{"id":5996,"date":"2020-09-28T00:00:00","date_gmt":"2020-09-28T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2020\/09\/28\/crowdstrike-vs-carbon-black-top-edr-solutions-compared\/"},"modified":"2021-08-02T21:36:21","modified_gmt":"2021-08-02T21:36:21","slug":"crowdstrike-vs-carbon-black","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/","title":{"rendered":"CrowdStrike vs Carbon Black: Top EDR Solutions Compared"},"content":{"rendered":"<div id=\"article-content\">\n<div id=\"article-ads\">\n<div class=\"hidden-xs\">\n<div id=\"daily-newsletter\" class=\"row\">\n<div class=\"text-center\">\n<div class=\"col-md-6 col-md-offset-3\">\n<div id=\"namecard-input-groupwz\" class=\"input-group\"><span class=\"input-group-btn\"><\/p>\n<p><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>CrowdStrike Falcon and VMware Carbon Black are popular endpoint detection and response (EDR) products, and both scored high enough in our analysis to make our list of <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">top EDR vendors<\/a>.<\/p>\n<p>Buyers often compare the two EDR products, and with good reason: both offer strong security and management features that can make a security operations center&#8217;s work easier. The difference in the two lies mainly in CrowdStrike&#8217;s advanced features, which are popular with security operations teams but come at a cost. That said, the cost of an EDR product is small compared to the nearly $4 million cost of the average data breach, so price should ideally be no object when purchasing an EDR solution. The best way to get pricing, of course, is to get quotes from multiple vendors on a configuration that meets your organization&#8217;s needs.<\/p>\n<h2>Detection and response<\/h2>\n<p>Both vendors have performed well in independent security tests. CrowdStrike scored higher on the difficult MITRE evaluation, while Carbon Black has scored well in both security effectiveness and total cost of ownership (TCO) in NSS Labs tests &#8211; tests avoided by CrowdStrike after a legal dispute between the two. Users of both products give high marks for their detection and response capabilities, so those test scores appear to carry over to production environments. Data breaches happen, so response is one of the driving factors in an EDR purchasing decision, and users of both tools report that their jobs are made easier by the ability of the EDR tools to respond to threats. CrowdStrike also offers an additional managed threat hunting service, Overwatch.<\/p>\n<h2>Management<\/h2>\n<p>Carbon Black offers nice out-of-the-box automation, with automated remediation a standard feature. Both products scored well in our analysis in Ease of Use and Deployment, but CrowdStrike received the higher overall Management score because of additional features like vulnerability management, device control, advanced threat hunting, rollback, guided investigation and mobile support. That said, Carbon Black scored very high in return on investment (ROI) in the NSS Labs evaluation, so the VMware product offers what&#8217;s needed to get the job done. Both EDR products are cloud-based and scored near the top in Deployment, offering a relatively easy implementation experience.<\/p>\n<h2>The bottom line<\/h2>\n<p>Carbon Black and CrowdStrike are both solid EDR products offering comparable security. Users of both are happy, but CrowdStrike users are a little more effusive in their praise. The difference between the two is largely in CrowdStrike&#8217;s wealth of advanced features &#8211; and potentially higher cost. Users report that both EDR solutions can get pricey, however. As with all IT products, the best product is the one that meets a buyer&#8217;s needs and budget. See our full list of <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">top EDR products<\/a> for other solutions that may meet your needs.<\/p>\n<h2>CrowdStrike and Carbon Black ratings<\/h2>\n<p>Here&#8217;s how the two EDR products compared in our analysis.<\/p>\n<table dir=\"ltr\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<colgroup>\n<col width=\"100\" \/>\n<col width=\"100\" \/>\n<col width=\"100\" \/>\n<col width=\"100\" \/>\n<col width=\"100\" \/>\n<col width=\"100\" \/>\n<col width=\"100\" \/>\n<col width=\"100\" \/><\/colgroup>\n<tbody>\n<tr>\n<td><\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Detection&quot;}\">Detection<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Response&quot;}\">Response<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Management&quot;}\">Management<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Deployment&quot;}\">Deployment<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Ease of use&quot;}\">Ease of use<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Value&quot;}\">Value<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;Support&quot;}\">Support<\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;CrowdStrike&quot;}\">CrowdStrike<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:4.7}\">4.7<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:4.7}\">4.7<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:4.5}\">4.5<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:4.6}\">4.6<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:4.6}\">4.6<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:4.7}\">4.7<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:4.8}\">4.8<\/td>\n<\/tr>\n<tr>\n<td data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;VMware Carbon Black&quot;}\">VMware Carbon Black<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:4.3}\">4.3<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:4.4}\">4.4<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:4.2}\">4.2<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:4.4}\">4.4<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:4.5}\">4.5<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:4.6}\">4.6<\/td>\n<td data-sheets-value=\"{&quot;1&quot;:3,&quot;3&quot;:4.3}\">4.3<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d706d78e904-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d706d78e904\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d706d78e904\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d706d78e904\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d706d78e904\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d706d78e904\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d706d78e904\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>CrowdStrike Falcon and VMware Carbon Black are popular endpoint detection and response (EDR) products, and both scored