Protect your endpoint with Carbon Black EDR
Updated April 15, 2022
Protect your endpoint with Carbon Black EDR
Score 8 out of 10
Vetted Review
Verified User
Overall Satisfaction with VMware Carbon Black EDR
VMware Carbon Black EDR is used for investigation of endpoint. It helps in looking out for any malicious activity in the host machines. We get various information about the activity like in which machine the event is occurring, occurrence time and what all events are being performed in the endpoint. It helps in checking all the network connections made by the machine , any modification in the files made in the machine, all the processes that are running in the machine can be checked using VMware Carbon Black EDR. It helps in creating custom watchlist of events also it has threat feeds for investigation.
- Helps in tracking network connections made by machine
- Process Tree which show series of workflow which clear and easy to understand.
- Enables to go live into the machine and investigate
- Number of false positive which are triggered due to threat feeds are sometimes more needs to be fine tuned by the client.
- In very rare scenarios processes are not captured properly.
- It is helping to protect us from potential loss of revenue that would be caused by malware or a compromised account.
- It took some time in deploying in the environment , but that time is much worth it because of the results we are getting now.
- It helps in hunting, which help us check and protect our environment from any cyber attacks.
- Microsoft Defender for Endpoint (formerly Microsoft Defender ATP)
It has better UI.
Do you think VMware Carbon Black EDR delivers good value for the price?
Yes
Are you happy with VMware Carbon Black EDR's feature set?
Yes
Did VMware Carbon Black EDR live up to sales and marketing promises?
Yes
Did implementation of VMware Carbon Black EDR go as expected?
Yes
Would you buy VMware Carbon Black EDR again?
Yes