VMware Carbon Black Cloud is a Software as a Service (SaaS) solution that provides next-generation anti-virus (NGAV), endpoint detection and response (EDR), advanced threat hunting, and vulnerability management within a single console using a single sensor.
VMware Carbon Black Cloud (formerly Predictive Security Cloud) hosts various modules that allow an administrator to manage endpoints with the VMware Carbon Black Cloud Endpoint sensor.
1VMware Carbon Black Cloud Prevention can be upgraded to VMware Carbon Black Cloud Endpoint Standard. However, it cannot be downgraded back to VMware Carbon Black Cloud Prevention. More add-on SKUs cannot be leveraged with VMware Carbon Black Cloud Prevention.
2VMware Carbon Black Cloud Audit & Remediation and VMware Carbon Black Cloud Enterprise EDR can be purchased separately. It may also be individually added on to an existing VMware Carbon Black Cloud environment unless that instance is VMware Carbon Black Cloud Prevention.
Features | VMware Carbon Black Cloud Prevention | VMware Carbon Black Cloud Standard | VMware Carbon Black Cloud Advanced | VMware Carbon Black Cloud Enterprise |
---|---|---|---|---|
Anti-virus and Malware | Included | Included | Included | Included |
EDR | Not included | Included | Included | Included |
Alerts | Not included | Included | Included | Included |
Quarantine | Not included | Included | Included | Included |
Remote Console | Not included | Included | Included | Included |
Test Rule before pushing out | Not included | Included | Included | Included |
Tunable Prevention | Limited Functionality | Included | Included | Included |
Third-party Threat Intel | Not included | Not included | Not included | Included |
Custom Alerting | Not included | Not included | Not included | Included |
API Integration | Not included | Included | Included | Included |
Query Language | Not included | Included | Included | Included |
Anti-virus Signature Initial Full Scan | Not included | Included | Included | Included |
Anti-virus Signature Scheduled Scan | Not included | Not included | Not included | Not included |
Anti-virus Signature Scan on download | Not included | Included | Included | Included |
Investigate IP Address Search | Not included | Included | Included | Included |
Investigate User Search | Not included | Included | Included | Included |
Investigate Hash Search | Not included | Included | Included | Included |
USB Device Control | Not included | Included | Included | Included |
Full Data Retention (Days) | 0 | 30 | 30 | 30 |
Incident Data Retention (Days) | 180 | 180 | 180 | 180 |
Query operating system for information | Not included | Not included | Included | Included |
Log of files modified | Not included | Not included | Not included | Not included |
Sandbox | Not included | Included | Included | Included |
Controlled Release of new versions | Not included | Included | Included | Included |
To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.