Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 1 Rating

Total
ease
features
design
support

Alternatives to Consider

  • Safetica Reviews & Ratings
    414 Ratings
    Company Website
  • ManageEngine ADAudit Plus Reviews & Ratings
    521 Ratings
    Company Website
  • Wiz Reviews & Ratings
    1,452 Ratings
    Company Website
  • NeuBird Reviews & Ratings
    2 Ratings
    Company Website
  • Orca Security Reviews & Ratings
    546 Ratings
    Company Website
  • UTunnel VPN and ZTNA Reviews & Ratings
    118 Ratings
    Company Website
  • Carbide Reviews & Ratings
    88 Ratings
    Company Website
  • Cloudflare Reviews & Ratings
    2,002 Ratings
    Company Website
  • TradingView Stock Widgets Reviews & Ratings
    16 Ratings
    Company Website
  • Aikido Security Reviews & Ratings
    231 Ratings
    Company Website

What is Permiso?

Implementing a Cloud Security Posture Management (CSPM) system demonstrates that you are taking significant steps toward modernizing security in your cloud environment, which is undoubtedly beneficial. Nevertheless, relying solely on this system does not guarantee complete security. To truly oversee your cloud infrastructure, it is vital to obtain real-time visibility into ongoing activities and user behaviors. Permiso provides you with this essential data. Unlike conventional solutions like SIEMs, which may require extensive time—sometimes hours or days—to uncover the causes of suspicious or risky behavior in your identities, Permiso allows you to address these issues in a matter of minutes. Not every event requires your immediate concern; it’s similar to your home’s smart doorbell camera, where you wouldn’t want alerts for every cat that walks by but rather for more alarming incidents such as a potential intruder. Permiso focuses on the actions that genuinely need your attention. Furthermore, it goes beyond merely identifying vulnerabilities in your cloud architecture; it also reveals whether these weaknesses are being actively exploited and, importantly, pinpoints the individuals involved in those activities. With such detailed understanding, you can respond to potential threats more effectively and fortify your cloud security posture. This proactive approach not only mitigates risks but also enhances overall operational efficiency.

What is Carbon Black EDR?

Carbon Black Endpoint Detection and Response (EDR) by Broadcom is a powerful cybersecurity tool designed to protect endpoints from malicious activity by detecting threats using advanced machine learning and behavioral analytics. With its cloud-based architecture, Carbon Black EDR offers organizations continuous monitoring, real-time threat detection, and automated responses to potential security incidents. The platform provides security teams with deep insights into endpoint behavior, helping them rapidly investigate and respond to suspicious activity. Additionally, Carbon Black EDR enhances scalability and flexibility, allowing businesses to scale their security operations while reducing investigation time and improving response efficiency. It is the ideal solution for organizations looking to safeguard their networks and endpoints from modern, sophisticated cyber threats.

Media

Media

Integrations Supported

AT&T Alien Labs Open Threat Exchange
Akamai
Armis Centrix
Aruba ClearPass
Azure Marketplace
Carbon Black App Control
Cofense Intelligence
EclecticIQ
Forescout
Infoblox DDI
Panaseer
Picus
Red Canary
SIRP
Stellar Cyber
Switch Automation
The Respond Analyst
Tines
Veriti
vCloud Usage Meter

Integrations Supported

AT&T Alien Labs Open Threat Exchange
Akamai
Armis Centrix
Aruba ClearPass
Azure Marketplace
Carbon Black App Control
Cofense Intelligence
EclecticIQ
Forescout
Infoblox DDI
Panaseer
Picus
Red Canary
SIRP
Stellar Cyber
Switch Automation
The Respond Analyst
Tines
Veriti
vCloud Usage Meter

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Permiso

Company Location

United States

Company Website

www.permiso.io

Company Facts

Organization Name

Broadcom

Date Founded

1991

Company Location

United States

Company Website

www.broadcom.com/products/carbon-black/threat-detection-and-response/endpoint-detection-and-response

Categories and Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Categories and Features

Artificial Intelligence

Chatbot
For Healthcare
For Sales
For eCommerce
Image Recognition
Machine Learning
Multi-Language
Natural Language Processing
Predictive Analytics
Process/Workflow Automation
Rules-Based Automation
Virtual Personal Assistant (VPA)

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Popular Alternatives

Popular Alternatives

Upwind Reviews & Ratings

Upwind

Upwind Security