Carbon Black Cb Response vs. Cybereason Deep Respond

As of February 2019, Carbon Black Cb Response is ranked 2nd in Security Incident Response with 3 reviews vs Cybereason Deep Respond which is ranked 19th in Security Incident Response with 1 review. The top reviewer of Carbon Black Cb Response writes "Enhanced logging allowed us to quickly identify/resolve security issues". The top reviewer of Cybereason Deep Respond writes "Detects a problem very quickly and enables us to prevent an issue before it occurs". Carbon Black Cb Response is most compared with Carbon Black Cb Defense, Fidelis Elevate and SECDO Platform . Cybereason Deep Respond is most compared with Carbon Black Cb Response and SECDO Platform .
Cancel
You must select at least 2 products to compare!
Most Helpful Review

Have A Question About Security Incident Response?

Our experts can help. 316,268 professionals have used our research on 7,017 solutions.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
Carbon Black Cb Response excels at providing context to indicators when responding to incidents. It allows responders to understand the entire scope of an incident and quickly contain it to minimize impact and disruption.The enhanced logging and data analysis of the incident response and investigation components allowed us to quickly identify and resolve security issues before they could spread.The ability to quickly isolate a system from the network, while still being able to perform some forensics and mitigation work remotely, was of great value to us since we had many mobile and distributed systems.We also took full advantage of its incident response reporting capabilities to act as a “black box” for our infrastructure around strings of suspicious activity. The reporting and incident response capabilities were incredibly helpful during active security concerns.For setup, the server can be given to you as a VM image and with minimal configuration needed.We are able to remotely isolate exploited endpoints in seconds and perform a live deep dive of any endpoint into its running processes (as necessary) without the need for extra scripts.​​The ability to isolate an endpoint with only the host name and a click of a button is a major time saver.

Read more »

We have 20,000 endpoints in our organization. It's very critical to monitor each and every device with any of our solutions. By deploying Cybereason, it collects all the information from every computer and it will feed it to the AI engine and do a malware check. It's very clear cut and we save a lot of time. It detects the problem very quickly and we can prevent an issue before it occurs.

Read more »

Cons
The solution needs to simplify the process of adding custom watchlists, as well as embrace YARA for rule creation.Setup is incredibly complex and poorly documented. Every time an upgrade was needed we would need to engage Professional Services for troubleshooting help. Certificates and web services proved to be the most significant sticking points. Since the product runs on a Linux platform, perhaps having staff with more Linux experience could have alleviated some difficulty.The biggest issue I encountered was one where old logs were not being overwritten as expected so the system drive kept filling up from time to time. However, support was usually quite responsive and happy to jump on a remote session to take a look at it for us. That log bug has probably been resolved with an update by now.The threat intelligence feed could use some fine tweaking.We are subscribed to FS-ISAC threat indicator, but have been unsuccessful in adding it to our alliance feeds.

Read more »

It's all on the analysis part. They currently support from email only. If we have a problem with Cybereason like high memory utilization, for example, we send an email to their team and they respond when they see it, but there is no on-call support. They don't offer the ability to call them.

Read more »

Pricing and Cost Advice
Purchase Professional Services up front as part of the implementation package, then renew hours annually to ensure you have adequate support for upgrades and enhancements. Overbuy by at least 10% to account for infrastructure growth.We had no issues purchasing through our preferred reseller and were able to get a fair price even when not purchasing direct. Carbon Black Enterprise Response didn’t break the bank, though adding on the matching antivirus and anti-malware components of the Protect product was more than we could afford, even with some discounting. Cb Response is really designed to complement Carbon Black’s Defense product. While Response can be used on its own, coupling with Defense seems like the best strategy if you can afford the price tag.

Read more »

Information Not Available
report
Use our free recommendation engine to learn which Security Incident Response solutions are best for your needs.
316,268 professionals have used our research since 2012.
Ranking
Views
1,238
Comparisons
915
Reviews
3
Followers
43
Avg. Rating
8.7
Views
114
Comparisons
80
Reviews
0
Followers
36
Avg. Rating
N/A
Top Comparisons
Learn
Carbon Black
Cybereason
Overview
Cb Response is an industry-leading incident response and threat hunting solution designed for security operations center (SOC) teams. Cb Response continuously records and captures unfiltered endpoint data, so that security professionals can hunt threats in real time and visualize the complete attack kill chain. It leverages the Cb Predictive Security Cloud's aggregated threat intelligence, continuously comparing intel to current and historical endpoint activity, exposing undetected threats.
Information Not Available
Offer
Learn more about Carbon Black Cb Response
Learn more about Cybereason Deep Respond

Have A Question About Security Incident Response?

Our experts can help. 316,268 professionals have used our research on 7,017 solutions.
We monitor all Security Incident Response reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email