Try our new research platform with insights from 80,000+ expert users

Mimecast Insider Risk Management and Data Protection vs VMware Carbon Black Endpoint comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Sep 9, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cloudflare One
Sponsored
Average Rating
8.8
Reviews Sentiment
6.7
Number of Reviews
22
Ranking in other categories
Email Security (20th), Secure Web Gateways (SWG) (15th), Data Loss Prevention (DLP) (21st), Cloud Access Security Brokers (CASB) (11th), Distributed Denial-of-Service (DDoS) Protection (7th), Software Defined WAN (SD-WAN) Solutions (13th), Access Management (12th), Bot Management (3rd), ZTNA as a Service (8th), ZTNA (3rd), Secure Access Service Edge (SASE) (10th), Remote Browser Isolation (RBI) (3rd)
Mimecast Insider Risk Manag...
Average Rating
9.0
Reviews Sentiment
7.4
Number of Reviews
78
Ranking in other categories
Data Loss Prevention (DLP) (17th)
VMware Carbon Black Endpoint
Average Rating
7.8
Reviews Sentiment
6.7
Number of Reviews
64
Ranking in other categories
Endpoint Protection Platform (EPP) (35th), Security Incident Response (6th), Endpoint Detection and Response (EDR) (36th), Ransomware Protection (8th)
 

Mindshare comparison

Data Loss Prevention (DLP) Mindshare Distribution
ProductMindshare (%)
Mimecast Insider Risk Management and Data Protection2.8%
Microsoft Purview Data Loss Prevention8.0%
Varonis Platform5.8%
Other83.4%
Data Loss Prevention (DLP)
Endpoint Protection Platform (EPP) Mindshare Distribution
ProductMindshare (%)
VMware Carbon Black Endpoint1.8%
Microsoft Defender for Endpoint7.8%
CrowdStrike Falcon6.6%
Other83.8%
Endpoint Protection Platform (EPP)
 

Featured Reviews

CV
Network Architect at IP Dimension
Cloud security has improved remote access and has reduced costs for smaller client sites
I have used Cloudflare One's Identity-Aware Proxy, and it is quite straightforward from what I have seen so far. The app registration on the Azure side integrates fully into Cloudflare, and I am very satisfied with that part because it is easy to set up. The integration of Cloudflare One's Secure Web Gateway and Zero Trust Network Access works without any issues. That part is pretty automatic, and if you complete the rest of the setup, it comes together by itself with no issues from my side. What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection. The hops get shorter and you get better latency. We have done testing to see if it is better. One thing that we did notice with our proof of concept with our current client is that they have people connecting from the UK. When they used their previous VPN solution, uploading CAD drawings and other files to the server took a long time. They mentioned that it is much quicker on Cloudflare One's solution. I definitely believe that is part of the improved performance, and I am satisfied with that as well. What is nice about Cloudflare One is that it makes the setup easier and also easier to train technicians to maintain it. Compared to legacy systems, we do not need to get fancy firewalls in place that are costly. That is definitely also a cost-saver with Cloudflare One.
Chuck_Mackey - PeerSpot reviewer
Director, Cybersecurity Consulting at a tech services company with 51-200 employees
Provides comprehensive visibility and protection, helps in identifying the gaps in security, and comes with excellent onboarding support
In a couple of instances, we had a little bit of trouble in getting it distributed throughout the organization. We ultimately managed to do it, but they talk about it being a pretty simple process, and it became a little laborious. It would just turn away. The agents were not being distributed. It was just churning and churning and churning. When we were looking for specific categories of data, it was getting bogged down, but that was not even so much Code42, although some of it was their issue. It really has to do with the overall infrastructure and what the organization is prepared to do. If the infrastructure or the networking is a little hinky or you don't have a really finely tuned network infrastructure environment and your patches aren't up to date on your servers and your endpoints, it could get a little sticky. Other than that, it was okay. We really didn't have much problem beyond that. It took a couple of days to sort that out, but it was no big deal.
reviewer2689206 - PeerSpot reviewer
Senior VP, Technology & Leading Technology Office at a outsourcing company with 1,001-5,000 employees
Behavior analytics has strengthened threat prediction yet still needs to improve overall standing
Regarding the real-time monitoring feature with VMware Carbon Black Endpoint, it is helpful in addressing unseen threats. I find the behavior analysis feature beneficial. I assess VMware Carbon Black Endpoint's machine learning capabilities in detecting unknown threats as fantastic. The behavior and analytics feature employs machine learning, and these are features which make the product and give that distinguishing, differentiating factor. The intelligent threat hunting capabilities have impacted my customers' cybersecurity efforts by giving them the edge to be prepared well in advance. Whenever this feature provides prediction, you know what action to take. You are aware of a possible attack and what kind of attack it may be, so you are much better prepared.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It's the endpoint exposition. We don't need to expose our VPN server to the internet and need a zero-test solution. I can apply some conditional access to the endpoint that's connecting to our network to check their security policies or the security condition of their workstation. Once the workstation is trying to connect to my internal network, then I would like to check the discrete condition of these endpoints that are trying to access my internal network. We created some conditional access. We have CrowdStrike, to check if the CrowdStrike is installed, to check if it's updated, and to check for Windows updates. We created some conditional policies to check it."
"It is a stable solution."
"Using Cloudflare One makes my work quite easy because for DDoS protection, all I need to do is understand the OSI model and click; it makes it easier than trying to write a command line or use a Linux command."
"The solution has different options that can be used to differentiate DDoS attacks."
"What makes it nice is that we can actually start replacing on-site firewalls at this stage for the smaller clients because it does not matter if they go to a coffee shop or work from home; they are still secured by the same connection."
"Cloudflare DDoS mitigates DDoS attacks."
"The capabilities of the software are strong enough for me to do what it's supposed to do. For me, we don't need to do a lot of configuration on our site. We just enable it and monitor it."
"It will take the blow rather than our applications should an attack occur."
"Security tools: Being able to monitor data going in and coming off our endpoints. Seeing what it is and where it's going is awesome."
"It required very little ongoing maintenance once setup."
"Low system overhead, setting retention policies, ease of use"
"The solution is very stable. Very rarely do we have any issues with it. We don't have to deal with bugs or glitches. It doesn't crash or freeze. We find it to be reliable."
"It has quite a bit of flexibility in configuring backup sets."
"t has a very user friendly status bar with common errors and has logs built in to the console so we can review the issues or status of CrashPlan."
"There are a couple of things. One of them is that they have what they call Incydr. Their detection and response solution to the insider threat area is called Incydr. That gives visibility to the clients that have widely dispersed employee bases due to work from home, or that had a dispersed workforce predating any of the work from home requirements. Even though they might not be inside the organization physically, they're inside the organization. It allows us to get some visibility into what people are doing, what the context is, and how to control what might be the potential for intellectual property theft or file exposure."
"Code42 Next-Gen DLP is scalable."
"The solution has a library where we can have multiple threat intels onboarded. We just have to subscribe to a particular site intel and they'll provide us with all of the truncated details so that we can create IOCs and alerts on the basis of those IOCs."
"I like its reporting."
"It has intelligent learning behind it and we have been very successful in preventing attacks."
"The most valuable feature of the solution stems from the support it provides."
"The initial setup is pretty straightforward."
"The threat analysis functionality is good."
"It uses machine learning and behavioral analytics for advanced threat detection and response."
"There's lots of very useful documentation online to help troubleshoot and learn about the product."
 

