{"id":107228,"date":"2020-01-22T17:45:07","date_gmt":"2020-01-22T15:45:07","guid":{"rendered":"https:\/\/catalog.rci-c.com\/item\/vmware-carbon-black\/"},"modified":"2020-09-01T21:02:48","modified_gmt":"2020-09-01T18:02:48","slug":"vmware-carbon-black","status":"publish","type":"product","link":"https:\/\/catalog.rci-c.com\/en\/catalog\/it-security\/endpoint-protection\/vmware-carbon-black\/","title":{"rendered":"VMware Carbon Black"},"content":{"rendered":"<p>[vc_row][vc_column][vc_column_text]<\/p>\n<h1>CLOUD PROTECTION OF NETWORK END POINTS<br \/>\nwith VMware Carbon Black Cloud \u2122<\/h1>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h4>Carbon Black &#8211; is a leader in endpoint cloud protection designed to protect the world from cyber attacks. CB Predictive Security Cloud integrates endpoint protection and IT operations with an endpoint protection platform (EPP) that prevents advanced threats, provides real-time insight, and enables enterprises of any size to simplify operations. By analyzing billions of security events per day around the world, Carbon Black has a key insight into the behavior of cybercriminals, allowing customers to detect, respond and suppress emerging attacks.<\/h4>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h1>Cloud Native Advantage<\/h1>\n<p>In today&#8217;s mobile world, endpoints are a new perimeter, and each endpoint is a possible entry point. Carbon Black prevents more threats, gives you full understanding and helps you work faster and more efficiently.<\/p>\n<p>VMmare lets you choose the endpoint security features your team needs. With an ever-evolving threat market, a security checker opposes digital attacks. If you want to replace anti-virus malware prevention or want to strengthen the fully automated security process, VMware Black Cloud will satisfy your needs from the same console and agent.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h1>CB Defense Based on PSC<\/h1>\n<h3>Solution for replacing traditional antivirus with new features<\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4>Online Attack Prevention<\/h4>\n<p>\u2022 Blocking both malware and fileless attacks<br \/>\n\u2022 Unique behavioral analysis using EDR data to block unknown attacks<br \/>\n\u2022 Strongest protection from ransomware programs &#8211; 100% effectiveness in testing third-party organizations<br \/>\n\u2022 On-line and off-line protection<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4>EDR<\/h4>\n<p>\u2022 A clear, complete picture of endpoint activity using raw data<br \/>\n\u2022 Visualization of each stage of the attack and the disclosure of its primary source in minutes<br \/>\n\u2022 Easy search and investigation of incidents at endpoints<br \/>\n\u2022 Live response function for real-time troubleshooting<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4>Develops with your team<\/h4>\n<p>\u2022 A \u201cboxed\u201d solution for detection and prevention for less experienced teams<br \/>\n\u2022 Flexible policy settings for advanced users<br \/>\n\u2022 Easily configurable dashboards to reduce false positives<br \/>\n\u2022 Real-time investigations for companies without specialized specialists<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h1>CB Response (on-premise or cloud solution)<\/h1>\n<h3>Detection and response to advanced threats<\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4>UNFILTERED VISIBILITY<\/h4>\n<p>\u2022 Collect all activity at endpoints<br \/>\n\u2022 Visualization of attacks<br \/>\n\u2022 Determining the source of the attack<br \/>\n\u2022 Collection of complete attack data<br \/>\n\u2022 Minimal endpoint resource utilization<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4>PROACTIVE THREAT HUNTING<\/h4>\n<p>\u2022 Automated search<br \/>\n\u2022 Blocking the vulnerability \u201cheadline\u201d<br \/>\n\u2022 The complication of subsequent attacks<br \/>\n\u2022 Integrated Protection<br \/>\n\u2022 Use of CB community experts<\/p>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_column_text]<\/p>\n<h4>RESPOND IMMEDIATELY<\/h4>\n<p>\u2022 Data collection for investigation<br \/>\n\u2022 Recover infected devices<br \/>\n\u2022 Preventing future attacks<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text] CLOUD PROTECTION OF NETWORK END POINTS with VMware Carbon Black Cloud \u2122 [\/vc_column_text][vc_column_text] Carbon Black &#8211; is a leader in &#8230;<\/p>\n","protected":false},"featured_media":107076,"template":"","meta":[],"product_cat":[285,282],"product_tag":[],"_links":{"self":[{"href":"https:\/\/catalog.rci-c.com\/en\/wp-json\/wp\/v2\/product\/107228\/"}],"collection":[{"href":"https:\/\/catalog.rci-c.com\/en\/wp-json\/wp\/v2\/product\/"}],"about":[{"href":"https:\/\/catalog.rci-c.com\/en\/wp-json\/wp\/v2\/types\/product\/"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/catalog.rci-c.com\/en\/wp-json\/wp\/v2\/media\/107076\/"}],"wp:attachment":[{"href":"https:\/\/catalog.rci-c.com\/en\/wp-json\/wp\/v2\/media\/?parent=107228"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/catalog.rci-c.com\/en\/wp-json\/wp\/v2\/product_cat\/?post=107228"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/catalog.rci-c.com\/en\/wp-json\/wp\/v2\/product_tag\/?post=107228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}