Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Carbon Black

Carbon Black has designed the most complete next-gen endpoint-security platform, enabling organizations to stop the most attacks, see every threat, close security gaps, and evolve their defenses. The Cb Endpoint Security Platform helps organizations of all sizes replace legacy antivirus technology, lock down systems, and arm incident response teams with advanced tools to proactively hunt down threats. Today, Carbon Black has approximately 2,000 worldwide customers, including 25 of the Fortune 100 and more than 600 employees. Carbon Black was voted Best Endpoint Protection by security professionals in the SANS Institute's Best of 2015 Awards.

Our Website: http://www.carbonblack.com


Latest Content From Carbon Black

E-Book: How to Combat Ransomware

by Carbon BlackDec 05, 2019

Ransomware isn't new—in fact, it's over 30 years old. Attacks date back as far as 1989 and have been the most pervasive cyber threat since 2005, with a dramatic spike in recent years. The resulting costs to targeted businesses are soaring. In fact, according to the 2018 Verizon Data Breach Investigations Report, ransomware has moved from the 22nd most common variety of malware in 2014 to the most common variety in 2018.

It is estimated that, by the end of this year, ransomware will attack a business once every 14 seconds.

To help you understand this threat, what it looks like in your environment, and the role Carbon Black can play in helping to combat it, take a look at this Ransomware issue of our Global Threats eBook series.


E-Book: How to Combat Nation-State Attacks

by Carbon BlackDec 05, 2019

Nation-state attacks are sophisticated cyberthreats from adversaries working directly or indirectly for their own government. Their motivation? To place their nation in a better position against their political enemies. The targets of nation-state attacks range from private hospitals and financial institutions to election infrastructures, making them one of the largest global security threats today.

To help you understand this threat, what it looks like in your environment, and the role VMware Carbon Black can play in helping to combat it, take a look at this Nation-State Attacks issue of our Global Threats eBook series.


E-Book: MITRE ATT&CK WORKBOOK

by Carbon BlackSep 27, 2019

Divided into 12 Tactics, ATT&CK defines roughly 300 Techniques (TIDs) to define how an adversary can achieve each tactic. The intent of this workbook is to provide a starting point for organizations looking to map to the ATT&CK Framework or simply better their security posture in 3 simple steps. Download our workbook today to learn more!


E-Book: How to Combat Spear Phishing

by Carbon BlackSep 27, 2019

Spear Phishing is one of the most common and most effective cyberattack vectors used today. Delivered through email, spear phishing campaigns aim either to infect devices with malware, or to steal important information like credentials and bank numbers.

To help you understand this threat, what it looks like in your environment, and the role Carbon Black can play in helping to combat it, take a look at this Spear Phishing issue of our Threats on the Rise eBook series.


E-Book: How to Combat Island Hopping

by Carbon BlackSep 27, 2019

More and more, cybercriminals are targeting smaller organizations as a means to attack larger ones. Attackers are exploiting vulnerabilities in the defenses of these less sophisticated companies and using their affiliation with the target as a point of entry. This is known as "Island Hopping."

To help you understand this threat, what it looks like in your environment, and the role Carbon Black can play in helping to combat it, take a look at this Island Hopping issue of our Threats on the Rise eBook series.


E-Book: How to Combat Fileless Attacks

by Carbon BlackSep 27, 2019

A fileless attack ("memory-based" or "living-off-the-land," for example) is one in which an attacker uses existing software, allowed applications and authorized protocols to carry out malicious activities. More and more attackers are moving away from traditional malware—in fact, 60% of today's attacks involve fileless techniques.These attacks are capable of gaining control of computers without using traditional executable files as a first level of attack.

To help you understand this threat, what it looks like in your environment, and the role Carbon Black can play in helping to combat it, take a look at this Fileless Attacks issue of our Threats on the Rise eBook series.


Research Report: Healthcare Cyber Heists in 2019

by Carbon BlackSep 27, 2019

Healthcare organizations are increasingly being targeted by cyberattacks due to the gold mine of personal data they possess. The phrase, "First, do no harm," is commonly referenced among medical professionals to reflect the utmost importance placed on patient care. The phrase is often attributed to the original version of the Hippocratic oath, though its true derivation is, in fact, unknown. Regardless of the etymology, the sentiment is clear: above all else, a healthcare professional should consider patients' well being. And in 2019, "well being" has evolved to include privacy and cybersecurity concerns.

The potential, real-world effect these attacks can have is substantial. (See the WannaCry and NotPeyta ransomware attacks of 2017.) Cyberattackers now have the ability to access, steal and sell patient information on the dark web. Beyond that, they have the ability to shut down a hospital's access to critical systems and patient records, making effective patient care virtually impossible.

And, with increased adoption of medical and IoT devices, the surface area for healthcare attacks is becoming even larger. The problem has been further compounded by limited cybersecurity staffing and stagnant cybersecurity budgets in the industry.

Download your copy of Healthcare Cyber Heists in 2019 to learn more about the challenges faced by the healthcare industry at large, and what you can look out for to protect your business no matter what vertical you may find yourself in.


Whitepaper: Global Threat Report: Year of the Next-Gen Cyberattack

by Carbon BlackApr 23, 2019

While Crytomining, Fileless Attacks, Ransomware and Commodity Malware are still causing havoc, a new breed of cyberattacks (fueled by geopolitical is emerging).

Download this report to learn more about cyberattacks.


Whitepaper: The Total Economic Impact™ Of The CB Predictive Security Cloud

by Carbon BlackApr 23, 2019

Your endpoints are one of the most targeted assets in your organization. In 2017 alone, more than 50% of organizations experienced a data breach of some kind. A new approach to endpoint security is needed.

According to a recent Forrester study, organizations who replace traditional endpoint security with the CB Predictive Security Cloud (PSC) can realize significant business benefits and cost savings. Forrester conducted interviews with seven Carbon Black customers who moved from traditional, signature based antivirus to next-generation antivirus (NGAV) and endpoint detection and response (EDR) on the PSC.

Download the study to learn how switching to the CB Predictive Security Cloud can benefit your organization and lead to a 261% return on investment over 3 years.


Whitepaper: SANS Review: Securing Your Endpoints with Carbon Black

by Carbon BlackApr 23, 2019

The threat landscape is worsening every day. To combat this, organizations have begun adding more and more tools-leading to overwhelming complexity in security stacks.

Read the SANS review of Carbon Black's Predictive Security Cloud to learn how Carbon Black's platform provides a solution that simplifies endpoint security, while providing protection from advanced attacks.

"In the SANS "Endpoint Protection and Response" survey1 from 2018, 42 percent of respondents indicated at least one of their endpoints had been compromised, and 20 percent didn't know if any endpoints had been compromised at all. Almost 20 percent found issues by proactively hunting, and more than 15 percent also stated they only discovered endpoint compromise via third-party notification. The last statistic tells the real story here: Many endpoint security tools and tactics in use today are inadequate, and we really need better prevention and detection tools right now."