- Home
- Endpoint Security
- Endpoint Detection and Response
- Broadcom Carbon Black
Broadcom Carbon Black
Endpoint security platform providing threat detection, prevention, and response

Broadcom Carbon Black
Endpoint security platform providing threat detection, prevention, and response
Broadcom Carbon Black Description
Carbon Black is an endpoint security solution that provides visibility and protection across endpoints, networks, and workloads. The platform offers threat prevention capabilities with customizable controls and threat detection and response functionality. The solution collects high-fidelity data from monitored systems to provide context for security events and incidents. It includes capabilities for detecting and responding to threats, with features designed to contain impact and prevent repeated attacks. Carbon Black operates as a cloud-managed platform with agent-based deployment on endpoints and workloads. The system provides visibility into activities occurring on laptops and other devices, enabling security teams to investigate and respond to incidents. The platform supports both threat prevention and threat detection and response use cases. Organizations can customize security policies and controls to adapt to evolving threats. The solution aims to reduce time spent on security incidents through automated detection and response capabilities. Carbon Black is available through Broadcom partners and supports deployment across endpoint and workload environments. The platform includes cloud workload protection capabilities for securing cloud-based infrastructure.
Broadcom Carbon Black FAQ
Common questions about Broadcom Carbon Black including features, pricing, alternatives, and user reviews.
Broadcom Carbon Black is Endpoint security platform providing threat detection, prevention, and response developed by Broadcom. It is a Endpoint Security solution designed to help security teams with Cloud Native, Cloud Security, Endpoint Detection And Response.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox