Technology Alliance Partners

Back Home

The Carbon Black Connect Partner Program supports vendor interoperability to help customers build next-generation security infrastructures. Leveraging our Open APIs, Carbon Black has partnered with industry leaders to create integrated solutions that provide end-to-end protection against advanced threats.

As a member of the Carbon Black Connect program, partners can submit their products to Carbon Black for certification and promote interoperability across security solutions.

Partner with Us
If you are interested in becoming a Carbon Black Connect partner, please contact us at alliances@carbonblack.com

Technology Alliance Partner Listing

Alert Logic

Alert Logic, the leader in security and compliance solutions for the cloud, provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. For more information, please visit www.alertlogic.com.

Alien Vault

AlienVault’s mission is to enable organizations with limited resources to accelerate and simplify their ability to detect and respond to the growing landscape of cyber threats. Powered by threat intelligence from AlienVault Labs and the AlienVault Open Threat Exchange—the world’s largest crowd‐sourced threat intelligence network — AlienVault USM delivers a unified, simple and affordable solution for threat detection, incident response and compliance management. For more information, visit: alienvault.com

Anomali

Anomali delivers earlier detection and identification of adversaries in your organization’s network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.

To learn more, visit www.anomali.com

Attivo Networks

Attivo Networks® is the leader in deception for cybersecurity defense, providing real-time detection and forensic analysis of in-network threats and solutions for continuous threat management and incident response. The Attivo ThreatMatrix Deception Platform detects stolen credentials, ransomware, man-in-the-middle, and targeted attacks within user networks, data centers, clouds, SCADA, and IoT environments by deceiving an attacker into revealing themselves. Comprehensive attack analysis, actionable alerts, and 3rd party integrations empower accelerated incident response and staff resource efficiency. 

Find out more at www.attivonetworks.com

Check Point

Check Point Software Technologies is the largest pure‐play security vendor globally, provides industry‐leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes. For more information, please visit www.checkpoint.com

Core Security

Core Security provides market-leading, threat-aware, identity, access and vulnerability management solutions that provide actionable intelligence and context needed to manage security risks across the enterprise. Solutions include multi-factor authentication, provisioning, Identity Governance and Administration (IGA), Identity and Access Intelligence (IAI), and Vulnerability Management (VM). To learn more visit www.coresecurity.com

Corvil

Corvil safeguards business in a digital world. Corvil Security Analytics is the most granular real-time network threat detection and forensics platform available. All attacks traverse the network at some point. Corvil identifies malicious activity as it is happening and provides organizations with unequaled visibility and context to detect threats faster, to respond faster, and to streamline forensic investigations. Every packet, every microsecond – live and retrospective.

For more information visit: www.corvil.com

Cyphort

The Cyphort Advanced Threat Defense Platform detects advanced malware, prioritizes remediation and automates containment. Cyphort customers benefit from early and reliable detection and fast remediation of breaches across their infrastructure. Cyphorts’ unique approach combines best‐in‐class malware detection with the knowledge of threat severity, value of targeted user and assets, and malware lifecycle to prioritize threats that matter to you while suppressing the noise. For more information, please visit www.cyphort.com

Demisto

Demisto helps Security Operations Centers scale their human resources, improve incident response times, and capture evidence while working to solve problems collaboratively. Demisto Enterprise is the first comprehensive, Bot-powered Security ChatOps Platform to combine intelligent automation with collaboration. Demisto’s intelligent automation is powered by DBot which works with teams to automate playbooks, correlate artifacts, enable information sharing and auto document the entire incident lifecycle. Demisto is backed by Accel and has offices in Silicon Valley and Tel Aviv.  For more information visit www.demisto.com

Df Labs

DFLabs is a recognized global leader in cyber incident response automation and orchestration. IncMan – Cyber Incidents Under Control – is the flagship product, adopted by Fortune 500 and Global 2000 organizations worldwide. DFLabs has operations in North America, Europe, Middle East, and Asia with US headquarters in Boston, MA and World headquarters in Milano, Italy. For more information visit: http://www.dflabs.com

E8 Security

E8 Security is transforming security operations by dramatically reducing the amount of time it takes to identify unknown cyberthreats inside the network. E8’s behavioral intelligence platform can measure an organization’s risk to a data breach and identify the early warnings signs when critical resources are being targeted. For more information, please visit http://e8security.com/

Exabeam

Exabeam is a user behavior analytics solution that leverages existing log data to quickly detect modern cyber attacks, prioritize security incidents, and accelerate effective response. Exabeam’s Stateful User Tracking automatically creates a complete timeline of every event and anomaly tied to an attack ‐‐ across devices, IP addresses, and credentials and uses that timeline to assess risk and automate many tasks of incident response. As a result, Exabeam not only improves security, but also transforms SOC efficiency and productivity. By operating on existing data and requiring no agents or network taps, Exabeam delivers value within hours, not weeks. For more information, please visit www.exabeam.com

Facebook ThreatExchange

Learn about threats. Share threat information back. Everyone gets more secure. The Facebook ThreatExchange platform enables participating organizations to share threat data using a convenient, structured, and easy‐to‐use API that provides privacy controls to enable sharing with only desired groups. For more information and apply to join, visit: https://developers.facebook.com/products/threat‐exchange

ForeScout

ForeScout Technologies, Inc. helps make the invisible visible. Our company provides Global 2000 enterprises and government entities with agentless visibility and control of traditional and IoT devices the instant they connect to the network. Our technology integrates with disparate security tools to help organizations accelerate incident response, break down silos, automate workflows and optimize existing investments. For more information visit www.forescout.com.

