SC Media Awards Cb Defense, Cb ThreatSight 5 Out of 5 Stars

save
Share and earn Cybytes
Facebook Twitter Google+ LinkedIn Email

“During testing, Cb Defense performed as a top-quality endpoint security program…Great intuitive cloud platform with an armament of modern security technologies with a quick implementation into your business environment.” – SC Media  

“Carbon Black also offers Cb ThreatSight as an add-on, which is incredibly useful. Cb ThreatSight is a managed threat hunting and triage service. This tool provides visual monitoring of your environment and enables you to see the entire kill chain of an attack. This makes it extremely easy to understand what happened at the endpoint, and quickly take the right action. This is a feature we feel should be a standard in the modern endpoint security landscape.” – SC Media

We are very excited to again be awarded 5-Stars by SC Media, this time for both Cb Defense and Cb ThreatSight. Our solutions received 5 stars – the highest possible rating –  in all categories, including: Features, Documentation, Value for Money, Performance, Support and Ease of Use.

Of Cb Defense, SC Media says: 

“Cb Defense’s web management console is clean and organized. The navigation pane is on the left of the page, which is where most of the main sections are located. The default landing page is the dashboard which provides an overview of your endpoints. You can also drag and drop them in any order that you’d like so you can organize the information that is most important to you.

Cb Defense’s simplistic architecture allows for a quick and hassle-free setup. A lightweight sensor is required to be installed on the endpoint; whether you have under 100 or closer to 1,000 there are two ways to deploy. An attended installation is used for a small number of sensors to deploy where the sensor can be installed directly onto the endpoint. A larger enterprise environment can push the sensors through the unattended installation.

During testing, Cb Defense performed as a top-quality endpoint security program. The alerts section shows threats and suspicious events currently being monitored. You can select the threat and whitelist, blacklist, or delete the application. The investigation button takes you to the event timeline indicating each timestamped event and the application with which it was flagged. Selecting the alert triage button takes you to a visual representation of the attack and each process it touched; this is known as the kill chain. The kill chain approach is the best method to understand the flow of an attack and isolate the threatening process and taking the correct action against it.”

Cb ThreatSight

Cb ThreatSight leverages Carbon Black’s Predictive Security Cloud (PSC) to provide customers with a managed threat hunting service, which simplifies alert management to prioritize and streamline the validation of important alerts. The service is staffed by top threat experts who keep constant watch over an organization’s environment, alert teams to emerging threats, and provide access to critical security services when they are needed most.

With Cb ThreatSight, organizations can better understand context surrounding alerts, ensure the most important alerts are adequately addressed, and earn peace of mind, knowing they are protected by some of the world’s best threat hunters.

Cb ThreatSight provides customers with:

24×7 Expert Threat Validation from Threat Hunters: Enterprises face a shortage of skilled security professionals, and security teams often spend too much time monitoring and validating alerts, limiting the time available to perform true security analysis. Cb ThreatSight experts analyze, validate, and prioritize alerts from Cb Defense, helping assure customers see the threats that matter.

An Early Warning System for Emerging Threats: When prevalent and newsworthy attacks occur, security team investigations are often limited by the scope of resources and data available in their own environment. Cb ThreatSight proactively identifies trends by monitoring threat activity across millions of endpoints, advising customers on widespread attacks, and retroactively detecting and confirming emerging threats based on iterative discovery techniques.

Roadmap to Root Cause During Investigations: During active investigations, it’s difficult to craft an effective remediation plan before determining the full scope of the attack. Cb ThreatSight provides additional context to Cb Defense alerts, such as connecting alerts caused by the same root cause, to help customers streamline investigations and resolve security issues.

The post SC Media Awards Cb Defense, Cb ThreatSight 5 Out of 5 Stars appeared first on Carbon Black.

Share this post and earn Cybytes
Facebook Twitter Google+ LinkedIn Email
Follow
69 Followers
About Carbon Black, Inc.
Carbon Black is the leading provider of next-generation endpoint security. Carbon Black’s Next-Generation Antivirus (NGAV) solution, Cb Defense, leverages breakthrough prevention technology, “Streaming Prevention,” to instantly see and stop cyberattacks before they execute. Cb Defense uniquely combines breakthrough prevention with market-leading detection and response into a single, lightweight agent delivered through the cloud. With more than 7 million endpoints under management, Carbon Black has more than 2,500 customers, including 30 of the Fortune 100. These customers use Carbon Black to replace legacy antivirus, lock down critical systems, hunt threats, and protect their endpoints from the most advanced cyberattacks, including non-malware attacks.
Promoted Content
7 Experts on Moving to a Cloud-Based Endpoint Security Platform
Everyday companies put more of their assets in digital form. Healthcare records, retail purchases and personnel files are just some of the many examples of how our entire lives have moved online. While this makes our interconnected lives more convenient, it also makes them more vulnerable to attack. The monetary benefits of exploiting these vulnerabilities have created an extremely profitable underground economy; one that mimics the same one we all participate in and has led to an increase in the sophistication and frequency of attacks. At the same time, mobility and cloud are changing the security landscape. We’ve moved from a centralized to a decentralized model as end users increasingly work on-the-go and access critical business applications and resources from anywhere. As such there is more emphasis on the endpoint and individual identities - from both the defender and the attacker - than ever before. As endpoints become smarter, new challenges emerge: emerging ransomware and 0-day exploits infect all kinds of systems with ease, while many attackers use no malware at all to accomplish their malicious goals. With all this change, we spoke to 7 leading security experts to identify what’s working and how they’ve influenced their organization to make the necessary changes before becoming the next victim.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel