We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Probably the most valuable feature of CB Response is its ability to isolate a host and take it off the network, so it's not spreading anything. We have two security operations centers around the globe. When an SOC analyst sees something on an endpoint, they can use Carbon Black Response to isolate that host from the customer's environment and prevent any kind of lateral spread."
"The detection response and quarantining are very good features."
"It has a quick detection and response time."
"The product can be automated for network security purposes. The solution offers a great security automation response."
"The initial setup is straightforward."
"The product detects too many false positives initially and it could integrate better with other security solutions."
"There have been some performance issues when deploying on Windows Server, but I believe Carbon Black is working on that."
"I don't currently see where the solution is lacking features. For us and for our clients it works very well and we're pleased with it."
"Technical support could be improved."
"The area that needs improvement is integration with multiple third-party vendors."
"Pricing is fine compared to other solutions."
CB Response is an industry-leading incident response and threat hunting solution designed
for security operations center (SOC) teams. CB Response continuously records and stores
unfiltered endpoint data, so that security professionals can hunt threats in real time and
visualize the complete attack kill chain. It leverages the CB Predictive Security Cloud’s
aggregated threat intelligence, which is applied to the endpoint activity system of record for
evidence and detection of these identified threats and patterns of behavior.
As the digital attack surface expands, security teams must also expand their defense capabilities. Yet, adding additional security monitoring tools is not always the answer. Additional monitoring tools means more alerts for security teams to investigate, more context switching in the investigation process, and slower response times. This creates a number of challenges for security teams including alert fatigue, a lack of qualified security personnel to manage new tools, and slower response times.
Integrated into the Fortinet Security Fabric, FortiSOAR security orchestration, automation and response (SOAR) remedies some of the biggest challenges facing cybersecurity teams today. Allowing security operation center (SOC) teams to create a custom automated framework that pulls together all of their organization's tools unifies operations, eliminating alert fatigue and reducing context switching. This allows enterprises to not only adapt, but also optimize their security process.
Carbon Black CB Response is ranked 3rd in Security Incident Response with 2 reviews while Fortinet FortiSOAR is ranked 8th in Security Orchestration Automation and Response (SOAR) with 3 reviews. Carbon Black CB Response is rated 8.6, while Fortinet FortiSOAR is rated 7.6. The top reviewer of Carbon Black CB Response writes "Malicious activity detection response and automatic quarantining for endpoint security of your environment ". On the other hand, the top reviewer of Fortinet FortiSOAR writes "Accessible with good centralization and a straightforward initial setup". Carbon Black CB Response is most compared with Carbon Black CB Defense, Secureworks Red Cloak Threat Detection and Response, Splunk Phantom, Cynet and IBM Resilient, whereas Fortinet FortiSOAR is most compared with Palo Alto Networks Cortex XSOAR, Cisco SecureX, Splunk Phantom and ServiceNow Security Operations.
We monitor all Security Incident Response reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.