Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 1 Rating

Total
ease
features
design
support

Alternatives to Consider

  • Cynet All-in-One Cybersecurity Platform Reviews & Ratings
    374 Ratings
    Company Website
  • Heimdal Endpoint Detection and Response (EDR) Reviews & Ratings
    54 Ratings
    Company Website
  • ConnectWise SIEM Reviews & Ratings
    188 Ratings
    Company Website
  • DataBahn Reviews & Ratings
    1 Rating
    Company Website
  • ManageEngine ADAudit Plus Reviews & Ratings
    427 Ratings
    Company Website
  • Tenzir Reviews & Ratings
    3 Ratings
    Company Website
  • Guardz Reviews & Ratings
    56 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    469 Ratings
    Company Website
  • SpamTitan Reviews & Ratings
    813 Ratings
    Company Website
  • Cribl Stream Reviews & Ratings
    8 Ratings
    Company Website

What is Cisco Secure Network Analytics?

Achieve extensive visibility and strong security analytics across your organization. By leveraging the innovative machine learning and behavioral modeling features provided by Secure Network Analytics, formerly known as Stealthwatch, you can stay ahead of emerging threats in your digital environment. Utilize telemetry data from your network infrastructure to gain insights into who is accessing your network and what activities they are engaged in. Quickly pinpoint advanced threats and take immediate action to address them. Protect critical data by implementing more effective network segmentation strategies. This all-encompassing solution functions without agents and is designed to scale as your business grows. Accurately detect intrusions in the constantly changing network landscape with alerts that are enriched with contextual details such as user identity, device type, geographic location, timestamps, and application usage. Analyze encrypted traffic to reveal threats and ensure compliance without the need to decrypt the data, thus maintaining privacy. Use advanced analytics to rapidly identify unfamiliar malware, insider threats like data exfiltration, policy violations, and other sophisticated attacks. Additionally, keep telemetry data for longer durations to support comprehensive forensic analysis, which will further enhance your security posture. This proactive approach ensures that your organization is well-prepared to tackle the dynamic nature of cybersecurity challenges.

What is Carbon Black EDR?

Carbon Black Endpoint Detection and Response (EDR) by Broadcom is a powerful cybersecurity tool designed to protect endpoints from malicious activity by detecting threats using advanced machine learning and behavioral analytics. With its cloud-based architecture, Carbon Black EDR offers organizations continuous monitoring, real-time threat detection, and automated responses to potential security incidents. The platform provides security teams with deep insights into endpoint behavior, helping them rapidly investigate and respond to suspicious activity. Additionally, Carbon Black EDR enhances scalability and flexibility, allowing businesses to scale their security operations while reducing investigation time and improving response efficiency. It is the ideal solution for organizations looking to safeguard their networks and endpoints from modern, sophisticated cyber threats.

Media

Media

Integrations Supported

SIRP
Anomali
Azure Marketplace
BluVector Advanced Threat Detection
Commvault HyperScale X
CyberGatekeeper
Datadog
Forescout
FortiMail
Google Digital Risk Protection
Netskope
Okta
Panaseer
Polarity
Proficio
Query Federated Search
Recorded Future
ServiceNow
Stellar Cyber
Trustwave DbProtect

Integrations Supported

SIRP
Anomali
Azure Marketplace
BluVector Advanced Threat Detection
Commvault HyperScale X
CyberGatekeeper
Datadog
Forescout
FortiMail
Google Digital Risk Protection
Netskope
Okta
Panaseer
Polarity
Proficio
Query Federated Search
Recorded Future
ServiceNow
Stellar Cyber
Trustwave DbProtect

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Cisco

Date Founded

1984

Company Location

United States

Company Website

www.cisco.com/c/en/us/products/security/stealthwatch/index.html

Company Facts

Organization Name

Broadcom

Date Founded

1991

Company Location

United States

Company Website

www.broadcom.com/products/carbon-black/threat-detection-and-response/endpoint-detection-and-response

Categories and Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Categories and Features

Artificial Intelligence

Chatbot
For Healthcare
For Sales
For eCommerce
Image Recognition
Machine Learning
Multi-Language
Natural Language Processing
Predictive Analytics
Process/Workflow Automation
Rules-Based Automation
Virtual Personal Assistant (VPA)

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Popular Alternatives

Popular Alternatives

ExtraHop RevealX Reviews & Ratings

ExtraHop RevealX

ExtraHop Networks