VMware Carbon Black Cloud and Datto Endpoint Detection and Response (EDR) are leading solutions in the endpoint security market. VMware Carbon Black Cloud has a perceived advantage due to its advanced threat intelligence and robust security features.
Features: VMware Carbon Black Cloud offers advanced threat hunting, real-time detection, and extensive integration capabilities. Datto EDR provides automated remediation, comprehensive backup integration, and easy-to-use configuration.
Room for Improvement: VMware Carbon Black Cloud could enhance its reporting tools, reduce resource consumption, and improve performance efficiency. Datto EDR could improve alert accuracy, offer more detailed training materials, and refine detection accuracy.
Ease of Deployment and Customer Service: VMware Carbon Black Cloud is praised for straightforward deployment and responsive support. Datto EDR enjoys positive feedback for easy rollout but mixed reviews on customer service responsiveness.
Pricing and ROI: VMware Carbon Black Cloud is seen as slightly expensive but justified by strong ROI and robust security features. Datto EDR is more cost-effective with quick setup costs leading to fast ROI through efficient threat detection and data recovery solutions. Pricing leans in favor of Datto for affordability while VMware is considered worth the higher investment for superior security capabilities.
Product | Market Share (%) |
---|---|
Datto Endpoint Detection and Response (EDR) | 1.7% |
VMware Carbon Black Cloud | 0.2% |
Other | 98.1% |
Company Size | Count |
---|---|
Small Business | 5 |
Midsize Enterprise | 4 |
Large Enterprise | 7 |
With Datto Endpoint Detection and Response (EDR) you can detect and respond to advanced threats. Datto EDR is an easy to use cloud based EDR solution that's designed for Managed Service Providers (MSPs).
Fortify Endpoint and Workload Protection
Legacy approaches fall short as cybercriminals update tactics and obscure their actions. Get advanced cybersecurity fueled by behavioral analytics to spot minor fluctuations and adapt in response.
Recognize New Threats
Analyze attackers’ behavior patterns to detect and stop never-before-seen attacks with continuous endpoint activity data monitoring. Don’t get stuck analyzing only what’s worked in the past.
Simplify Your Security Stack
Streamline the response to potential incidents with a unified endpoint agent and console. Minimize downtime responding to incidents and return critical CPU cycles back to the business.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.