Skip to main content
TrustRadius
Carbon Black Endpoint

Carbon Black Endpoint

Overview

What is Carbon Black Endpoint?

The VMware Carbon Black Endpoint solution (formerly Cb Defense) is an endpoint security and "next-gen antivirus (NGAV)" that uses machine learning and behavioral models to analyze endpoint data and uncover malicious activity to stop all types of attacks before they…

Read more
Recent Reviews

TrustRadius Insights

Cb Defense by VMware Carbon Black Endpoint is used by organizations across various industries to address their endpoint security needs. …
Continue reading
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Carbon Black Endpoint?

The VMware Carbon Black Endpoint solution (formerly Cb Defense) is an endpoint security and "next-gen antivirus (NGAV)" that uses machine learning and behavioral models to analyze endpoint data and uncover malicious activity to stop all types of attacks before they reach critical systems. Endpoint…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

57 people also want pricing

Alternatives Pricing

What is Kaspersky EDR Optimum?

Kaspersky Endpoint Detection and Response (EDR) Optimum helps identify, analyze and neutralize evasive threats by providing easy-to-use advanced detection, simplified investigation and automated response. It is a basic EDR tool for mid-market organizations who are just starting to build their…

What is Kaspersky EDR Expert?

Kaspersky Endpoint Detection and Response (EDR) Expert provides endpoint protection, advanced detection, threat hunting and investigation capabilities and multiple response options in a single package. It is an EDR solution for IT security teams with more mature incident response processes,…

Return to navigation

Product Details

What is Carbon Black Endpoint?

Carbon Black Endpoint Screenshots

Screenshot of Cb Defense Dashboard
See every attack and potential threat at a glance in this interactive viewScreenshot of Cb Defense Alert Triage
Get answers to how and why each attack occurredScreenshot of Cb Defense Response
Strengthen your defenses with every attack

Carbon Black Endpoint Video

Cb Defense Demo

Carbon Black Endpoint Competitors

Carbon Black Endpoint Technical Details

Deployment TypesOn-premise, Software as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows, Linux, Mac
Mobile ApplicationNo
Supported LanguagesEnglish

Frequently Asked Questions

The VMware Carbon Black Endpoint solution (formerly Cb Defense) is an endpoint security and "next-gen antivirus (NGAV)" that uses machine learning and behavioral models to analyze endpoint data and uncover malicious activity to stop all types of attacks before they reach critical systems. Endpoint Standard captures and stores endpoint activity, enabling a comprehensive view of any suspicious activity on endpoints, including visibility into the entire attack chain, so users can understand the impact of any attacks and take action. VMware acquired Carbon Black October 2019.

Symantec Endpoint Security, Sophos Intercept X, and Trend Micro Apex One are common alternatives for Carbon Black Endpoint.

Reviewers rate Endpoint Detection and Response (EDR) and Infection Remediation highest, with a score of 9.7.

The most common users of Carbon Black Endpoint are from Mid-sized Companies (51-1,000 employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(29)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Cb Defense by VMware Carbon Black Endpoint is used by organizations across various industries to address their endpoint security needs. With its advanced threat protection and management capabilities, the product serves as the primary antivirus agent, monitoring and protecting all endpoints from both known and unknown malware threats. Customers have reported that Cb Defense effectively stops 0-day threats and provides better protection compared to previous solutions against antivirus, malware, spyware, and potentially unwanted programs.

One key use case of Cb Defense is its ability to enable threat hunting and investigations through its advanced forensics capabilities. Users have found that the product goes beyond traditional threat prevention by offering tools to contain and track active threats. The Dashboard provides visibility into process executions and system history, allowing users to identify anomalies and take appropriate actions. This has been particularly useful in addressing potential endpoint infections and compromises in security.

Organizations have also found value in Cb Defense for its easy deployment and management, providing a seamless experience for users. It has replaced insufficient endpoint protection products across multiple lines of business within organizations. Users appreciate the next-gen AI capabilities and non-pattern-based approach to threat detection and prevention offered by Cb Defense.

