Overview
What is Carbon Black App Control?
VMware Carbon Black App Control (formerly CB Protection) is an application control product, used to lock down servers and critical systems, prevent unwanted changes and ensure continuous compliance with regulatory mandates. VMware acquired Carbon Black October 2019.
Protect critical systems with highly effective application control solution
VMware Carbon Black App Control
Protection you can count on
Pricing
What is Carbon Black App Control?
VMware Carbon Black App Control (formerly CB Protection) is an application control product, used to lock down servers and critical systems, prevent unwanted changes and ensure continuous compliance with regulatory mandates. VMware acquired Carbon Black October 2019.
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
13 people also want pricing
Alternatives Pricing
What is SonarQube?
SonarQube is a code quality and vulnerability solution for development teams that integrates with CI/CD pipelines to ensure the software you produce is secure, reliable, and maintainable.
What is GitGuardian Internal Monitoring?
GitGuardian Internal Monitoring helps organizations detect and fix vulnerabilities in source code at every step of the software development lifecycle. With GitGuardian’s policy engine, security teams can monitor and enforce rules across their VCS, DevOps tools, and infrastructure-as-code…
Product Details
- About
- Integrations
- Competitors
- Tech Details
- Downloadables
What is Carbon Black App Control?
Carbon Black App Control Video
Carbon Black App Control Integrations
- IBM Security QRadar SIEM
- LogRhythm NextGen SIEM Platform
- Splunk Enterprise
- Palo Alto Networks WildFire
- Check Point Quantum Firewalls and Security Gateways
- Lastline
- HCL BigFix
- Juniper Advanced Threat Prevention (JATP)
- formerly Cyphort
Carbon Black App Control Competitors
- Symantec Critical System Protection
- McAfee Application Control
- Lumension
Carbon Black App Control Technical Details
Operating Systems | Unspecified |
---|---|
Mobile Application | No |
Supported Languages | English |
Carbon Black App Control Downloadables
Comparisons
Compare with
Reviews and Ratings
(18)Community Insights
- Business Problems Solved
- Pros
- Cons
CB Protection is a versatile software that has proven to be an effective solution for a variety of use cases. With its ability to protect endpoints from malware and prevent the lateral movement of threats within a network, users have been able to secure their systems and ensure the integrity of their infrastructure. By applying whitelisting and improving compliance processes, organizations have found it easier to control and regulate the applications running on their networks. This not only helps in eliminating unauthorized software installations but also ensures that only safe applications are running.
Another key use case of CB Protection is threat hunting, detection, and banning hashes. By searching for malicious files and tracking USB usage, users have been able to identify potential threats and take appropriate actions. The platform's advanced endpoint protection capabilities, such as blocking PowerShell scripts and providing visibility into unknown threats, have helped in preventing the execution of ransomware programs and other malware infections. This has significantly reduced the risk of virus outbreaks and protected users from introducing malware onto the network.
Customers have praised CB Protection for its lightweight footprint, up-to-date analytics, and protections. The product has delivered time and cost savings by preventing virus issues and eliminating the need for constant re-imaging of infected machines. It has also shown promise in reducing the occurrence of high-level attacks and increasing endpoint security. With its application whitelisting feature, CB Protection has proven to be a valuable replacement for traditional antivirus/anti-malware solutions.
The product has been particularly beneficial in addressing security concerns, ensuring PCI compliance, and resolving challenges faced by remote offices. Customers have appreciated the increased security and visibility into server and computer activities provided by CB Protection. It has successfully protected endpoints from exploitation by preventing the execution of malicious files. Moreover, proper deployment of the product has allowed users to reduce the number of security agents needed and offload resource-intensive checks.
Overall, CB Protection has demonstrated its value across various use cases by effectively protecting endpoints from malware, improving compliance processes, preventing unauthorized software installations, and enhancing overall security and visibility.
Flexibility in creating policies: Many users appreciate the ability to create different policies for different users and departments, allowing for more flexibility and tailored access levels. This feature has been mentioned by several reviewers as a major strength of the product.
Valuable User Exchange feature: The User Exchange feature, which provides access to experts in case of incidents, is seen as a valuable resource and likened to having a free full-time employee. Numerous users have praised this feature for its effectiveness in providing assistance during critical situations.
Highly effective enforcement endpoints: The ability to have high enforcement endpoints, where only approved files are allowed to run, is highly praised for its effectiveness in preventing malicious applications from infecting the environment. Several users have emphasized how this feature has significantly enhanced their security measures.
