Average Ratings 1 Rating
Average Ratings 0 Ratings
Description
Carbon Black EDR by Broadcom provides a robust endpoint security solution that combines real-time threat detection, behavioral analysis, and machine learning to protect organizations from sophisticated cyber threats. The platform monitors endpoint activity across networks, offering continuous visibility and automated responses to potential security incidents. By leveraging a cloud-based architecture, Carbon Black EDR ensures seamless scalability and fast deployment, helping organizations mitigate risks, detect threats faster, and respond effectively. It’s ideal for businesses seeking a proactive solution to safeguard their systems from evolving cybersecurity threats.
Description
Sublime transforms the conventional black box email gateways by integrating detection-as-code with community-driven efforts to enhance security. Its binary explosion feature methodically inspects files sent as attachments or those automatically downloaded through links, identifying threats like HTML smuggling, dubious macros, and various malicious payloads. Additionally, Natural Language Understanding assesses the tone and intent of messages while utilizing the sender’s previous interactions to uncover attacks that do not rely on payloads. The Link Analysis tool employs a headless browser to render web pages and utilizes Computer Vision to scrutinize content for counterfeit brand logos, login pages, captchas, and other potentially harmful elements. Moreover, the sender analysis employs organizational context to uncover impersonation attempts targeting high-value users, thereby adding an extra layer of protection. Furthermore, Optical-Character-Recognition (OCR) efficiently extracts important entities from attachments, such as callback phone numbers, which can be crucial in identifying phishing attempts.
API Access
Has API
API Access
Has API
Integrations
AT&T Alien Labs Open Threat Exchange
Akamai
Aruba ClearPass
Check Point Infinity
Commvault Cloud
Commvault HyperScale X
Devo
Exabeam
Fidelis Endpoint
Google Digital Risk Protection
Integrations
AT&T Alien Labs Open Threat Exchange
Akamai
Aruba ClearPass
Check Point Infinity
Commvault Cloud
Commvault HyperScale X
Devo
Exabeam
Fidelis Endpoint
Google Digital Risk Protection
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Broadcom
Founded
1991
Country
United States
Website
www.broadcom.com/products/carbon-black/threat-detection-and-response/endpoint-detection-and-response
Vendor Details
Company Name
Sublime Security
Founded
2019
Country
United States
Website
sublime.security/
Product Features
Artificial Intelligence
Chatbot
For Healthcare
For Sales
For eCommerce
Image Recognition
Machine Learning
Multi-Language
Natural Language Processing
Predictive Analytics
Process/Workflow Automation
Rules-Based Automation
Virtual Personal Assistant (VPA)
Cloud Security
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Endpoint Detection and Response (EDR)
Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis
Endpoint Protection
Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
Product Features
Email Security
Anti Spam
Anti Virus
Email Attachment Protection
Encryption
Policy Management
Quarantine
Reporting/Analytics
Whitelisting / Blacklisting