Exabeam and VMware Carbon Black Cloud are key players in the cybersecurity space. Exabeam has the upper hand with its behavior analytics and integration capabilities, offering a streamlined threat detection process.
Features: Exabeam's behavior analytics, timeline-based analysis, and robust integration capabilities make threat detection and response efficient. Its user-friendly interface and security logging are frequently noted as strengths. VMware Carbon Black Cloud excels in threat hunting and real-time protection, providing a lightweight design that minimally impacts end users. Its ability to isolate compromised systems is particularly valued, along with strong defense features.
Room for Improvement: Exabeam could enhance API interactions and documentation. Users find its integration with cloud environments challenging, needing better adaptability and false positive reduction. Dashboard customization and faster performance are also areas for improvement. VMware Carbon Black Cloud needs improved multi-tenancy support, complexity reduction, and enhanced analytics. Simplified custom watchlist creation and better Python library use are also desired by users.
Ease of Deployment and Customer Service: Exabeam offers versatile deployment across on-premises and public clouds, though customer service reviews are mixed, with some experiencing delays and limited regional support. VMware Carbon Black Cloud's deployment spans on-premises, public, and hybrid clouds. Its customer service is typically responsive and well-received, although some regional issues persist, leading to inconsistent support satisfaction.
Pricing and ROI: Exabeam is noted for a flexible pricing model, often seen as economical compared to competitors like Palo Alto, showing favorable ROI through tool consolidation. Users find it reasonably priced, even if not the cheapest option. VMware Carbon Black Cloud is priced higher, around eight out of ten. Though it offers valuable features, its cost may be challenging for smaller businesses. Despite higher expenses, it presents a good value with strong cybersecurity capabilities.
Exabeam offers more machine learning models that detect anomalies.
Even with TAM support from Exabeam, many issues go unresolved.
These problems were not frequent, and the last six to eight months have been stable.
I have explored the SaaS version; it offers many new features.
Exabeam needs to improve its documentation and provide more customization for dashboards and case management.
The product offers useful features like the dashboard, timeline, and session views, which enhance our security tools.
Exabeam's AI capabilities, like the natural language mode, convert natural language into Exabeam queries, enhancing ease of use.
Product | Market Share (%) |
---|---|
Exabeam | 3.9% |
VMware Carbon Black Cloud | 7.4% |
Other | 88.7% |
Company Size | Count |
---|---|
Small Business | 12 |
Midsize Enterprise | 3 |
Large Enterprise | 7 |
Company Size | Count |
---|---|
Small Business | 5 |
Midsize Enterprise | 4 |
Large Enterprise | 7 |
Exabeam Fusion is a cloud-delivered solution that that enables you to:
-Leverage turnkey threat detection, investigation, and response
-Collect, search and enhance data from anywhere
-Detect threats missed by other tools, using market-leading behavior analytics
-Achieve successful SecOps outcomes with prescriptive, threat-centric use case packages
-Enhance productivity and reduce response times with automation
-Meet regulatory compliance and audit requirements with ease
Fortify Endpoint and Workload Protection
Legacy approaches fall short as cybercriminals update tactics and obscure their actions. Get advanced cybersecurity fueled by behavioral analytics to spot minor fluctuations and adapt in response.
Recognize New Threats
Analyze attackers’ behavior patterns to detect and stop never-before-seen attacks with continuous endpoint activity data monitoring. Don’t get stuck analyzing only what’s worked in the past.
Simplify Your Security Stack
Streamline the response to potential incidents with a unified endpoint agent and console. Minimize downtime responding to incidents and return critical CPU cycles back to the business.
We monitor all Security Incident Response reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.