Carbon Black Cb Response Reviews

Filter by:Reset all filters
industry
Filter Unavailable
Company Size
Filter Unavailable
Job Level
Filter Unavailable
rating
Filter Unavailable
Nicholas Carroll
Real User
Cyber Security Manager at a insurance company with 51-200 employees
Apr 05 2018

What is most valuable?

The ability to quickly isolate a system from the network, while still being able to perform some forensics and... more»

How has it helped my organization?

The enhanced logging and data analysis of the incident response and investigation components allowed us to quickly... more»

What needs improvement?

Cb Response is really designed to complement Carbon Black’s Defense product. While Response can be used on its own,... more»

What's my experience with pricing, setup cost, and licensing??

We had no issues purchasing through our preferred reseller and were able to get a fair price even when not purchasing... more»

Which other solutions did I evaluate??

We did not have a similar, previous solution that we were replacing. This was part of an initial push we were trying to... more»

What other advice do I have??

Explore all options in the space and see if you’re ready to really use an incident response platform such as this for... more»
Consultic624
Real User
Consulting IT Architect
May 21 2018

What is most valuable?

Carbon Black Cb Response excels at providing context to indicators when responding to incidents. It allows responders to understand the entire... more»

How has it helped my organization?

Carbon Black Cb Response significantly reduced time to containment in the environment which enabled the isolation of incidents to single hosts... more»

What needs improvement?

The solution needs to simplify the process of adding custom watchlists, as well as embrace YARA for rule creation.

What's my experience with pricing, setup cost, and licensing??

Purchase Professional Services up front as part of the implementation package, then renew hours annually to ensure you have adequate support for... more»

What other advice do I have??

Ensure that you have sufficient resources to dedicate to maintaining and utilizing the product, including maintenance staff as well as incident... more»
Find out what your peers are saying about Carbon Black Cb Defense vs. Carbon Black Cb Response and others in Security Incident Response.
291,818 professionals have used our research since 2012.
Philip Fong
Real User
Technical Support Specialist at a financial services firm
Mar 19 2018

What is most valuable?

The ability to isolate an endpoint with only the host name and a click of a button is a major time saver. No need to go hunting for an IP or typing in terminal.

How has it helped my organization?

Cb Response is our primary incident response tool. With this product in our hands, we are able to remotely isolate exploited endpoints in seconds and perform a live deep dive of any endpoint into its running processes (as necessary) without... more»

What needs improvement?

The threat intelligence feed could use some fine tweaking. We are subscribed to FS-ISAC threat indicator, but have been unsuccessful in adding it to our alliance feeds. So, rather than Cb Response being able to pull the data from the feed, we... more»

Articles

User Assessments By Topic About Carbon Black Cb Response

Find out what your peers are saying about Carbon Black Cb Defense vs. Carbon Black Cb Response and others in Security Incident Response.
291,818 professionals have used our research since 2012.

Carbon Black Cb Response Questions

Carbon Black Cb Response Projects By Members

Carbon Black Cb Response Consultants

What is Carbon Black Cb Response?

Cb Response is an industry-leading incident response and threat hunting solution designed for security operations center (SOC) teams. Cb Response continuously records and captures unfiltered endpoint data, so that security professionals can hunt threats in real time and visualize the complete attack kill chain. It leverages the Cb Predictive Security Cloud's aggregated threat intelligence, continuously comparing intel to current and historical endpoint activity, exposing undetected threats.

Sign Up with Email