Average Ratings 1 Rating

Total
ease
features
design
support

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Carbon Black EDR by Broadcom provides a robust endpoint security solution that combines real-time threat detection, behavioral analysis, and machine learning to protect organizations from sophisticated cyber threats. The platform monitors endpoint activity across networks, offering continuous visibility and automated responses to potential security incidents. By leveraging a cloud-based architecture, Carbon Black EDR ensures seamless scalability and fast deployment, helping organizations mitigate risks, detect threats faster, and respond effectively. It’s ideal for businesses seeking a proactive solution to safeguard their systems from evolving cybersecurity threats.

Description

Conventional endpoint detection and response (EDR) systems concentrate solely on the activities within endpoints to identify potential threats. This narrow focus results in a lack of comprehensive context, hindering accurate attack analysis and resulting in an incomplete understanding of security incidents, alongside a propensity for numerous false positives and negatives. Consequently, organizations find themselves needing to deploy various point solutions and maintain large teams for incident response. Qualys addresses these limitations by introducing a novel multi-vector approach, leveraging the robust capabilities of its scalable Cloud Platform to enhance EDR with essential context and extensive visibility across the entire attack lifecycle—from prevention through detection to response. The Qualys Multi-Vector EDR integrates various contextual elements such as asset discovery, a detailed software inventory, insights into end-of-life assets, vulnerabilities, exploitable conditions, misconfigurations, comprehensive endpoint telemetry, and network accessibility, all supported by a powerful backend that facilitates accurate correlation for effective assessment, detection, and response—all within a single cloud-based application. This approach not only streamlines the process but also empowers organizations to respond more effectively to threats.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Panaseer
Akitra Andromeda
Arista NDR
Cofense Intelligence
EclecticIQ
Exabeam
Infoblox DDI
LogRhythm SIEM
NetWitness
OpenText Managed Extended Detection and Response
Polarity
Rapid7 Incident Command
SIRP
SOC Prime Platform
Sumo Logic
The Respond Analyst
ThreatAware
VMRay
Veriti
vCloud Usage Meter

Integrations

Panaseer
Akitra Andromeda
Arista NDR
Cofense Intelligence
EclecticIQ
Exabeam
Infoblox DDI
LogRhythm SIEM
NetWitness
OpenText Managed Extended Detection and Response
Polarity
Rapid7 Incident Command
SIRP
SOC Prime Platform
Sumo Logic
The Respond Analyst
ThreatAware
VMRay
Veriti
vCloud Usage Meter

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Broadcom

Founded

1991

Country

United States

Website

www.broadcom.com/products/carbon-black/threat-detection-and-response/endpoint-detection-and-response

Vendor Details

Company Name

Qualys

Founded

1999

Country

United States

Website

www.qualys.com/apps/endpoint-detection-response/

Product Features

Artificial Intelligence

Chatbot
For Healthcare
For Sales
For eCommerce
Image Recognition
Machine Learning
Multi-Language
Natural Language Processing
Predictive Analytics
Process/Workflow Automation
Rules-Based Automation
Virtual Personal Assistant (VPA)

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Product Features

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Alternatives

Falcon XDR Reviews

Falcon XDR

CrowdStrike