VMware Carbon Black Cloud Products

vmware-carbon-black-cloud
VMware Carbon Black CloudTM

Cloud-Native Endpoint Protection Platform (EPP)

VMware Carbon Black’s cloud–native endpoint protection platform combines the intelligent system hardening and behavioral prevention needed to keep emerging threats at bay.

  • Replace legacy antivirus with lightweight prevention that adapts to your business.
  • Detect and prevent attackers from abusing legitimate tools. 
  • Automate your investigation workflow to respond efficiently. 
vmware-carbon-black-endpoint-standard
Endpoint Standard

Next-Generation Antivirus and Behavioral EDR

Cloud-Native endpoint protection that combines prevention and automated detection to defend against today’s advanced cyber attacks from a single agent and console.

  • Block malware, ransomware, non-malware, living off the land and other emerging, never-before-seen attacks automatically, both online and offline.
  • Simplify deployment and operations with out-of-the-box policies and easily adapt protection to your organization.
  • Visualize every stage of the attack with easy-to-follow attack chain details to uncover root causes in minutes.
vmware-cloud-enterprise-endpoint-detection-response
Enterprise Endpoint Detection and Response

Threat Hunting and Incident Response

Cloud-native threat hunting and incident response (IR) solution delivering continuous visibility for security operation centers (SOC) and IR teams.

  • See what happened at every stage of an attack with intuitive attack chain visualizations and uncover advanced threats and minimize attacker dwell time.
  • Leverage cloud-delivered threat intelligence and custom watchlists to automate repetitive hunts.
  • Isolate infected systems and remove malicious files to prevent lateral movement.
vmware-cloud-audit-remediation
Audit and Remediation

Real-time Device Assessment and Remediation

Easily audit current system state to track and harden the security posture of all your protected devices.

  • Gain visibility into precise details about current state of all devices – on and off the network.
  • Close the gap between the security and infrastructure teams, allowing administrators to perform comprehensive investigations and remote remediations.
  • Allow administrators to automate ongoing reporting on patch levels, user privileges, disk encryption status, and more to track and maintain a desired posture.
vmware-cloud-managed-detection
Managed Detection

Managed Alert Monitoring and Triage

Gain round-the-clock eyes on glass from our SOC of expert analysts, who provide validation, context into root cause, and automated monthly executive reporting.

  • Gain alert coverage and threat triage across your entire deployment.
  • Leverage Global threat intel to stay a step ahead of outbreaks.
  • Augment your team with advanced threat hunting and incident response by world-class experts.

VMware Carbon Black On-Premises Products

vmware-onprem-app-control
App Control

Application Control and Critical infrastructure protection

VMware Carbon Black App Control is an industry-leading application control product, used to lock down servers and critical systems, prevent unwanted changes and ensure continuous compliance with regulatory mandates.

  • Harden new and legacy systems against malware, ransomware, zero-day and non-malware attacks with broad support for embedded, virtual and physical operating systems.
  • Secure end-of-life systems with powerful change control and allowlisting policies.
  • Out of the box templates based on industry best practices keep management overhead low.
vmware-onprem-endpoint-detection-response
Endpoint Detection and Response

Detect and Respond to Advanced Attacks at Scale

Threat hunting and incident response (IR) solution delivering continuous visibility into hybrid deployments for top security operations centers (SOC) and IR teams.

  • Collect and visualize comprehensive information about every monitored endpoint. Give security professionals greater visibility into their environment.
  • Consolidate threat intelligence for your environment to automatically detect suspicious behavior.
  • Isolate infected systems and remove malicious files to prevent lateral movement and store detailed forensic data for post-incident investigation.