VMware Carbon Black Cloud™ Endpoint

VMware Carbon Black Cloud™ Endpoint.

Transform your security with native endpoint protection into a new one that adapts to your needs.


– VMware Carbon Black Cloud™ endpoint protection.

Consolidate multiple endpoint security resources and operate faster and more efficiently with a single native cloud platform.


  • Endpoint Standard.

Latest generation antivirus and behavioral EDR.

  • Managed Detection.

Managed alert monitoring and triage.

  • Audit and Remediation.

Avaliation and correction of devices in real time.

  • Business EDR.

Caça e contenção de ameaças.

Principais features

Auditoria de Conformidade
Gestão de Consentimento
Monitoramento em Tempo Real
Relatórios de Segurança
Análise de Risco

Descripción completa

Request a quote

  • Modernize your endpoint protection.
Addresses legacies of prevention of death as organizations exposed. Cybercriminals constantly update their statistics and obscure their actions in tools and processes.you are common You need an endpoint platform that helps identify small fluctuations that hide malicious attacks and adapt to prevention in response.


  • The invaders ignore traditional endpoint security.

Most of the blade cyber attacks now involve tactics such as lateral movement, wing jumping, and destructive attacks. Advanced hacking resources and services to sell on the dark web aggravating the problem. These realities represent a tremendous risk for people with decentralized systems that protect high-value assets, including money, intellectual property and state secrets.


  • Reconhecendo or Bom, or Mau eo Cinza.

While other endpoint security products collect only a set of data related to what is known as ruim, we continually collect endpoint activity data because invaders intentionally try to appear normal to hide their attacks. Analyze invading behavior patterns to detect and disrupt attacks never seen before.


  • Simplify your insurance policy.

VMware Carbon Black Cloud consolidates multiple endpoint security resources using one endpoint agent and console, eliminating management headaches and the console overhead needed to respond to possible incidents. Minimize downtime when responding to incidents and return critical CPU cycles to the business.

Request a quote

By clicking "Submit," you agree to allow Software.com.br to contact you using the information provided to send quotes and communications related to your order. For more details on how we protect and use your data, please see our Privacy Policy. Política de privacidad y Términos de uso

Productos relacionados

StegoHunt is an industry-leading software tool, comprising the StegoAnalyst and StegoBreak tools, which can be used to discover the presence of hidden data activity in files and applications.

  • Quickly identify data obfuscation activity in an investigation by scanning files, captured memory images, and, for active systems, active processes;
  • Find evidence of steganography programs using YARA WetStone rules and hash sets provided in the monthly dataset releases;
  • Identify suspicious carrier files by detecting program data, signatures, and structural and static anomalies;
  • Use multiple operational discovery modes for transport file discovery, including directories, drives, files, and drive images;
  • Relate and capture evidence for presentations to management or the court.


Serv-U FTP software allows for remote file transfer. FTP, short for File Transfer Protocol, is a very fast and efficient way to transfer files and is currently one of the most widely used on the Internet.

Main features

  • File transfer via FTP and FTPS;
  • Fast and easy mobile and web file transfers;
  • Transfer multiple large files with ease;
  • Easy administration and management of file transfers;
  • The secure gateway helps prevent data from being stored on DMZ networks;
  • Easily manage file transfer settings and permissions.


Kiwi Syslog software receives, logs, displays, forwards, and alerts syslog, SNMP trap, and Windows event log messages from devices such as routers, switches, Linux and Unix hosts, and Windows servers.

Centralize and simplify log message management across network devices and servers

Main features

  • Centrally manage Syslog messages, SNMP traps, and Windows event logs;
  • Receive real-time alerts based on critical events;
  • Automatically respond to Syslog messages;
  • Store and archive records to aid regulatory compliance;
  • View Syslog data anywhere with secure web access.


Gargoyle Investigator is a suite of solutions designed for advanced malware discovery for forensic investigators. It is designed for forensic laboratories, law enforcement agencies, field investigators, and advanced private investigators.

DameWare Remote Support enables fast and easy remote access to Windows, Linux, and Mac OS X desktops, laptops, and servers. Support thousands of end users without leaving your desk and save time completing administration tasks remotely.

Main features

  • Fast and secure remote control;
  • Remote assistance anytime, anywhere;
  • Simplify Windows management;
  • Integrated remote administration tools;
  • Offer remote support from iOS and Android devices;
  • Remotely manage Active Directory environments.


By clicking "Submit," you agree to allow Software.com.br to contact you using the information provided to send quotes and communications related to your order. For more details on how we protect and use your data, please see our Privacy Policy. Política de privacidad y Términos de uso

en_US