Fortinet

Fortinet (NASDAQ: FTNT) protects the most valuable assets of some of the largest enterprise, service provider and government organizations across the globe. They are strengthened by the industry’s highest level of threat research, intelligence and analytics. More than 210,000 customers worldwide, including some of the largest and most complex organizations, trust Fortinet to protect their brands.

IBM Security Security

IBM’s security platform provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world’s broadest security research and development, and delivery organizations. For more information, please visit www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog. 

InfoBlox

Infoblox delivers network control solutions, the fundamental technology that connects end users, devices, and networks. These solutions enable more than 8,100 enterprises and service providers to transform, secure, and scale complex networks. Infoblox helps take the burden of complex network control out of human hands, reduce costs, and increase security, accuracy, and uptime. Infoblox is headquartered in Santa Clara, California, and has operations in over 25 countries. For more information, visit www.infoblox.com

Lastline

The Lastline Breach Detection Platform provides comprehensive detection of advanced and evasive threats across your entire enterprise — Operating systems (Windows, Mac OS X, and Android), physical and virtual hosts, services, users, network infrastructure and Web, email, file, and mobile applications. The culmination of more than ten years of R&D specifically focused on advanced and evasive breach weaponry and tactics, Lastline’s flexible software‐based platform allows organizations to scale their breach defenses on a predictable basis, from a single location to any number of remote, branch, and mobile offices. For more information, please visit www.lastline.com

LogRhythm

LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s award-winning platform unifies next-generation SIEM, log management, network and endpoint forensics, and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides innovative compliance automation and assurance, and enhanced IT intelligence. For more information, please visit www.logrhythm.com

Lumeta

Today’s large enterprises function in an ever-expanding IP space where it can be difficult to have a handle on every network connection, host, and active IP on the network. Because of the constant state of change, the exponentially growing number of connected devices in the enterprise can fall outside of the watchful eye of security management where serious threats can emerge.

Microsoft

Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services, devices and solutions that help people and businesses realize their full potential.

Netskope

Netskope is the leader in cloud security. Using patented technology, Netskope’s cloud-scale security platform provides context-aware governance of all cloud usage in the enterprise in real-time, whether accessed from the corporate network, remote, or from a mobile device. With granular security policies, the most advanced cloud DLP, and unmatched breadth of workflows, Netskope is trusted by the largest companies in the world. For more information visit www.netskope.com

Niara

Niara’s behavioral analytics platform automates the detection of attacks and risky behaviors inside an organization and dramatically reduces the time and skill needed to investigate and respond to security events. Headquartered in Sunnyvale, Calif., the company is backed by NEA, Index Ventures and Venrock. For more information, visit www.niara.com.

Niddel

Niddel is the most innovative threat hunting system in the industry. Niddel Magnet is truly an automated end to end solution on threat hunting from collection to operational use, and doing all of the hard work analysts would do when it comes to hunting for threats at scale. For more information please visit www.niddel.com

Palo Alto Networks

Palo Alto Networks is the next‐generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game‐changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization’s most valuable assets. For more information, please visit www.paloaltonetworks.com

Phantom

Phantom, an award-winning company, automates and orchestrates key stages of security operations from prevention to triage and resolution; delivering dramatic increases in productivity and effectiveness. Ranging from simple automation to fully autonomous response, Phantom lets you choose the best balance that fits your organization’s needs while increasing security and accelerating security operations. Focused on closing the security gap by enabling enterprise security operations to be smarter, faster and stronger, Phantom provides the flexibility to connect in-house and third-party systems into one consolidated, integrated and extensible platform.

For more information visit: www.phantom.us.

PhishMe

PhishMe is the leading provider of human-focused phishing defense solutions for organizations concerned about their susceptibility to today’s top attack vector — spear phishing. PhishMe’s intelligence-driven platform turns employees into an active line of defense by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. For more information visit www.phishme.com

ProtectWise

ProtectWise Grid captures high fidelity network traffic, creates a lasting memory for the network, and delivers real time and retrospective alerting and analysis in a rich, innovative visualizer. By harnessing the power of the cloud, The ProtectWise rovides an integrated solution with complete detection and visibility of enterprise threats and accelerated incident response.

For more information, visit www.protectwise.com.

Red Hat

Red Hat is the world’s leading provider of open source software solutions, using a community-powered approach to reliable and high-performing cloud, Linux, middleware, storage and virtualization technologies. Red Hat also offers award-winning support, training, and consulting services. As a connective hub in a global network of enterprises, partners, and open source communities, Red Hat helps create relevant, innovative technologies that liberate resources for growth and prepare customers for the future of IT.

