CARBON BLACK INC
Online
Massachusetts, US
2002
$51MN to $100MN
43
Likes
87 Buyers are Negotiating "Group Buyer Deal" for CARBON BLACK INC
Are you from this company?

CARBON BLACK INC USP

The company is a leader in the emerging next-generation endpoint security market. The company's core capabilities include real-time visibility, threat intelligence, endpoint threat detection and response, advanced endpoint prevention, and open and extensible endpoint security. The company offers security solutions to industries such as education, finance, government, healthcare, manufacturing, oil & gas, utilities, and retail. Request CARBON BLACK INC Pricing to get more information.

Summary

Carbon Black’s core capabilities include real-time visibility, threat intelligence, endpoint threat detection and response, advanced endpoint prevention, and open and extensible endpoint security. It offers security solutions to industries such as education, finance, government, healthcare, manufacturing, oil & gas, utilities, and retail.

360 Quadrants

Strengths and Weaknesses
  • +6 Application Detection and Usage Control
  • +7 Policy Management
  • +8 Desktop/Laptop
  • +9 Mobile/Tablet
  • +10 Servers
  • +8 Delivery - Directly
  • +5 Whitelisting
  • +7 Hosted / On-Cloud
  • +6 On-Premise
  • +10 Advanced Memory Protection
  • +5 Compliance Management
  • +9 Threat Detection
  • +8 Visibility and Reporting
  • +5 Customer redressal mechanism
  • +9 Delivery - Through Partners / Third-Party Vendors
  • +8 End-users/Work stations
  • +14 Levels of support
  • +11 Product Demos
  • +8 Products/Solutions offered
  • +12 Product variants/licences
  • -14 Advanced Persistent Threat (APT) Protection
  • -11 Application Reputation Scoring
  • -11 Point of Sale (PoS) Systems
  • -13 Removable Devices
  • -12 Virtual Machines
  • -14 On-Site Support
  • -5 Remote Support
  • -6 Blacklisting
  • -13 Dedicated Account Manager (DAM)
  • -12 Proof of Concept
  • -10 Software Requirement Specification (SRS)
  • -5 Backup and Recovery
  • -7 Greylisting
  • -6 Identity Management
  • -7 Patch Management
  • -9 Security Support
  • -14 Threat Intelligence
  • -13 Application Development Team
  • -12 Information Security Specialists
  • -13 Compliance & Risk Management
Discussions
nodiscussion
There is no interaction
Invite one or more vendors for a discussion.


Top Features

  1. Product Features and Functionality / Application Control features
  2. Product Features and Functionality / Type of access points
  3. Scalability / System configuration required
  4. Scalability / End-users/Work stations
  5. Support and Services / Customer redressal mechanism
  6. Support and Services / Levels of support
  7. Breadth and Depth of Product Offering / Product variants/licences
  8. Application Control techniques / Whitelisting
  9. Services Offered / Education & Training
  10. Breadth and Depth of Product Offering / Products/Solutions offered