Proofpoint Threat Response Auto-Pull vs. VMware Carbon Black EDR

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Proofpoint Threat Response Auto-Pull
Score 9.0 out of 10
N/A
Proofpoint Threat Response Auto-Pull (TRAP) enables messaging and security administrators to automatically retract threats delivered to employee inboxes and emails that turn malicious after delivery to quarantine. It is also a powerful solution to retract messages sent in error as well as inappropriate, malicious, or emails containing compliance violations and also follows forwarded mail and distribution lists and creates an audit-able activity trail. With Proofpoint Threat Response…N/A
VMware Carbon Black EDR
Score 8.4 out of 10
N/A
VMware Carbon Black EDR (formerly Cb Response) is an incident response and threat hunting solution designed for security operations center (SOC) teams with offline environments or on-premises requirements. Carbon Black EDR records and stores endpoint activity data so that security professionals can hunt threats in real time and visualize the complete attack kill chain. It leverages the VMware Carbon Black Cloud’s aggregated threat intelligence, which is applied to the endpoint activity system of…N/A
Pricing
Proofpoint Threat Response Auto-PullVMware Carbon Black EDR
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Proofpoint Threat Response Auto-PullVMware Carbon Black EDR
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Proofpoint Threat Response Auto-PullVMware Carbon Black EDR
Top Pros
Top Cons
Features
Proofpoint Threat Response Auto-PullVMware Carbon Black EDR
Incident Response Platforms
Comparison of Incident Response Platforms features of Product A and Product B
Proofpoint Threat Response Auto-Pull
8.4
3 Ratings
1% below category average
VMware Carbon Black EDR
8.3
2 Ratings
2% below category average
Integration with Other Security Systems9.03 Ratings8.02 Ratings
Attack Chain Visualization8.02 Ratings9.02 Ratings
Centralized Dashboard6.03 Ratings9.02 Ratings
Machine Learning to Prevent Incidents9.01 Ratings7.02 Ratings
Live Response for Rapid Remediation10.03 Ratings8.02 Ratings
Company-wide Incident Reporting00 Ratings9.02 Ratings
Best Alternatives
Proofpoint Threat Response Auto-PullVMware Carbon Black EDR
Small Businesses
ThreatDown, powered by Malwarebytes
ThreatDown, powered by Malwarebytes
Score 8.7 out of 10
ThreatDown, powered by Malwarebytes
ThreatDown, powered by Malwarebytes
Score 8.7 out of 10
Medium-sized Companies
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Enterprises
Hoxhunt
Hoxhunt
Score 9.3 out of 10
Hoxhunt
Hoxhunt
Score 9.3 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Proofpoint Threat Response Auto-PullVMware Carbon Black EDR
Likelihood to Recommend
9.0
(4 ratings)
8.0
(2 ratings)
Usability
9.0
(1 ratings)
-
(0 ratings)
Support Rating
9.0
(1 ratings)
-
(0 ratings)
User Testimonials
Proofpoint Threat Response Auto-PullVMware Carbon Black EDR
Likelihood to Recommend
Proofpoint
If your email admins spend time manually pulling malicious emails, this tool will save them countless hours of work and will do it for them 24 x 7. So if a user receives a malicious email after-hours, TRAP will auto pull it from the affected user's mailbox and potentially save you from an IT disaster.
Read full review
VMware by Broadcom
We are able to check if any phishing link was visited by the user or not. To check for the whether any file is executed on the machine or not. To check on which port connections are being made by the machine. To create custom watchlist for alert to be investigated by an analyst. To check every process executed in the machine for a specified range.
Read full review
Pros
Proofpoint
  • Auto pull works great, even with our hybrid situation with 2 on premise exchange organizations.
  • Reporting is good, nice graphs of all the actions.
Read full review
VMware by Broadcom
  • Process tree view of endpoint activity
  • Ability to pull files from host
  • Threat Intelligence integration
  • Isolate a host
Read full review
Cons
Proofpoint
  • Learning curve is steep.
  • Interface can be clunky.
  • Some interface items seem counter-intuitive.
Read full review
VMware by Broadcom
  • Number of false positive which are triggered due to threat feeds are sometimes more needs to be fine tuned by the client.
  • In very rare scenarios processes are not captured properly.
Read full review
Usability
Proofpoint
It's easy to use and requires very little administrator hands on.
Read full review
VMware by Broadcom
No answers on this topic
Support Rating
Proofpoint
They are quick to respond and have talented support personnel.
Read full review
VMware by Broadcom
No answers on this topic
Alternatives Considered
Proofpoint
I have never evaluated TRAP against another product.
Read full review
VMware by Broadcom
CB Response allows for a better view of what happened on the endpoint and provides more functionality out of the box then the FireEye Endpoint Security Product. CB Response allows you to basically have a remote connection into the CLI of an endpoint. This allows you to view the file system, run programs/scripts on the host, etc. FireEye Endpoint Security does not have this functionality.
Read full review
Return on Investment
Proofpoint
  • Chances of phishing attacks has decreased.
  • Your employees don't have to do anything, so no impact on productivity.
Read full review
VMware by Broadcom
  • It is helping to protect us from potential loss of revenue that would be caused by malware or a compromised account.
  • It took some time in deploying in the environment , but that time is much worth it because of the results we are getting now.
  • It helps in hunting, which help us check and protect our environment from any cyber attacks.
Read full review
ScreenShots