We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Probably the most valuable feature of CB Response is its ability to isolate a host and take it off the network, so it's not spreading anything. We have two security operations centers around the globe. When an SOC analyst sees something on an endpoint, they can use Carbon Black Response to isolate that host from the customer's environment and prevent any kind of lateral spread."
"The detection response and quarantining are very good features."
"The customization continues to be excellent."
"Very flexible integration with other tools"
"The most valuable feature is the risk-based access control."
"So far, the interface is very easy to use."
"I like the integration capabilities of Phantom. It has a lot of integrations with other products. Its searching methodologies are also good. It is also easy to understand and easy to create playbooks."
"I'm just a beginner on the solution and it's pretty easy for me to use."
"The product detects too many false positives initially and it could integrate better with other security solutions."
"There have been some performance issues when deploying on Windows Server, but I believe Carbon Black is working on that."
"It would be ideal if we could automate processes even more."
"I haven't used it fully, but based on my usage, I could not find simulation tools and features. It currently lacks simulation features, which are important for me for creating a playbook. It is also very expensive for my region."
"We've had trouble implementing the solution with Microsoft products. There seems to be an integration gap."
"We want to see improvements made to the APIs such that we can connect to many different systems and data sources."
"In the beginning, we couldn't find any specific documents for every function. It wasn't easy to navigate to what we needed."
"And most of the challenges that I have faced with the solution can be found in the documentation itself."
"I don't know the exact price, but for my region, it is very expensive."
CB Response is an industry-leading incident response and threat hunting solution designed
for security operations center (SOC) teams. CB Response continuously records and stores
unfiltered endpoint data, so that security professionals can hunt threats in real time and
visualize the complete attack kill chain. It leverages the CB Predictive Security Cloud’s
aggregated threat intelligence, which is applied to the endpoint activity system of record for
evidence and detection of these identified threats and patterns of behavior.
Phantom enables teams to work smarter by executing automated actions across their security
infrastructure in seconds, versus hours or more if
performed manually. Teams can codify workflows
into Phantom’s automated playbooks using the visual
editor (no coding required) or the integrated Python
development environment. By offloading these
repetitive tasks, teams can focus their attention on
making the most mission-critical decisions.
Phantom is the connective tissue that lets existing security tools work better together. By connecting and coordinating complex workflows across the SOC’s team and tools, Phantom ensures that each part of the SOC’s layered defense is actively participating in a unified defense strategy. Powerful abstraction allows teams to focus on what they need to accomplish, while the platform translates that into tool-specific actions.
Phantom helps security teams investigate and respond to threats faster. Using Phantom’s automated detection, investigation, and response capabilities, teams can execute response actions at machine speed, reduce malware dwell time and lower their overall mean time to resolve (MTTR). And now with Phantom on Splunk Mobile, analysts can use their mobile device to respond to security incidents while on-the-go. Phantom’s event and case management functionality can further streamline security operations. Case-related data and activity are easily accessible from one central repository. It’s easy to chat with other team members about an event or case, and assign events and tasks to the appropriate team member.
Carbon Black CB Response is ranked 3rd in Security Incident Response with 2 reviews while Splunk Phantom is ranked 3rd in Security Orchestration Automation and Response (SOAR) with 6 reviews. Carbon Black CB Response is rated 8.6, while Splunk Phantom is rated 7.6. The top reviewer of Carbon Black CB Response writes "Malicious activity detection response and automatic quarantining for endpoint security of your environment ". On the other hand, the top reviewer of Splunk Phantom writes "Very stable with a straightforward setup and good performance". Carbon Black CB Response is most compared with Carbon Black CB Defense, Secureworks Red Cloak Threat Detection and Response, Cynet, Fidelis Elevate and Palo Alto Networks Cortex XSOAR, whereas Splunk Phantom is most compared with Palo Alto Networks Cortex XSOAR, ServiceNow Security Operations, IBM Resilient, Cisco SecureX and DFLabs IncMan SOAR.
We monitor all Security Incident Response reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.