Coming October 25: PeerSpot Awards will be announced! Learn more
PaulBecker - PeerSpot reviewer
Senior Manager- Security Monitoring and Incident Response at Clarios
  • 5
  • 208

Carbon Black and Cylance Comparison for EDR

I'm a Senior Manager- Security Monitoring and Incident Response at a large manufacturing company. 

I am looking for thoughts from those who may have done a comparative analysis on these two products within the last 6 months or so.  Realizing these technologies have advanced rapidly over the past year or two I would like to hear some current observations.

While I am interested in the value/functionality of the platforms, I am currently focused on  assessments around EDR performance and ultimate functionality.

Thanks in advance for your thoughts.

PeerSpot user
5 Answers
Managing Member at Pender & Associates
Real User
Top 5Leaderboard
07 August 20

If you're looking for a NextGen, Machine Learning & AI-driven Active EDR with automated remediation, that has not been breached and is backed by a one million USD ransomware warranty.  Contact me and I'll provide you with detailed comparisons between SentinelOne, Cylance and Carbon Black, showing how SentinelOne is superior to both Cylance and Carbon Black. 

It will also be my pleasure to demonstrate the SentinelOne solution to you.

The future of your company's cybersecurity is in your hands.

Eric Rise - PeerSpot reviewer
Network & Security Engineer at a healthcare company with 51-200 employees
Real User
Top 5
20 December 21


While I've not used Carbon I have used Cylance and Optics for years before moving away from them in favor of a more robust and easy to manage solution. Cylance, IF properly configured can stop the majority of attacks out there and incorporates machine learning. I would strongly suggest if you're reviewing EDR's that you also consider S1.

Cylance in order to compete with other platforms needs to have Cylance and Optics installed. Last I used it these were two separate components and still not integrated into the same client. That was the goal but never happened while I was a customer. Optics was confusing to use, confusing to configure. I've had ZERO issues like this with our S1 deployment and production use. the ML on this client has been superior to the Cylance ML model as well and I don't need multiple apps installed to accomplish the same end goal.

Cylance as an EDR failed for me, I loved the ML machine learning for the antivirus and malware/ ransomware protection and such but as an EDR there're WAY better choices on the market.

Hope this helps.

NeilCesario - PeerSpot reviewer
Virtual Chief Information Security Officer at Sterling Information Tech Inc.
Real User
13 August 20

Hiya Paul, I'm a bit biased as we are partnered with Cynet Security. We've done extensive testing on Cynet 360 using two recipes: MITRE Framework and Atomic Red Team's collection of small, highly portable detection tests mapped to MITRE ATT&CK®. Value Proposition is very good with a 24/7 SOC support. Fully automated D&R agent with ability to integrate to external SIEM. Also has User Behaviour Analytics (UBA) which is helpful. But EDR comparison needs to be evaluated according to your company's needs. Not one size fits all. So i suggest you test drive both using the MITRE framework as we have. Many CISOs or Managers wants an EDR that you install and forget, and i think Cynet is that.Additionally, the Deception module is an excellent honeypot for Advanced Persistent Threat (APT) Attacks. Cynet Offers Free Threat Assessment for Mid-sized and Large Organizations (min 250 endpoints). And based on Gartner's Peer Insights EDR review, Cynet came #1 out of 51 vendors with an average rating of 5 out of 5. Sorry, we've done our eval on many EDR/XDR/MDRs and we've hit home with Cynet 360. Perhaps an on prem eval is in order. Cheers!!

IT Security Coordinator at a healthcare company with 10,001+ employees
Real User
Top 5
07 August 20

We didn't consider either of these after demo and comparison from reviews of multiple EDR solutions we came up with SentinelOne on top and are now POCg it as an endpoint solution.

Paresh Makwana - PeerSpot reviewer
Director at a tech services company with 1-10 employees
Top 20Leaderboard
07 August 20

Capability                               Cylance                   Carbon Black

Leverages local ML Model        Yes                          No

Leverages cloud ML Model.      Not required but      No

                                              adds to efficacy

Predictive Advantage              Yes                          No

Prevents attacks from 

zero-day threats                     Yes                          Partial

Daily or frequent updates        No                           Yes

Allows malware to execute      No                           Yes

Cloud vs. On-Premise Mgmt     Cloud & On-Premise  On-Premise

Single Agent                           Yes                           No

Scale of Agents                       Infinite                    Limited

Single Console                        Yes                          No

Requires continual scans         No                           Yes

Capable of convicting offline   Yes                         No

Avg mem/cpu                         <70MB/1%                High

Agent Update Cycle                Quarterly                 Daily

ML Update Cycle                    3x Yearly                  N/A

Related Questions
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
Jan 18, 2022
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
See 1 answer
Nhut Vu - PeerSpot reviewer
Presales Project Manager at FPT
18 January 22
Pricing could be lower for this product.
Menachem D Pritzker - PeerSpot reviewer
Sr. Director of Growth at PeerSpot (formerly IT Central Station)
Aug 10, 2020
On July 15, 2020, several verified Twitter accounts with millions of followers were compromised in a cyberattack. Many of the hacked accounts we protected using two-factor authentication, which the hackers were somehow able to bypass. Hacked accounts included Barack Obama, Joe Biden, Bill Gates, Jeff Bezos, Mike Bloomberg, Warren Buffett, Kim Kardashian, and Kanye West, Benjamin Netanyahu, and...
2 out of 6 answers
Ken Shaurette - PeerSpot reviewer
Director InfoSec and Audit at a manufacturing company with 1,001-5,000 employees
17 July 20
For some good information from a leading expert check out the webinar today 7/17 on Brighttalk by Alex Holden..... We have a lot of questions about the Twitter breach but not so many answers. I can tell you that similar cryptocurrency fraud campaigns are on-going on different social media platforms and on a different scale. Tomorrow (Friday) at 11 am CT on BrightTalk We will discuss what we know about the breach and disturbing patterns that are emerging everywhere.
Russell Webster - PeerSpot reviewer
VP and Sr. Manager at a financial services firm with 1,001-5,000 employees
17 July 20
Span of control, Solid RBAC, Privileged Access Management (PAM) 
PeerSpot user
Info Sec Consultant at Size 41 Digital
Real User
Top 5
Download Free Report
Download our free EDR (Endpoint Detection and Response) Report and find out what your peers are saying about BlackBerry, Microsoft, CrowdStrike, and more! Updated: September 2022.
633,572 professionals have used our research since 2012.