We performed a comparison between Cybereason Deep Respond [EOL] and VMware Carbon Black Cloud based on real PeerSpot user reviews.
Find out what your peers are saying about VMware, ServiceNow, IBM and others in Security Incident Response."We have 20,000 endpoints in our organization. It's very critical to monitor each and every device with any of our solutions. By deploying Cybereason, it collects all the information from every computer and it will feed it to the AI engine and do a malware check. It's very clear cut and we save a lot of time. It detects the problem very quickly and we can prevent an issue before it occurs."
"The most valuable feature is its ability to seek out abnormal activity and to create alerts."
"The ability to quickly isolate a system from the network, while still being able to perform some forensics and mitigation work remotely, was of great value to us since we had many mobile and distributed systems."
"VMware Carbon Black Cloud is a user-friendly solution that can isolate machines from the rest of the network."
"It is nice when you're in a situation where you think someone's device is compromised and that there's some malware getting into your fleet."
"Carbon Black Cb Response excels at providing context to indicators when responding to incidents. It allows responders to understand the entire scope of an incident and quickly contain it to minimize impact and disruption."
"Probably the most valuable feature of CB Response is its ability to isolate a host and take it off the network, so it's not spreading anything. We have two security operations centers around the globe. When an SOC analyst sees something on an endpoint, they can use Carbon Black Response to isolate that host from the customer's environment and prevent any kind of lateral spread."
"The solution does very well as a baseline EDR and provides good process-level management."
"For setup, the server can be given to you as a VM image and with minimal configuration needed."
"It's all on the analysis part. They currently support from email only. If we have a problem with Cybereason like high memory utilization, for example, we send an email to their team and they respond when they see it, but there is no on-call support. They don't offer the ability to call them."
"They have different products, but if we wanted to take their protection and their EPR, then we would need to have two agents"
"The support team of Carbon Black CB Response needs improvement. At present, they need a lot of information. Then they give you an answer that they already gave you. You tell them it didn't work, and then they take a long time."
"The solution needs to simplify the process of adding custom watchlists, as well as embrace YARA for rule creation."
"We are subscribed to FS-ISAC threat indicator, but have been unsuccessful in adding it to our alliance feeds."
"Training and education for both partner and customer, including product marketing need to be improved."
"Additionally, it is complex to use, and the pricing should be improved."
"There have been some performance issues when deploying on Windows Server, but I believe Carbon Black is working on that."
"The solution can only handle about 500 bans or blocks."
Earn 20 points
Cybereason Deep Respond [EOL] doesn't meet the minimum requirements to be ranked in Security Incident Response while VMware Carbon Black Cloud is ranked 2nd in Security Incident Response with 18 reviews. Cybereason Deep Respond [EOL] is rated 8.0, while VMware Carbon Black Cloud is rated 8.4. The top reviewer of Cybereason Deep Respond [EOL] writes "Detects a problem very quickly and enables us to prevent an issue before it occurs". On the other hand, the top reviewer of VMware Carbon Black Cloud writes " Shows promise for endpoint detection and response, with room for improvement in complexity and pricing ". Cybereason Deep Respond [EOL] is most compared with , whereas VMware Carbon Black Cloud is most compared with VMware Carbon Black Endpoint, Fidelis Elevate, Splunk SOAR and Palo Alto Networks Cortex XSOAR.
See our list of best Security Incident Response vendors.
We monitor all Security Incident Response reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.