Hoxhunt vs. VMware Carbon Black EDR

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Hoxhunt
Score 9.3 out of 10
N/A
Hoxhunt, headquartered in Helsinki, empowers employees to shield their organisations with adaptive learning flows that transform how employees react and respond to the growing amount of phishing emails.N/A
VMware Carbon Black EDR
Score 8.4 out of 10
N/A
VMware Carbon Black EDR (formerly Cb Response) is an incident response and threat hunting solution designed for security operations center (SOC) teams with offline environments or on-premises requirements. Carbon Black EDR records and stores endpoint activity data so that security professionals can hunt threats in real time and visualize the complete attack kill chain. It leverages the VMware Carbon Black Cloud’s aggregated threat intelligence, which is applied to the endpoint activity system of…N/A
Pricing
HoxhuntVMware Carbon Black EDR
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
HoxhuntVMware Carbon Black EDR
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeOptionalNo setup fee
Additional Details
More Pricing Information
Community Pulse
HoxhuntVMware Carbon Black EDR
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Features
HoxhuntVMware Carbon Black EDR
Security
Comparison of Security features of Product A and Product B
Hoxhunt
8.9
18 Ratings
7% above category average
VMware Carbon Black EDR
-
Ratings
Single sign-on capability8.917 Ratings00 Ratings
Role-based user permissions8.914 Ratings00 Ratings
Security Awareness Training
Comparison of Security Awareness Training features of Product A and Product B
Hoxhunt
8.7
23 Ratings
4% above category average
VMware Carbon Black EDR
-
Ratings
Training Content Library9.020 Ratings00 Ratings
Multilingual Training Content7.412 Ratings00 Ratings
Training Gamification9.023 Ratings00 Ratings
Industry-Specific Security Training8.720 Ratings00 Ratings
Individualized Security Training Plans8.218 Ratings00 Ratings
Phishing Simulations9.123 Ratings00 Ratings
Security Reporting9.220 Ratings00 Ratings
Integration with Security Tech Stack8.914 Ratings00 Ratings
Incident Response Platforms
Comparison of Incident Response Platforms features of Product A and Product B
Hoxhunt
-
Ratings
VMware Carbon Black EDR
8.3
2 Ratings
2% below category average
Company-wide Incident Reporting00 Ratings9.02 Ratings
Integration with Other Security Systems00 Ratings8.02 Ratings
Attack Chain Visualization00 Ratings9.02 Ratings
Centralized Dashboard00 Ratings9.02 Ratings
Machine Learning to Prevent Incidents00 Ratings7.02 Ratings
Live Response for Rapid Remediation00 Ratings8.02 Ratings
Best Alternatives
HoxhuntVMware Carbon Black EDR
Small Businesses
Barracuda Security Awareness Training
Barracuda Security Awareness Training
Score 6.9 out of 10
ThreatDown, powered by Malwarebytes
ThreatDown, powered by Malwarebytes
Score 8.7 out of 10
Medium-sized Companies
Proofpoint Security Awareness Training
Proofpoint Security Awareness Training
Score 9.0 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Enterprises
KnowBe4 Security Awareness Training
KnowBe4 Security Awareness Training
Score 9.0 out of 10
Hoxhunt
Hoxhunt
Score 9.3 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
HoxhuntVMware Carbon Black EDR
Likelihood to Recommend
9.4
(23 ratings)
8.0
(2 ratings)
User Testimonials
HoxhuntVMware Carbon Black EDR
Likelihood to Recommend
Hoxhunt
Hoxhunt has the right strategy to make the users stop and think twice about what they are reading or clicking. Taking the user to the point of double-checking on every single unexpected message, and creating a safer scenario for any company.
Read full review
VMware by Broadcom
We are able to check if any phishing link was visited by the user or not. To check for the whether any file is executed on the machine or not. To check on which port connections are being made by the machine. To create custom watchlist for alert to be investigated by an analyst. To check every process executed in the machine for a specified range.
Read full review
Pros
Hoxhunt
  • Disguises emails like someone from within the organization.
  • Does a good job of making an email seem urgent.
  • Does a good job of appealing to the emotions, to attract someone to open an attachment.
  • Seems to pick up on recent topics that you had emailed about, and tries to imitate something in that topic.
Read full review
VMware by Broadcom
  • Process tree view of endpoint activity
  • Ability to pull files from host
  • Threat Intelligence integration
  • Isolate a host
Read full review
Cons
Hoxhunt
  • The score could be more transparent, as there are people with more stars and I don't know why, as I correctly reported the phishing
  • Have other ways to get stars other than just reporting email
  • Have a user score comparison tool
Read full review
VMware by Broadcom
  • Number of false positive which are triggered due to threat feeds are sometimes more needs to be fine tuned by the client.
  • In very rare scenarios processes are not captured properly.
Read full review
Alternatives Considered
Hoxhunt
Train employees with Hoxhunt so that they can learn to recognize and report real attacks. Don’t let your employees fall victim to phishing attacks. Explore the free training demo. Customer Success Support. Fully Automated Training. Threat Insight & Response. explain why behavior change is relevant for cybersecurity, and the applicable psychological mechanisms, tools, and theories.
Read full review
VMware by Broadcom
CB Response allows for a better view of what happened on the endpoint and provides more functionality out of the box then the FireEye Endpoint Security Product. CB Response allows you to basically have a remote connection into the CLI of an endpoint. This allows you to view the file system, run programs/scripts on the host, etc. FireEye Endpoint Security does not have this functionality.
Read full review
Return on Investment
Hoxhunt
  • Mitigating potential threats allows for a continuous workflow
  • Reducing the incidence of information leakage allows the company to maintain its competitiveness based on its capacity for innovation.
  • It allows our IT security department to detect those users who need better cyber security training.
  • The efforts of our IT engineers are now focused on finding improvements, and not on solving problems derived from the computer infection.
Read full review
VMware by Broadcom
  • It is helping to protect us from potential loss of revenue that would be caused by malware or a compromised account.
  • It took some time in deploying in the environment , but that time is much worth it because of the results we are getting now.
  • It helps in hunting, which help us check and protect our environment from any cyber attacks.
Read full review
ScreenShots