Resource Library

Featured Assets

Data Sheet: Cb Defense

Traditional antivirus (AV) just doesn’t cut it anymore. From ransomware that holds intellectual property hostage to sophisticated malware-less attacks that exploit PowerShell, scripting, and memory, endpoints are facing more security risk than ever before. As a result, companies have set their sights on the next generation of lightweight AV solutions.

Stop Ransomware Before It Starts

Ransomware is on the rise. According to the FBI, an average of 4,000 ransomware attacks happen per day. Today’s businesses are routinely choosing to pay hefty ransoms rather than lose access to their intellectual property, patient records, credit card information, and other valuable business data. Simply put, targeted businesses are paying ransoms in order to...

Data Sheet: Cb Inspection

Cb Inspection enhances the Cb Collective Defense Cloud by adding multiple forms of dynamic and static analysis to help defenders better understand the risk of new and unique files. Catch attacks that network detection misses by inspecting every file, regardless of how it arrives on your endpoints. Good software is allowed to run, bad software is blocked and unknown…

Threat Advisor: Stop Ransomware with Carbon Black

Every year, CryptoLocker and its variants, collectively known as Ransomware, target new verticals and find fresh victims. Ransomware makes itself known by presenting users with a message indicating that their critical files have been encrypted and offering to decrypt the files for a fee, usually in bitcoin, US Dollars, or Euros. The attackers threaten to delete the private…

Get the Forrester Wave Endpoint Security Report

Carbon Black: Named a “Leader” in Forrester Wave Endpoint Security Report According to The Forrester Wave™: Endpoint Security Suites, Q4 2016 report, “antivirus technologies have become less effective at protecting employee endpoints and servers. Numerous competing technology vendors have risen up to take aim at the stagnant antivirus market as a result.” As one of...

Filter Assets by Type

Case Studies Data Sheets eBooks Infographics Reports White Papers Threat Advisors