Cb Protection

The market-leading application control solution

Back Home

Cb Protection provides the most proven application control solution for enterprise endpoints and critical systems. With Cb Protection, IT, compliance, infrastructure, and security teams establish automated software execution controls and protection policies that safeguard corporate and customer data.

Cb Protection works with existing software distribution systems and reputation services to automate approval of trusted software and eliminate whitelist management. This level of control reduces the attack surface of highly-sensitive and targeted systems such as desktops, laptops, servers, point-of-sale devices, and others to eliminate system downtime due to malware and ensure regulatory compliance.

Cb Protection
Cb Protection

Lock down endpoints and systems

  • Stops all file-based and next-gen attacks (memory-based PowerShell, script-based, and obfuscated malware)
  • Protects laptops, desktops, tablets, servers, public and private cloud infrastructures, and virtual data centers

Prevent unwanted change

  • Allow only approved software to run; blocks everything else
  • Automate software approvals and updates via IT and cloud-driven policies
  • Control use of removable USB devices

Achieve continuous compliance

  • Continuous and centralized recording for real-time visibility
  • Remotely investigate and remediate any endpoint, from anywhere
  • Satisfy mandates for PCI DSS, HIPAA/HITECH, SOX, NERC CIP, NIST 800-53, and other regulatory frameworks

Consolidate security agents

  • Eliminate traditional antivirus
  • Replace file integrity monitoring and control
  • Retire network-based file detonation services

Low-touch whitelisting

  • Integrate with software distribution systems to automate approval and reduce friction
  • Check all software against to ensure trust ratings and validity
  • Allow updates to previously-approved software without additional approvals

Integrate & automate

  • Partners with 40+ SIEM, network firewall, threat analytics, and orchestration vendors
  • Leverage real-time attack intelligence collected from the global Carbon Black community
  • Open platform offers RESTful APIs

Enterprise ready

  • Windows, Mac, and Linux support
  • Enhanced RBAC support
  • Global, unified management

Related Resources

Video: Cb Protection

eBook: Application Control for Dummies

Data Sheet: Cb Protection

Analyst Report: Gartner Market Guide for Application Control