Carbon Black Endpoint is Life Saver
January 09, 2025

Carbon Black Endpoint is Life Saver

Patrick Jaramillo | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Carbon Black Endpoint

Carbon Black Endpoint is used to detect malicious processes and software across our computing devices. It recently was able to detect a suspected compromised computer very quickly and allowed to investigate to safeguard our internal network rapidly.

Pros

  • Malicious Software and process detection
  • Suspicious Login Attempts
  • Root User Account of Attacks and Machines.

Cons

  • Ability to Attach Carbon Black Endpoint to non-Computing Devices such as Firewall appliances
  • Ability to Perform Deep Scans without using CLI so IT can ask users to run them instead of our intervention.
  • Automatic Enrollment for new device joined to our domain.
  • Recent Brute Force Attack was quickly mitigated with Carbon Black Endpoint's detection
  • Easy removal and uninstall of Sensor on legacy/decommissioned devices
  • Can be difficult to deploy via Citrix VDI but do-able
Simple Sensor Installation computing devices for end users. Can be done silently and sensor is non-invasive on user day to day activities.
Symantec was very old school like for a constantly evolving digital world. Carbon Black Endpoint appeared to be both more user friendly and also have detection tools we found more useful to us than Symantec.

Do you think Carbon Black Endpoint delivers good value for the price?

Yes

Are you happy with Carbon Black Endpoint's feature set?

Yes

Did Carbon Black Endpoint live up to sales and marketing promises?

Yes

Did implementation of Carbon Black Endpoint go as expected?

Yes

Would you buy Carbon Black Endpoint again?

Yes

Rapid detection of malicious processes has been top notch! With these quick alerts, IT can quickly investigate and mitigate such issues to secure their environment.

Carbon Black Endpoint Feature Ratings

Anti-Exploit Technology
10
Endpoint Detection and Response (EDR)
10
Centralized Management
8
Hybrid Deployment Support
8
Infection Remediation
10
Vulnerability Management
9
Malware Detection
9

Comments

More Reviews of Carbon Black Endpoint