Carbon Black Endpoint
Carbon Black Endpoint
3 reviews
WH Score
8.5

Top Carbon Black Endpoint Features

What are the Best Carbon Black Endpoint Features?

Carbon Black Endpoint offers a comprehensive set of features to ensure the security and protection of endpoints. Some of its most popular features include:

  • Threat Analytics: Carbon Black Endpoint provides advanced threat analytics capabilities to detect and analyze potential security threats and anomalies.
  • Device Control: It allows administrators to control and manage the devices connected to the network, ensuring only authorized devices can access sensitive data.
  • Endpoint Detection and Response (EDR): This feature enables quick detection and response to potential security incidents, providing real-time visibility into endpoint activities.
  • Attack Surface Monitoring: Carbon Black Endpoint continuously monitors and assesses the attack surface of endpoints, identifying potential vulnerabilities and providing recommendations for remediation.
  • Application Control: It allows administrators to control and manage the applications running on endpoints, ensuring only trusted and authorized applications can execute.

These features, along with others offered by Carbon Black Endpoint, provide organizations with a robust and comprehensive security solution to protect their endpoints from a wide range of cyber threats.


Cybersecurity Features
  • Network Security
  • Data Security
  • Cloud Security
  • Web Security
  • Email Security
  • Gateway Security
  • Server Security
  • Workload Security
  • Runtime Security
  • API Security
  • Endpoint Detection and Response (EDR)
  • Firewall
  • Encryption
  • Filtering
  • Attack Surface Monitoring
  • Threat Hunting
  • Threat Intelligence
  • Threat Library
  • Incident Triage
  • Incident Response & Remediation
  • Cloud Access Security Broker (CASB)
  • Security Operations Center (SOC)
Device Management
  • Device Discovery
  • Device Control
  • Device Isolation
  • Bring Your Own Device (BYOD)
  • Device Lifecycle Management
Network Management
  • Network Discovery
  • Network Control
  • Network Isolation
Application Management
  • Application Discovery
  • Application Control
  • Application Isolation
  • Application Lifecycle Management
Identity and Access Management (IAM)
  • Role Based Access Control (RBAC)
  • Multi-Factor Authentication (MFA)
  • Contextual Authentication
Password Management
  • Password Strength Check
Reporting & Analytics
  • Audit Trail
  • Dashboard
  • Compliance Reports
  • Threat Analytics
  • Device Analytics
  • Policy Assessments
  • Network Assessments
  • Usage Analytics
  • Threat Modeling
Cybersecurity Protection Types
  • Antivirus
  • DDoS Protection
  • Anti-Malware
  • Anti-Ransomware
  • Anti-Spyware
  • Anti-Phishing
  • Anti-Spam
  • Exfiltration Prevention
  • Bot Mitigation
  • Zero-Day Mitigation
Systems/Administrative
  • Policy Management
  • Sandbox
  • Centralized Console
Sync/Refresh
  • Device Sync
Workflow Automation
  • Application Automation
Integration Options
  • APIs
After-Sales Service
  • Phone Support
  • Email Support
  • Product Guide/Manual
Content Management System (CMS) Features
  • Digital Rights Management
Disaster Recovery
  • Data Backup & Recovery
  • Data Snapshots
  • Geo Redundancy
Data Management
  • Data Retention
Reminders/Alerts
  • Security Alerts
  • Threat Alerts
Have you used Carbon Black Endpoint in the past?

Help other people find the right software by sharing your Carbon Black Endpoint experience.

0

Best WH Scored Carbon Black Endpoint Alternatives

Need help finding the right software?

Tell us what you're looking for and we'll offer you personalized software recommendations.

The right software for your business

Get your personalized recommendations now.