Cons

"The software has automated alerts, but the automated alerts are not available in the mobile app."
"Operating and tuning the product is difficult."
"The initial onboarding was causing us some confusion."
"The free plan has limitations. For example, I can only set up three rules, and the application firewall is unavailable."
"Our subscription plan for the solution has a limitation of bot signatures."
"There are premium tier live service and lower tier live service, so we opted for the lower tier. But there is no medium tier where we pay a little extra and get a bit more service. So if that can be improved."
"Feedback could be enhanced."
"Feedback could be enhanced. While I work efficiently with Clover as a partner in Mexico City, sometimes the information and requests are easier to manage with more concrete solutions."
"Reporting could use an overhaul. It is very limited."
"There doesn't seem to be any feature that is lacking."
"In a couple of instances, we had a little bit of trouble in getting it distributed throughout the organization. We ultimately managed to do it, but they talk about it being a pretty simple process, and it became a little laborious. It would just turn away. The agents were not being distributed. It was just churning and churning and churning. When we were looking for specific categories of data, it was getting bogged down, but that was not even so much Code42, although some of it was their issue."
"What I think could be improved is how I get support."
"Java, please get rid of Java."
"I would like to see more flexibility on privileges, perhaps create another kind of admin for regions. Also, I would like the ability to access logs without having to be on the actual device or a super-admin."
"More security would be nice, I would love to be able to remotely brick a stolen laptop and it's hard disk drive (HDD)."
"The application, written in Java, required far more system resources on a Client than other solutions."
"Based on all the security roles and the release privilege, it could take time for an application to be whitelisted and approved for use."
"The solution needs better overall compatibility with other products."
"The directions for Splunk are spot on, but it is difficult to find anything on integration with AlienVault,"
"The product cannot perform an on-demand scan. They could add this particular feature."
"The feature set for the firewall needs improvement."
"When you view the triage, it will show you everything within a given time frame, and not only the attack that caused the alert, which is what I want to see. It shows you all the events during that time, and that can be quite confusing."
"The initial setup is complex."
"Carbon Black has limited capability to integrate with Rapid7."
 

