We performed a comparison between Elastic Security and VMware Carbon Black Endpoint based on real PeerSpot user reviews.
Find out in this report how the two Endpoint Detection and Response (EDR) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Ability to get forensics details and also memory exfiltration."
"Fortinet FortiEDR's firewalling, rule creation, monitoring, and inspection profiles are great."
"The stability is very good."
"It is a scalable solution...The initial setup of Fortinet FortiEDR was straightforward."
"NGAV and EDR features are outstanding."
"The ease of deployment and configuration is valuable. It's very easy compared to other vendors like Sophos. Sophos' configuration is complex. Fortinet is a lot easier to understand. You don't need a lot of admin knowledge to do the configuration."
"This is stable and scalable."
"The price is low and quite competitive with others."
"We've found the initial setup to be quite straightforward."
"The most valuable feature for me is Discover."
"ELK documentation is very good, so never needed to contact technical support."
"The most valuable features of Elastic Security are it is open-source and provides a high level of security."
"It is scalable."
"The cost is reasonable. It's not overly pricey."
"The performance is good and it is faster than IBM QRadar."
"The stability of the solution is good."
"I feel that the initial setup was straightforward and not complex."
"Behavioral Monitoring stops known malicious events before they even begin."
"The visibility provided has been great."
"The whole purpose of the product, like application control, is very good, and also if you need to update some policies, it works well and instantly."
"The product allows us to focus on endpoint and antivirus protection."
"You can deploy it through the cloud so that even if your stuff is outside of your controlled environment, you are still under control, based on the policies you create. The policies are controlled through the cloud. For example, if I don't allow anyone to do a certain activity or to install a particular app, and a consultant or a partner who is not part of our environment is doing so, it will stop them as well."
"Technical support is excellent."
"The threat analysis functionality is good."
"They can include the automation for the realtime updates. We have a network infrastructure with remote sites. Whenever they send updates, they are not automated. We have to go into the console and push those updates. I wish it was more automated. The update file is currently around 31 MB. It could be smaller."
"ZTNA can improve latency."
"The security should be strong for the cloud. Some applications are on-prem and some are on the cloud. Fortinet should also have strong security for the cloud. There should be more security for the cloud."
"Cannot be used on mobile devices with a secure connection."
"The solution should address emerging threats like SQL injection."
"There's room for improvement in the quick response time and technical support for integration issues, especially when dealing with multiple vendors."
"We find the solution to be a bit expensive."
"Once, we had an event that was locked and blocked, but information about it came to us two or three days later."
"The solution's query building is not that intuitive compared to other solutions."
"It is difficult to anticipate and understand the space utilization, so more clarity there would be great."
"The solution needs to be more reactive to investigations. We need to be able to detect and prevent any attacks before it can damage our infrastructure. Currently, this solution doesn't offer that."
"The process of designing dashboards is a little cumbersome in Kibana. Unless you are an expert, you will not be able to use it. The process should be pretty straightforward. The authentication feature is what we are looking for. We would love to have a central authentication system in the open-source edition without the need for a license or an enterprise license. If they can give at least a simple authentication system within a company. In a large organization, authentication is very essential for security because logs can contain a lot of confidential data. Therefore, an authentication feature for who accesses it should be there."
"One limitation of Elastic Security is that it does not have built-in workflows for all tasks. For example, if you need a workflow for compliance, you will need to create a custom workflow."
"Technical support could respond faster."
"There isn't really a very good user experience. You need a lot of training."
"Authentication is not a default in Kibana. We need to have another tool to have authentication and authorization. These two should be part of Kibana."
"There's some disparity between the on-premise and the cloud type of application."
"They will most likely need to create or include a feature that checks the network."
"This solution could have greater granular control on how certain applications work."
"Carbon Black has limited capability to integrate with Rapid7."
"Right now, Carbon Black CB Defense doesn't support cloud computing and Kubernetes."
"The node management could be much better. The one thing that they cannot do very easily is change the tenant from a backend."
"The UI interface needs improvement. The management needs further work in future versions."
"Occasionally, we'll have issues with the latest version and they'll basically tell us that they will improve it in the next iteration. They need to work on their version release quality."
Elastic Security is ranked 16th in Endpoint Detection and Response (EDR) with 58 reviews while VMware Carbon Black Endpoint is ranked 12th in Endpoint Detection and Response (EDR) with 61 reviews. Elastic Security is rated 7.6, while VMware Carbon Black Endpoint is rated 8.0. The top reviewer of Elastic Security writes "A stable and scalable tool that provides visibility along with the consolidation of logs to its users". On the other hand, the top reviewer of VMware Carbon Black Endpoint writes "Centralization via the cloud allows us to protect and control people working from home". Elastic Security is most compared with Wazuh, Splunk Enterprise Security, Microsoft Sentinel, IBM Security QRadar and Microsoft Defender for Endpoint, whereas VMware Carbon Black Endpoint is most compared with CrowdStrike Falcon, Microsoft Defender for Endpoint, Trend Micro Deep Security and SentinelOne Singularity Complete. See our Elastic Security vs. VMware Carbon Black Endpoint report.
See our list of best Endpoint Detection and Response (EDR) vendors.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.