Carbon Black


A lightweight sensor runs in the background and continuously collects endpoint activity information including process executions, binary loads, network connections, registry and file modifications, cross-process events and more.




Our analytics engine combs through your computers’ activity data using the latest threat intelligence to determine if a threat is on your computer.



Once a potential threat has been identified an internal investigation begins. Our investigation combines human intelligence and the use of 3rd party threat research to determine if the threat is valid or a false positive.


  Notify You

Once we’ve confirmed the threat is valid you’ll be immediately notified so that further action can be taken.


Gain Visibility Into What Threats Are On Your Network