2019-07-01T07:59:00Z

What is your primary use case for Carbon Black CB Response?

Julia Miller - PeerSpot reviewer
  • 0
  • 0
PeerSpot user
11

11 Answers

PB
Reseller
Top 20
2023-11-28T07:53:00Z
Nov 28, 2023

We use VMware Carbon Black Cloud for endpoint detection and response.

Search for a product comparison
RB
Real User
Top 20
2023-11-15T12:02:54Z
Nov 15, 2023

I use VMware Carbon Black Cloud for endpoint protection, serving as a defense against malware and viruses on client devices.

Tom Kar - PeerSpot reviewer
Real User
Top 5
2023-09-05T12:12:00Z
Sep 5, 2023

I use the solution for any endpoint in a system, such as a host. The EDR can detect any malicious activity, such as malware, anomalous behavior, or any other possibility of a threat.

GS
Real User
Top 5Leaderboard
2023-06-08T18:16:00Z
Jun 8, 2023

Firstly, we use it as part of our Zero Trust networking solution as it acts as a mitigating response for any vulnerabilities with applications or the operating system. Secondly, we use it to track device compliance to check whether things are updated because it collects so much information about devices. Most importantly, we use it for peace of mind knowing that we have a flexible and robust solution for endpoint security.

Matthew Weisler - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-02-16T17:40:00Z
Feb 16, 2023

I use the solution to do back-end architecture and management for a response.

RS
MSP
2021-10-12T19:47:00Z
Oct 12, 2021

My clients are in a range of verticals, so we have clients in healthcare, education, manufacturing, etc. We provide solutions to anybody who's insightful enough and forethinking enough to understand that cybersecurity is not like insurance. So my use cases are all across the board. But, essentially, my customer base boils down to anyone who doesn't want to get owned by a ransomware attack. My company chooses the best-in-breed technology for tools, then adds cybersecurity management services on top of that.

Learn what your peers think about VMware Carbon Black Cloud. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.
MA
Real User
2020-02-13T07:50:54Z
Feb 13, 2020

We use Carbon Black for detection and response. So we receive alerts from Carbon Black if it detects any malicious activity. We also use it to quarantine any devices that we may need to isolate due to the security risk that it presents.

MA
Reseller
2019-08-07T06:15:00Z
Aug 7, 2019

Our primary use case is to detect any abnormal activity happening on the endpoint. Carbon Black Response works like CCTV which monitors every activity and every single process running on the operating system. We use it on Windows, Linux, and Mac. Once there is an abnormal action, there is a notification that is sent to the administrator. The administrator will open up the GUI, the console for the Carbon Black Response, and start doing his investigation to get to the root cause for the issue if there is one.

IT
Real User
2019-07-02T11:47:00Z
Jul 2, 2019

Our primary usage for this solution is as an endpoint response. We use Carbon Black as a threat line of defense for the endpoints.

MY
Real User
2019-07-01T07:59:00Z
Jul 1, 2019

We use it for platform metrics, for all use cases. This is the only thing that works, this product. Carbon black is a process listener. You can call back all processes, each process on the client side or the server side. You can retrieve all the information on a process level, and you can combine all the things with an end use case.

it_user1009236 - PeerSpot reviewer
Real User
2019-07-01T07:59:00Z
Jul 1, 2019

I did some tests when they came out with the solution because my manager wants an assessment with Carbon Black. I tested the solution for two weeks. It was good.

Fortify Endpoint and Workload Protection Legacy approaches fall short as cybercriminals update tactics and obscure their actions. Get advanced cybersecurity fueled by behavioral analytics to spot minor fluctuations and adapt in response. Recognize New Threats Analyze attackers’ behavior patterns to detect and stop never-before-seen attacks with continuous endpoint activity data monitoring. Don’t get stuck analyzing only what’s worked in the past. Simplify Your Security Stack Streamline the...
Download VMware Carbon Black Cloud ReportRead more