Carbon Black: Endpoint Security [product review]


Carbon Black Endpoint Security is an effective and user-friendly endpoint solution for user devices such as PCs and laptops. It features malware protection that keeps threats at bay while protecting your network and computer systems from hackers and viruses.

Carbon Black seeks to transform cybersecurity through the use of big data and analytics, combined with cloud technologies. They have recognized that mobile devices and cloud technologies have moved the goal posts as far as endpoint security is concerned, prompting them to develop a proactive approach to threats.

Carbon Black Endpoint Security uses online hashes to detect malware and virus incidents in your local environment, which means that most organizations that implement it are stunned to find multiple incidents of previously undetected malware. This is a great way for your team to learn how to adapt to Carbon Black Endpoint Security while also developing new incident response routines.

Carbon Black Endpoint protection offers solutions to all of your organization’s security needs and uses a series of individual services that run locally on your private network as well as remotely in the cloud.

These services include:

  • Predict and Prevent: Finds new and existing malware and protects systems
  • Capture and Analyze: Carbon Black uses predictive cloud technology and storage
  • Quick Response: Detection and response capabilities work in real time
  • Operate at Scale: Automation enables mass deployment and task completion

Key Features

The individual components that make up Carbon Black’s protection products enable it to defend against both emerging and known threats, giving endpoint users the confidence and assurance that their IT systems are protected and safe at all times. We will look at each individual component and explore what each one does.

Predict and Prevent

Carbon Black understands that today’s cybercriminals are at the forefront of innovation when it comes to developing (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Graeme Messina. Read the original post at: