Carbon Black Endpoint
Carbon Black Endpoint
3 reviews
WH Score
8.5

Top Carbon Black Endpoint Features

What are the Best Carbon Black Endpoint Features?

Carbon Black Endpoint offers a comprehensive set of features to ensure the security and protection of endpoints. Some of its most popular features include:

  • Threat Analytics: Carbon Black Endpoint provides advanced threat analytics capabilities to detect and analyze potential security threats and anomalies.
  • Device Control: It allows administrators to control and manage the devices connected to the network, ensuring only authorized devices can access sensitive data.
  • Endpoint Detection and Response (EDR): This feature enables quick detection and response to potential security incidents, providing real-time visibility into endpoint activities.
  • Attack Surface Monitoring: Carbon Black Endpoint continuously monitors and assesses the attack surface of endpoints, identifying potential vulnerabilities and providing recommendations for remediation.
  • Application Control: It allows administrators to control and manage the applications running on endpoints, ensuring only trusted and authorized applications can execute.

These features, along with others offered by Carbon Black Endpoint, provide organizations with a robust and comprehensive security solution to protect their endpoints from a wide range of cyber threats.


Cybersecurity Features

  • Network Security
  • Data Security
  • Cloud Security
  • Web Security
  • Email Security
  • Gateway Security
  • Server Security
  • Workload Security
  • Runtime Security
  • API Security
  • Endpoint Detection and Response (EDR)
  • Firewall
  • Encryption
  • Filtering
  • Attack Surface Monitoring
  • Threat Hunting
  • Threat Intelligence
  • Threat Library
  • Incident Triage
  • Incident Response & Remediation
  • Cloud Access Security Broker (CASB)
  • Security Operations Center (SOC)

Device Management

  • Device Discovery
  • Device Control
  • Device Isolation
  • Bring Your Own Device (BYOD)
  • Device Lifecycle Management

Network Management

  • Network Discovery
  • Network Control
  • Network Isolation

Application Management

  • Application Discovery
  • Application Control
  • Application Isolation
  • Application Lifecycle Management

Identity and Access Management (IAM)

  • Role Based Access Control (RBAC)
  • Multi-Factor Authentication (MFA)
  • Contextual Authentication

Password Management

  • Password Strength Check

Reporting & Analytics

  • Network Performance Monitoring (NPM)
  • Audit Trail
  • Dashboard
  • Compliance Reports
  • Threat Analytics
  • Device Analytics
  • Policy Assessments
  • Usage Analytics
  • Threat Modeling

Cybersecurity Protection Types

  • Antivirus
  • Anti-Malware
  • Anti-Ransomware
  • Anti-Spyware
  • Anti-Phishing
  • Anti-Spam
  • DDoS Protection
  • Exfiltration Prevention
  • Bot Mitigation
  • Zero Day Mitigation

Systems/Administrative

  • Policy Management
  • Centralized Console
  • Sandbox

Sync/Refresh

  • Device Sync

Workflow Automation

  • Application Automation

Integration Options

  • APIs

After-Sales Service

  • Phone Support
  • Email Support
  • Product Guide/Manual

Disaster Recovery

  • Data Backup & Recovery
  • Data Snapshots
  • Geo Redundancy

Content Management

  • Digital Rights Management

Data Management

  • Data Retention

Reminders/Alerts

  • Security Alerts
  • Threat Alerts

Carbon Black Endpoint Top Features Related Review


B
Berenice
Reviewed on 3 November 2023

Outstanding Endpoint Security Solution

This endpoint security solution is excellent, especially when it comes to its data analytics-powered comprehensive security feed and root cause analysis function. Its cloud-based architecture, however, might not be appropriate for enclosed spaces.

Pros
  • Root cause analysis feature is helpful.
Cons
  • Not ideal to monitor air tight environment.

Have you used Carbon Black Endpoint in the past?

Help other people find the right software by sharing your Carbon Black Endpoint experience.

Need help finding the right software?

Tell us what you're looking for and we'll offer you personalized software recommendations.

The right software for your business

Get your personalized recommendations now.