Carbon Black


  Collection

A lightweight sensor runs in the background and continuously collects endpoint activity information including process executions, binary loads, network connections, registry and file modifications, cross-process events and more.

    

    .

  Analytics

Our analytics engine combs through your computers’ activity data using the latest threat intelligence to determine if a threat is on your computer.

    .

  Investigation

Once a potential threat has been identified an internal investigation begins. Our investigation combines human intelligence and the use of 3rd party threat research to determine if the threat is valid or a false positive.

    .

  Notify You

Once we’ve confirmed the threat is valid you’ll be immediately notified so that further action can be taken.

 


Gain Visibility Into What Threats Are On Your Network


Process_Map_746x508

Process_Timeline_1176x294