Image may not exactly match the product.

VMware Carbon Black Cloud Workload - Subscription License (1 Year) + 1 Year VMware SaaS Production Support and Subscription - 1 CPU - CBW-A1LSC-12PT0-C1S

SKU:
CBW-A1LSC-12PT0-C1S
Shipping:
Calculated at Checkout
$800.00 $764.52
(You save $35.48 )

Image may not exactly match the product.

In-Stock

$800.00 $764.52
(You save $35.48 )
Availability:
In Stock. Ships/Emailed Within 1-2 Business Days

Condition:
New

Done shopping? You can create a PDF of your cart for later or for your purchasing dept! Details at checkout.

Share:
  • Simplify your security stack
    The VMware Carbon Black Cloud consolidates multiple endpoint security capabilities using one endpoint agent and console, cutting the management headaches and console thrashing required when responding to potential incidents. You'll also minimize downtime responding to incidents and return critical CPU cycles to the business, while improving endpoint performance.
  • One platform for your endpoint security needs
    The VMware Carbon Black Cloud consolidates multiple endpoint security capabilities using one agent and console, helping you operate faster and more effectively.
  • Managed alert monitoring and triage
    Gain round-the-clock eyes on glass from the SOC of expert analysts, who provide validation, context into root cause, and automated monthly executive reporting.
  • Real-time device assessment and remediation
    Easily audit current system state to track and harden the security posture of all your protected devices.

The VMware Carbon Black Cloud is a cloud-native endpoint protection platform (EPP) that combines the intelligent system hardening and behavioral prevention needed to keep emerging threats at bay, using a single lightweight agent and an easy-to-use console. While other endpoint security products only collect a dataset related to what is known bad, the VMware Carbon Black Cloud continuously collects comprehensive endpoint activity data, because attackers intentionally try to "look normal" in order to hide their attacks. It then analyzes attackers' behavior patterns to detect and stop never-seen-before attacks.

Specs Overview

Detailed Specs