Pricing and Cost Advice

"The solution is not that expensive."
"The pricing is somewhere in the middle. I would rate the pricing a seven out of ten."
"The pricing of the solution is cheap. The licensing cost is also very low. I rate the cost and pricing a three out of ten."
"Cloudflare Zero Trust Platform's pricing is good."
"My company has to make yearly payments towards the licensing costs attached to the solution. There are no hidden charges apart from the licensing costs of the solution."
"The price tag is no longer $200,000, but rather $300,000 to $400,000. It's twice."
"The solution's pricing lacks transparency."
"The prices are slightly expensive."
"The pricing is reasonable. It's my understanding that the cost is about $7 for unlimited storage in the cloud per server."
"It was expensive. It was more expensive than Eureka, and it was more expensive than Barracuda Backup, but what we got was a full team. They didn't come in and nickel and dime us. They provided the assistance we needed. They didn't say that they need to charge us for something or it is going to take another statement of work. It was all bundled into it... We pay for the software maintenance. It is probably 18% or 20% of the license fee for rev releases."
"They were the best solution and surprisingly enough, the cheapest."
"It used to be a good solution for SOHO in particular as it had unlimited storage for a reasonable price. However, their pricing model has changed and they are now primarily targeting enterprise users."
"It is 100% worth the cost to get and keep the support, especially when setting it up."
"The product is expensive. There are some additional costs apart from the standard licensing charges attached to the solution."
"VMware Carbon Black Endpoint is an expensive product."
"​The cost/benefit factor has great relevance in Cb Defense implementations​."
"The pricing is annually based and operates through another department than mine."
"Price-wise, VMware Carbon Black Endpoint is a highly-priced solution. Regarding the licensing cost of the solution, one needs to opt for an annual subscription."
"It is more expensive, but it's worth it. There are no additional costs beyond the standard licensing fee."
"This is a really expensive product and we pay licensing fees on a yearly basis."
"Overall, it was cost-effective too."
report
Use our free recommendation engine to learn which Data Loss Prevention (DLP) solutions are best for your needs.
884,328 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Comms Service Provider
10%
Computer Software Company
10%
Financial Services Firm
9%
Manufacturing Company
8%
Manufacturing Company
12%
Performing Arts
6%
Computer Software Company
6%
Outsourcing Company
6%
Financial Services Firm
10%
Government
9%
Manufacturing Company
9%
Computer Software Company
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business10
Midsize Enterprise2
Large Enterprise10
By reviewers
Company SizeCount
Small Business24
Midsize Enterprise24
Large Enterprise30
By reviewers
Company SizeCount
Small Business31
Midsize Enterprise9
Large Enterprise31
 

Questions from the Community

What needs improvement with Cloudflare Access?
Cloudflare Access has strong integration with Microsoft, among other platforms. However, when it comes to Kaspersky, ...
What is your primary use case for Cloudflare Access?
Cloudflare Access provides secure access to internal applications for employees, external members of the organization...
What advice do you have for others considering Cloudflare Access?
Cloudflare Access is one of the best integrations available. While about two hundred vendors offer similar services, ...
What is your primary use case for Code42 Incydr?
Data Leakage Protection on large scale environments. This can be to protect against leakage on endpoints and servers ...
What to choose: an endpoint antivirus, an EDR solution or both?
I can recommend Carbon Black, an award-winning next-gen anti-virus (NGAV) and endpoint detection and response (EDR) s...
What's the difference between Carbon Black CB Response and Carbon Black CB Defense?
Carbon Black offers two different levels of Endpoint Detection and Response. One is the VM Carbon Black Cloud Endpoin...
What do you like most about Carbon Black CB Defense?
VMware Carbon Black Endpoint is a highly stable solution.
 

Also Known As

Cloudflare Area 1 Email Security, Cloudflare Bot Management, Cloudflare Gateway, Cloudflare Zero Trust Platform, Cloudflare DDoS, Cloudflare SASE & SSE Platform
Mimecast Incydr, Code42 Next-Gen DLP, Code42 Next-Gen Data Loss Protection, Code42 Forensic File Search, Code42 Backup + Restore
Carbon Black CB Defense, Bit9, Confer
 

Overview

 

Sample Customers

23andMe
Adobe, Okta, Samsung, Taylormade, Boston University, Lending Club, North Highland, Stanford University, Ping Identity, Qualcomm, Pandora.
Netflix, Progress Residential, Indeed, Hologic, Gentle Giant, Samsung Research America
Find out what your peers are saying about Mimecast Insider Risk Management and Data Protection vs. VMware Carbon Black Endpoint and other solutions. Updated: April 2025.
884,328 professionals have used our research since 2012.