2019-03-11T07:21:00Z

What is your primary use case for Carbon Black Cb Response?


How do you or your organization use this solution?

Please share with us so that your peers can learn from your experiences.

Thank you!

Guest
66 Answers

author avatar
Top 10LeaderboardReal User

We use Carbon Black for detection and response. So we receive alerts from Carbon Black if it detects any malicious activity. We also use it to quarantine any devices that we may need to isolate due to the security risk that it presents.

2020-02-13T07:50:54Z
author avatar
Reseller

Our primary use case is to detect any abnormal activity happening on the endpoint. Carbon Black Response works like CCTV which monitors every activity and every single process running on the operating system. We use it on Windows, Linux, and Mac. Once there is an abnormal action, there is a notification that is sent to the administrator. The administrator will open up the GUI, the console for the Carbon Black Response, and start doing his investigation to get to the root cause for the issue if there is one.

2019-08-07T06:15:00Z
author avatar
Top 5LeaderboardReal User

Our primary usage for this solution is as an endpoint response. We use Carbon Black as a threat line of defense for the endpoints.

2019-07-02T11:47:00Z
author avatar
Real User

We use it for platform metrics, for all use cases. This is the only thing that works, this product. Carbon black is a process listener. You can call back all processes, each process on the client side or the server side. You can retrieve all the information on a process level, and you can combine all the things with an end use case.

2019-07-01T07:59:00Z
author avatar
Top 5LeaderboardReal User

I did some tests when they came out with the solution because my manager wants an assessment with Carbon Black. I tested the solution for two weeks. It was good.

2019-07-01T07:59:00Z
author avatar
Real User

When a machine gets infected we need to have a memory dump and to interact with it. We use this solution as a good way to extract that information from an infected machine.

2019-03-11T07:21:00Z
Find out what your peers are saying about Carbon Black, Dell EMC, Palo Alto Networks and others in Security Incident Response. Updated: October 2020.
443,152 professionals have used our research since 2012.