Compare Zercurity vs Comodo Endpoint vs CarbonBlack

More Information More Information More Information

Crozscore:

51%
what is this?
14%
interest falling

Crozscore:

94%
what is this?
58%
interest rising

Crozscore:

82%
what is this?
42%
no significant changes
Zercurity screenshot view 3 more Comodo Endpoint screenshot CarbonBlack screenshot view 5 more

Software Description:

Zercurity is a hosted service. It provides a secure, managed and centralized platform. It monitors your IT infrastructure from a security and compliance perspective. Zercurity does this in three ways;

Using an advanced SQL interface. Allowing you to query your infrastructure just like a database.

Application white/blacklisting. Zercurity will automatically block unknown or malicious applications.

Compliance checks. Write rules to check that your policies are being adhered too.

Software Description:

Comodo Advanced Endpoint Security software brings 7 layers of defense - antivirus, firewall, web URL filtering, host intrusion prevention, auto-sandbox (containment), file reputation and viruscope (behavioral analysis) - together under a single offering for customers of all sizes, to protect them from both known and unknown threats.

Software Description:

One of the most used products of this service provider is CB Defense which is one of the strongest security solutions for data centers and critical systems.

Carbon Black’s security solution is based on the central whitelist database, which consists of a registry of trusted software and their classifications/ratings. CB Defense provides its users with transparent anti-virus solution, a low impact on their systems, and provides lots of useful reporting data. The antivirus, along with EDR is presented in one cloud-delivered platform that stops all kinds of malware and ransomware.

CB Defense catches all unfiltered data from the endpoint and analyzes events in context to reveal arising threats that other platforms could miss. Unlike traditional antivirus, there are no lags behind emerging attacks and thanks to the automation of operational tasks, manual efforts are reduced to the minimum.

Features:

  • File Transfer
  • File Sharing
  • External Integrations

Features:

  • Anti-Virus

Features:

  • Dashboard
  • Notifications
  • Data Export
  • External Integrations
  • API
  • Firewall
  • Anti-Virus

Summary:

  • Monitor your infrastructure for policy non-compliance, in real-time.

Summary:

    No key features associated with this application.

Summary:

  • Prevents attacks automatically, online and offline

  • Stops malware, ransomware, and non-malware attacks

  • Blocks emerging, never-before-seen attacks that other solutions miss

  • Records and stores the complete data record of every endpoint, even if it is offline

  • Visualizes every stage of the attack with easy-to-follow attack chain

  • Uncovers root cause in minutes to quickly address gaps in your defenses

  • Continuous and centralized recording provides complete visibility into the attack

  • Quickly visualize the attack chain to see exactly what attackers are trying to do

  • Creates a secure shell to any endpoint on or off the network to address critical issues

  • Deploys in 15 minutes or less, with less than 1% CPU and disk space per endpoint

3-year license

$420.00
3-year license
Included in plan:
  • Single endpoint installation
  • Built entirely on open APIs and features easy integration with other tools

FAQs:

    Does this service offer guides, tutorials and or customer support?
  • Yes, we have a docs section for getting up to speed.

  • What is this service generally used for?
  • Managing the security, policies, and compliance of your assets and devices within an organization.

  • Does this service offer multi-user capability (e.g. teams)?
  • Yes.

  • Does this service offer an API?
  • Yes.

  • What platforms does this service support?
  • This is a web-based application.

  • What are some applications this service is commonly used in tandem with?
  • OsQuery, anti-virus.

  • Who are the main user groups of this service?
  • Zercurity is built for your organisation. Small or large. You are required by law, to safeguard your customer data. Without exception. This starts by having strong an understanding of your compliance and security posture.

FAQs:

    No FAQs associated with this application.

FAQs:

    Does this service offer guides, tutorials and or customer support?
  • Support: Webinars, Training, Community Support, Phone Support, Email Support.

  • Does this service integrate with any other apps?
  • Integrations: Cyphort, Corvil, ServiceNow.

  • What is this service generally used for?
  • This service is used for anti-malware protection.

  • Does this service offer multi-user capability (e.g. teams)?
  • No.

  • Does this service offer an API?
  • Yes, it offers RESTful API.

  • Who are the main user groups of this service?
  • Main users of CarbonBlack are enterprise-level organizations.

  • What platforms does this service support?
  • This service supports WIndows, MacOS, Red Hat Linux, and CentOS.

Publisher:

Founded:
-
Based in:
-
Employees:
-
Likes:
Followers:

Publisher:

Founded:
-
Based in:
Clifton
Employees:
1001-5000
Likes:
Followers:

Publisher:

Founded:
-
Based in:
Southborough
Employees:
51-200
Likes:
Followers:

Other:

Who uses Zercurity
  • SMEs
Desktop Platforms:
  • Web App
Languages:
English
Regional Restrictions:
No restrictions.

Other:

Who uses Comodo Endpoint
  • Personal
  • Startups
  • Agencies
  • Enterprises
Desktop Platforms:
  • Windows
Languages:
English
Regional Restrictions:
No restrictions.

Other:

Who uses CarbonBlack
  • SMEs
  • Enterprises
Desktop Platforms:
  • Web App
Languages:
English
Regional Restrictions:
No restrictions.
Back to top