VMware Carbon Black Cloud and Kaspersky Anti-Targeted Attack Platform are two leading cybersecurity solutions. User reviews indicate VMware has the upper hand in pricing and customer support, while Kaspersky offers more advanced features and justifies its higher cost.
Features: VMware Carbon Black Cloud is known for its threat detection, real-time response, and pricing advantages. Kaspersky Anti-Targeted Attack Platform highlights comprehensive threat intelligence, advanced threat hunting tools, and superior feature set.
Room for Improvement: VMware Carbon Black Cloud needs better integration with other security tools, more intuitive configuration, and enhanced user interface. Kaspersky could improve by offering better documentation, more responsive customer support, and streamlined setup processes.
Ease of Deployment and Customer Service: VMware Carbon Black Cloud offers simpler, faster deployment, and highly-rated customer service. Kaspersky’s deployment is more complex with mixed customer service reviews.
Pricing and ROI: VMware Carbon Black Cloud is cost-effective with a good ROI. Kaspersky is more expensive but deemed worth the investment due to superior features.
Product | Market Share (%) |
---|---|
VMware Carbon Black Cloud | 0.2% |
Kaspersky Anti-Targeted Attack Platform | 0.3% |
Other | 99.5% |
Company Size | Count |
---|---|
Small Business | 5 |
Midsize Enterprise | 4 |
Large Enterprise | 7 |
Today’s cybercriminals constantly design unique and innovative methods of penetration and compromise. To avoid perimeter prevention technologies they use social engineering, non-malware and supply chain attacks to operate under the radar of security designed to catch ‘bad’ traces. It’s not enough to just ‘know’ what’s bad or dangerous – enterprises need to understand what’s normal, and use AI-driven techniques that simplify and automate this process. Targeted Attack Analyzer is a machine learning engine that involves self-learning to establish the baseline of normal, legitimate activities of an entire network. Through continuous network telemetry collection it finds deviations, detects suspicious activities and predicts further malicious actions at the initial stages of multilayered attacks.
Fortify Endpoint and Workload Protection
Legacy approaches fall short as cybercriminals update tactics and obscure their actions. Get advanced cybersecurity fueled by behavioral analytics to spot minor fluctuations and adapt in response.
Recognize New Threats
Analyze attackers’ behavior patterns to detect and stop never-before-seen attacks with continuous endpoint activity data monitoring. Don’t get stuck analyzing only what’s worked in the past.
Simplify Your Security Stack
Streamline the response to potential incidents with a unified endpoint agent and console. Minimize downtime responding to incidents and return critical CPU cycles back to the business.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.