-end user interface is less important at that level of implementation.
    Read full review

    VMware

    We are able to check if any phishing link was visited by the user or not. To check for the whether any file is executed on the machine or not. To check on which port connections are being made by the machine. To create custom watchlist for alert to be investigated by an analyst. To check every process executed in the machine for a specified range.
    Read full review

    Pros

    D3 Security

    • A solid team of helpers, a gradual increase in proficiency.
    • There are a lot of options for adding information to a report using the report-creation tool.
    • The D3 Security system can be easily scaled up or down depending on the size of the site.
    Read full review

    VMware

    • Process tree view of endpoint activity
    • Ability to pull files from host
    • Threat Intelligence integration
    • Isolate a host
    Read full review

    Cons

    D3 Security

    • A lack of documentation of the administrative interface.
    • Additional training is needed to take advantage of all of the features.
    • Remediation and post-incident activities are not supported.
    Read full review

    VMware

    • Number of false positive which are triggered due to threat feeds are sometimes more needs to be fine tuned by the client.
    • In very rare scenarios processes are not captured properly.
    Read full review

    Pricing Details

    D3 Security

    Starting Price

    Editions & Modules

    D3 Security editions and modules pricing
    EditionModules

    Footnotes

      Offerings

      Free Trial
      Free/Freemium Version
      Premium Consulting/Integration Services

      Entry-level set up fee?

      No setup fee

      Additional Details

      VMware Carbon Black EDR

      Starting Price

      Editions & Modules

      VMware Carbon Black EDR editions and modules pricing
      EditionModules

      Footnotes

        Offerings

        Free Trial
        Free/Freemium Version
        Premium Consulting/Integration Services

        Entry-level set up fee?

        No setup fee

        Additional Details

        Alternatives Considered

        D3 Security

        No answers on this topic

        VMware

        CB Response allows for a better view of what happened on the endpoint and provides more functionality out of the box then the FireEye Endpoint Security Product. CB Response allows you to basically have a remote connection into the CLI of an endpoint. This allows you to view the file system, run programs/scripts on the host, etc. FireEye Endpoint Security does not have this functionality.
        Read full review

        Return on Investment

        D3 Security

        • With this software, you can create a database of repeat offenders so that you can keep a track of them and also deal with false claims.
        • The costs are very high so its difficult to balance the spends.
        • The detailed documentations can be used in court in case of any legal issues.
        Read full review

        VMware

        • It is helping to protect us from potential loss of revenue that would be caused by malware or a compromised account.
        • It took some time in deploying in the environment , but that time is much worth it because of the results we are getting now.
        • It helps in hunting, which help us check and protect our environment from any cyber attacks.
        Read full review

        Add comparison