Cons:
- Constant blocking of unknown processes and executables: Some users have expressed frustration with CB Protection consistently blocking unfamiliar processes and executables, resulting in numerous false positives and overwhelming pop-up notifications. This issue has been reported by a significant number of reviewers.
- Outdated and clunky user interface: CB Protection's user interface has faced criticism for its outdated design and lack of intuitiveness. Multiple users have found it confusing to navigate, especially during complex tasks, often experiencing timeouts as well.
- Highly involved implementation and management: Reviewers have noted that implementing and managing CB Protection can be highly intricate and time-consuming. It requires a substantial amount of setup time along with a steep learning curve, making it challenging for some users to adapt to the software effectively.
Reviews
(1-3 of 3)- Controls file writes, executions of the scripts
- Defends from process injections, memory protection
- Visibility and lock down posibilities
- More frequently updates of "Software Updaters".
- Possibilities to tag within Yara rules.
- Overall it is the best whitelisting solution I have used.
- Protection of the legacy systems running on unsupported operating systems.
- Prevention of unwanted changes to system configuration and sensitive files/folders.
- Possibility to make automated approval of trusted software by the publisher, trust level, etc.
- App Control can ensure Continuous Compliance.
- Solution can reduce expenses on different security software.
- Nowadays Zero Trust approach is very important for any organization and Application control is one of the main parts of it.
VMware Carbon Black App Control
- Ease of use
- One dashboard to review all the information
- Advanced threat protection
- Perhaps more specific training.
- Dashboards are easy to understand for management
- We feel more secure than we were on our previous platform
Protection you can count on
- Device Control - you can view and allow/disallow the ability for certain devices to be used in your environment. Specifically we used this with USB drives. If you have one you want to use - whitelist the serial number. The rest can't be used. Simple and easy.
- Software blocking. If you have an extremely dynamic software base (I doubt this is likely) this could get a bit annoying, but for most organizations like ours where we have specific applications that are required, and then the rest are a bit of an afterthought, it's easy to whitelist the correct applications that you want to be able to run in your environment. The rest can't run (in high enforcement). Users are able to easily request new applications, and you can set certain groups to be able to approve it on their own.
- Solid platform - with few exceptions setting up new software was very easy (Dragon Medical was a bit tricky, but worked through it with support). Once you have your rules set up and the initial setup done, you tend not to have to do much of anything except to update on occasion and deal with a few requests for applications to be unblocked, or publishes approved.
- Cost - Cb Protect is part of now a 3 fold protection offering by Carbon Black. The other parts give you visibility and a more traditional antivirus (Conifer I believe). Once you price all three together, things get expensive. You get what you pay for I guess, as alternatives cost less, but you do lose out on features.
- On-Prem - I don't believe this has changed, but when we first set up the only option was on-prem. This has a LOT of benefits, but with more mobile users, it can become a bit of a hassle for management and updating policies. A cloud option, or cloud connector would be nice.
- Application whitelisting outperforms traditional AV/Malware protection but also takes a bit more babysitting. You end up spending a lot of time looking at new programs etc coming down the pipe. A great example is products that self update. These can become a pain as the product updates typically don't show up as signed, or not signed the way Protect looks for, so you end up whitelisting them as they come up, and depending on how often and how many you have in the environment it can be annoying.
- Protect is nice, but you really need to also have Response to see a holistic view. Else you're going endpoint to endpoint if you are breached/infected, and that gets tedious quickly. However this also adds to the cost.
- Protect took care of our objective, which was to protect the endpoints against rogue software and to help with preventing users from installing software that wasn't necessary/desired.
We actually are working on transitioning to Cisco Advanced Malware Protection (AMP). The main reason is cost (about the same cost as Cb Protect, but with (most of) the featureset of all 3 Carbon Black products for less than 1/3 of the total spend. AMP works differently, looking at a reputation service powered by Cisco's Talos cloud. You don't really have application whitelisting, but that also reduces how many "requests" you get for applications. So I'll have to find a different way to do whitelisting and USB blocking and the like, but I'm getting more visibility across my network and also built in antivirus (TETRA engine - ClamAV with some work).
Barkly is an add that we are looking to put in as it looks at behavior of programs. So specifically it watches for privilege elevation and the like. Thus far all the big name problem children (WannaCry, other ransomware problems) have been caught natively in Barkly day 0.