Protect your endpoint with Carbon Black EDR
Updated April 15, 2022

Protect your endpoint with Carbon Black EDR

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with VMware Carbon Black EDR

VMware Carbon Black EDR is used for investigation of endpoint. It helps in looking out for any malicious activity in the host machines. We get various information about the activity like in which machine the event is occurring, occurrence time and what all events are being performed in the endpoint. It helps in checking all the network connections made by the machine , any modification in the files made in the machine, all the processes that are running in the machine can be checked using VMware Carbon Black EDR. It helps in creating custom watchlist of events also it has threat feeds for investigation.
  • Helps in tracking network connections made by machine
  • Process Tree which show series of workflow which clear and easy to understand.
  • Enables to go live into the machine and investigate
  • Number of false positive which are triggered due to threat feeds are sometimes more needs to be fine tuned by the client.
  • In very rare scenarios processes are not captured properly.
  • It is helping to protect us from potential loss of revenue that would be caused by malware or a compromised account.
  • It took some time in deploying in the environment , but that time is much worth it because of the results we are getting now.
  • It helps in hunting, which help us check and protect our environment from any cyber attacks.
  • Microsoft Defender for Endpoint (formerly Microsoft Defender ATP)
It has better UI.

Do you think VMware Carbon Black EDR delivers good value for the price?

Yes

Are you happy with VMware Carbon Black EDR's feature set?

Yes

Did VMware Carbon Black EDR live up to sales and marketing promises?

Yes

Did implementation of VMware Carbon Black EDR go as expected?

Yes

Would you buy VMware Carbon Black EDR again?

Yes

We are able to check if any phishing link was visited by the user or not.
To check for the whether any file is executed on the machine or not.
To check on which port connections are being made by the machine.
To create custom watchlist for alert to be investigated by an analyst.
To check every process executed in the machine for a specified range.

VMware Carbon Black EDR Feature Ratings

Company-wide Incident Reporting
9
Integration with Other Security Systems
8
Attack Chain Visualization
9
Centralized Dashboard
9
Machine Learning to Prevent Incidents
7
Live Response for Rapid Remediation
8