Moreover, the introduction of version 3.2.2 has enhanced the deployment strategy by offering features such as the ability to quarantine endpoints and perform live analysis on systems. This has provided users with greater control and flexibility in managing potential threats. Additionally, Cb Defense plays a critical role in supporting PCI compliance initiatives, ensuring that organizations meet regulatory requirements.

Overall, customers have found Cb Defense to be an effective solution for their endpoint security needs. Its advanced threat protection, threat hunting capabilities, ease of use, and compliance support make it a valuable addition to any organization's security portfolio.

Dashboard's Helpful Monitoring: Users have found the Carbon Black Endpoint's Dashboard to be extremely helpful in monitoring process execution history and identifying malicious activities. Several reviewers have mentioned that it allows for easy detection of malware, backdoor, rootkit, or Trojan infections.

Quarantine Capability: The ability to quarantine a system directly from the Dashboard has been highly appreciated by users. This feature eliminates the need for manual intervention and allows for immediate analysis and response. Multiple reviewers have praised this functionality.

Seamless Live Response Integration: Reviewers have praised Carbon Black Endpoint's seamless integration of Live Response with the quarantine capability. This feature enables efficient analysis and troubleshooting directly from the user's workstation, eliminating additional steps such as pulling drives or creating hard drive images. Many users have spoken positively about this integrated functionality.

Integration with SIEM products needs improvement: Several users have expressed frustration with the integration capabilities of VMware Carbon Black Endpoint, particularly when it comes to Alien Vault and other SIEM products like Splunk. They have mentioned that detailed setup instructions are lacking, making it difficult to integrate effectively. This is especially problematic for organizations with multiple USM appliances.

Concerns about data leakage and third-party access: Some reviewers have raised concerns about the security of their data collected by the software. They have mentioned that the system uploads data to the cloud on port 443, which raises questions about potential visibility to third parties. These concerns highlight a need for clearer communication and reassurance regarding data privacy.

False positive alerts: A number of users have reported experiencing false positive alerts generated by VMware Carbon Black Endpoint. Examples include Outlook scraping memory being flagged as ransomware activity or triggers from Word, Excel, and Chrome resulting in unnecessary alerts. While some reviewers suggest whitelisting within the alert itself, they express a lack of time for manual actions required to address these false positives efficiently.

Attribute Ratings

Reviews

(1-7 of 7)
Companies can't remove reviews or game the system. Here's why
Kevin Staley | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
This is a very good solution for endpoint protection irrespective of the client to be protected (laptops, desktops, servers etc.). It is well suited for small and large organizations. The management portal is easy to navigate, and very comprehensive in its view of protected endpoints and the activity on them. The portal can also be used to configure any number of policies useful for governing things to look for, and what actions to take when found.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Cb Defense has been working very well in our organization. It is giving us much better insight into the applications that people are running on their systems (without authorization). This software is also great because it provides visibility into systems that are remote (off the network but still have Internet access). The out of band feature is great to help ensure that the systems are protected even when a user is traveling.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Cb defense seems to be well suited to provide a lot of detail about potential security issues with your endpoints. It aggressively stops potentially bad activities on the endpoints, and it is easy to configure to allow processes that are stopped but you wish to allow. This makes it easy for a small IT shop to manage without the use of a full-time security employee. Unfortunately, like all other advanced security products, it can be challenging (if you do want to get to the details) to wade through on a part-time basis.
William Bocash | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Cb Defense is well suited for teams that are looking to reduce on-prem management and overhead and want more insights and forensics for their endpoint security. It is suited for companies needing to meet PCI requirements. It is not suited for teams looking for a "set it and forget it" solution. The real value with this product is the management and forensics, but you need staff that cares enough to use it.
June 06, 2017

Cb Defense NGAV

Eric Samuelson | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Cb Defense works great to protect systems from known and unknown malware. It is simple to deploy and manage. You might run into some issues if you run a lot of unsigned applications or scripts in your IT environment. If that is the case, you can whitelist certain paths for your scripts to run. You can whitelist the individual applications and certs if you have them.
Christopher St.Amand | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Cb Defense is well suited for any active end user environment; downloading files, browsing internet, checking email and attachments. Though, I don't see as much of an added value in the server space since the product will not stop Exploits (that's not its function) and no one browses the internet a server.
Return to navigation