USM Anywhere and VMware Carbon Black Cloud are two prominent solutions in the cybersecurity market. Users prefer VMware Carbon Black Cloud due to its comprehensive features, although USM Anywhere offers competitive pricing and reliable support.
Features: USM Anywhere is praised for its asset discovery, intrusion detection, and comprehensive log management. VMware Carbon Black Cloud users highlight advanced threat detection, vulnerability management, and automated remediation. VMware Carbon Black Cloud stands out for its advanced threat detection capabilities, giving it a slight edge.
Room for Improvement: Users of USM Anywhere suggest enhancement in report customization, reduction in false positives, and better integration options. VMware Carbon Black Cloud users recommend improvements in integration with third-party tools, reducing resource consumption, and more intuitive user interfaces.
Ease of Deployment and Customer Service: USM Anywhere is found straightforward to deploy with satisfactory customer support. VMware Carbon Black Cloud's deployment process is noted to be more complex, but its customer service receives higher praise.
Pricing and ROI: USM Anywhere is more budget-friendly with a decent ROI. VMware Carbon Black Cloud, while more expensive, is deemed worth the price due to its extensive features and effective threat detection, providing a better ROI.
Customers see ROI as they save on staff and other resources.
USM Anywhere faces scalability issues because of a 60 TB limit.
There are scalability issues due to a 60 TB limit, which restricts its use for large customers like banks.
The pricing is amazing and really cheap.
The 365-day block query is a major feature.
Product | Market Share (%) |
---|---|
VMware Carbon Black Cloud | 0.2% |
USM Anywhere | 0.3% |
Other | 99.5% |
Company Size | Count |
---|---|
Small Business | 64 |
Midsize Enterprise | 29 |
Large Enterprise | 25 |
Company Size | Count |
---|---|
Small Business | 5 |
Midsize Enterprise | 4 |
Large Enterprise | 7 |
USM Anywhere centralizes security monitoring of networks and devices in the cloud, on premises, and in remote locations, helping you to detect threats virtually anywhere.
Discover
Analyze
Detect
Respond
Assess
Report
Fortify Endpoint and Workload Protection
Legacy approaches fall short as cybercriminals update tactics and obscure their actions. Get advanced cybersecurity fueled by behavioral analytics to spot minor fluctuations and adapt in response.
Recognize New Threats
Analyze attackers’ behavior patterns to detect and stop never-before-seen attacks with continuous endpoint activity data monitoring. Don’t get stuck analyzing only what’s worked in the past.
Simplify Your Security Stack
Streamline the response to potential incidents with a unified endpoint agent and console. Minimize downtime responding to incidents and return critical CPU cycles back to the business.
We monitor all Endpoint Detection and Response (EDR) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.