ServiceNow

ServiceNow is changing the way people work. With a service‑orientation toward the activities, tasks and processes that make up day‑to‑day work life, we help the modern enterprise operate faster and be more scalable than ever before. ServiceNow enables service management for every department in the enterprise including IT, human resources, facilities, field service and more. To find out how, visit www.servicenow.com.

Splunk Enterprise

Splunk Enterprise is the industry‐leading platform for machine data. Splunk Enterprise provides an easy, fast and secure way to analyze the massive streams of machine data generated by your IT systems and technology infrastructure—whether it’s physical, virtual or in the cloud. Use Splunk Enterprise to troubleshoot problems and investigate security incidents in minutes, not hours or days. Monitor your end‐to‐end infrastructure to avoid service degradation or outages. Gain operational intelligence with real‐time visibility and critical insights into customer experience, transactions and other key business metrics. Splunk Enterprise makes your machine data accessible, usable and valuable across the organization. For more information please visit www.splunk.com

Sqrrl

Sqrrl is the security analytics company that enables organizations to target, hunt, and disrupt advanced cyber threats. Sqrrl’s industry-leading threat detection and response platform unites threat hunting, behavioral analytics, and incident investigation capabilities in an integrated solution. Sqrrl’s unique platform approach enables security analysts to discover threats faster and reduces the time and resources required to investigate them.

For more information visit www.sqrrl.com

Swimlane

Swimlane delivers innovative and practical IT security solutions to organizations struggling with alert fatigue, vendor proliferation and chronic staffing shortages. Swimlane is at the forefront of the growing market for security orchestration, automation and reporting. Its solutions automate and organize security processes in repeatable ways to maximize available resources and accelerate incident response. For more information visit www.swimlane.com

Symantec

Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps businesses, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. For additional information, please visit www.symantec.com

Threat Connect

ThreatConnect, Inc. is the leading provider of advanced threat intelligence products and services including ThreatConnect, the most comprehensive Threat Intelligence Platform (TIP) on the market. ThreatConnect delivers a single platform in the cloud and on‐premises to effectively aggregate, analyze, and act to counter sophisticated cyber‐attacks. Leveraging advanced analytics capabilities ThreatConnect offers a superior understanding of relevant cyber threats to business operations. To register for a free ThreatConnect account, or to learn more about our products and services, visit: www.threatconnect.com/

ThreatQuotient

ThreatQuotient provides ThreatQ, a Threat Intelligence Platform (TIP) that automates, manages, and operationalizes critical threat intelligence, enabling security teams to collaborate and make more informed decisions regarding their security posture. ThreatQ is a cornerstone platform for threat intelligence providing security teams with much‐needed contextual information regarding indicators of compromise (IOC), attack tracking and adversary activity. ThreatQ enables cyber security teams to be smarter, quicker and respond faster to adversary activity in minutes, not hours or weeks. For more information, visit: www.threatq.com

Toshiba Commerce

Toshiba Global Commerce Solutions is retail’s first choice for integrated in‐store solutions. The leading supplier of point‐of‐sale systems with a worldwide install base larger than any three major competitors combined, Toshiba is committed to delivering innovative commerce solutions that transform checkout, provide seamless consumer interactions and optimize retail operations. Toshiba, along with our global team of dedicated business partners, provides end‐to‐end solutions, service and support that help clients meet virtually any retail technology need. For more information, visit www.toshibacommerce.com

Vectra Networks

Vectra Networks is the leader in real-time detection of in-progress cyber attacks. The company’s automated threat management solution continuously monitors internal network traffic to pinpoint cyber attacks as they happen. It then automatically correlates threats against hosts that are under attack and provides unique context about what attackers are doing so organizations can quickly prevent or mitigate loss. Vectra prioritizes attacks that pose the greatest business risk, enabling organizations to make rapid decisions on where to focus time and resources. Visit us at www.vectranetworks.com.

VMRay

VMRay delivers 3rd generation threat analysis and detection using advanced agentless hypervisor-based dynamic analysis. The VMRay Analyzer is platform independent and highly scalable, the result of a decade of R&D by Carsten Willems and Ralf Hund, two of the world’s leading experts on dynamic malware analysis. Based in Bochum, Germany, VMRay works through channel partners and OEMs to serve leading enterprises around the world. To learn more, visit https://www.vmray.com/.

VMWare

VMware, a global leader in cloud infrastructure and business mobility, accelerates our customers’ digital transformation journey by enabling enterprises to master a software-defined approach to business and IT. With VMware solutions, organizations are improving business agility by modernizing data centers, driving innovation with modern data and apps, creating exceptional experiences by mobilizing everything, and safeguarding customer trust with a defense-in-depth approach to cybersecurity. VMware is a member of the Dell Technologies family of businesses. http://www.vmware.com/

Wombat Security Technologies

Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. Wombat’s training solutions help Fortune 1000 and Global 2000 reduce successful phishing attacks and malware infections. For more information visit www.wombatsecurity.com