high enough in our analysis to make our list of top EDR vendors. Buyers often compare the two EDR products, and with good reason: both offer strong security and management features that can make a security operations center&#8217;s [&hellip;]<\/p>\n","protected":false},"author":163,"featured_media":13612,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17],"tags":[23549,5711,31080,23445],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[378],"class_list":["post-5996","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-carbon-black","tag-crowdstrike","tag-edr-comparison","tag-endpoint-detection-and-response","b2b_audience-evaluation-and-selection","b2b_product-endpoint-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CrowdStrike vs Carbon Black: Top EDR Solutions Compared<\/title>\n<meta name=\"description\" content=\"We examine key features of top endpoint detection and response solutions from Carbon Black and CrowdStrike, along with their strengths and weaknesses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CrowdStrike vs Carbon Black: Top EDR Solutions Compared\" \/>\n<meta property=\"og:description\" content=\"We examine key features of top endpoint detection and response solutions from Carbon Black and CrowdStrike, along with their strengths and weaknesses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-28T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-02T21:36:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/computerscience5-1-1024x512-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Paul Shread\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Shread\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/\"},\"author\":{\"name\":\"Paul Shread\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\"},\"headline\":\"CrowdStrike vs Carbon Black: Top EDR Solutions Compared\",\"datePublished\":\"2020-09-28T00:00:00+00:00\",\"dateModified\":\"2021-08-02T21:36:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/\"},\"wordCount\":496,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/computerscience5-1-1024x512-1.png\",\"keywords\":[\"Carbon Black\",\"CrowdStrike\",\"EDR comparison\",\"endpoint detection and response\"],\"articleSection\":[\"Products\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/\",\"name\":\"CrowdStrike vs Carbon Black: Top EDR Solutions Compared\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/computerscience5-1-1024x512-1.png\",\"datePublished\":\"2020-09-28T00:00:00+00:00\",\"dateModified\":\"2021-08-02T21:36:21+00:00\",\"description\":\"We examine key features of top endpoint detection and response solutions from Carbon Black and CrowdStrike, along with their strengths and weaknesses.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/computerscience5-1-1024x512-1.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/computerscience5-1-1024x512-1.png\",\"width\":1024,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CrowdStrike vs Carbon Black: Top EDR Solutions Compared\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\",\"name\":\"Paul Shread\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"caption\":\"Paul Shread\"},\"description\":\"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CrowdStrike vs Carbon Black: Top EDR Solutions Compared","description":"We examine key features of top endpoint detection and response solutions from Carbon Black and CrowdStrike, along with their strengths and weaknesses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/","og_locale":"en_US","og_type":"article","og_title":"CrowdStrike vs Carbon Black: Top EDR Solutions Compared","og_description":"We examine key features of top endpoint detection and response solutions from Carbon Black and CrowdStrike, along with their strengths and weaknesses.","og_url":"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/","og_site_name":"eSecurity Planet","article_published_time":"2020-09-28T00:00:00+00:00","article_modified_time":"2021-08-02T21:36:21+00:00","og_image":[{"width":1024,"height":512,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/computerscience5-1-1024x512-1.png","type":"image\/png"}],"author":"Paul Shread","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Paul Shread","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/"},"author":{"name":"Paul Shread","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04"},"headline":"CrowdStrike vs Carbon Black: Top EDR Solutions Compared","datePublished":"2020-09-28T00:00:00+00:00","dateModified":"2021-08-02T21:36:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/"},"wordCount":496,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/computerscience5-1-1024x512-1.png","keywords":["Carbon Black","CrowdStrike","EDR comparison","endpoint detection and response"],"articleSection":["Products"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/","url":"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/","name":"CrowdStrike vs Carbon Black: Top EDR Solutions Compared","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/computerscience5-1-1024x512-1.png","datePublished":"2020-09-28T00:00:00+00:00","dateModified":"2021-08-02T21:36:21+00:00","description":"We examine key features of top endpoint detection and response solutions from Carbon Black and CrowdStrike, along with their strengths and weaknesses.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/computerscience5-1-1024x512-1.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/computerscience5-1-1024x512-1.png","width":1024,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/crowdstrike-vs-carbon-black\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"CrowdStrike vs Carbon Black: Top EDR Solutions Compared"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04","name":"Paul Shread","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","caption":"Paul Shread"},"description":"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).","url":"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/5996"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/163"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=5996"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/5996\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/13612"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=5996"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=5996"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=5996"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=5996"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=5996"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=5996"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}