Carbon Black in strategic tie up with Blue Coat

Tom Barsi, vice president of business development at Carbon Black
Tom Barsi, vice president of business development at Carbon Black
Carbon Black revealed the successful integration of its Carbon Black endpoint detection and response solution with Blue Coat’s next-generation malware analysis and security analytics network options.

The business, which is an establishing member of the Blue Coat Alliance Ecosystem of Endpoint Detection and Response (EDR) partner program, has actually announced that the combination is now available free of charge to joint clients utilizing Carbon Black version 5.0 and above and Blue Coat Malware Analysis Appliance.

According to the company, the integration will now permit Carbon Black and Blue Coat consumers with numerous powerful brand-new use cases, which includes remote file analysis through Blue Coat’s Malware Analysis Appliance and empowered occurrence response by means of Blue Coat Security Analytics.

The very first example of integration enables Carbon Black to automatically send out unknown files to Blue Coat’s Malware Analysis Appliance for detonation and analysis. Based on the results, file scores and informs are instantly sent to Carbon Black, where more investigation can take place. This extends Blue Coat Malware Analysis abilities to Carbon Black to protect devices from activities that would traditionally evade network security protections, such as off-network downloads or USB devices.

The second example of combination provides a fast pivot combination into Carbon Black. This allows administrators to quickly see if a file performed on an endpoint and, if so, take required occurrence response actions such as endpoint seclusion, live reaction, or attack prohibiting.

Tom Barsi, vice president of business development at Carbon Black said, “Thousands of companies depend upon Blue Coat technology to defend their networks. This integration will enable organizations to extend those protections down to the endpoint with Carbon Black. By uniting endpoint detection and response, and network detonation and analytics, organizations can leverage both endpoint and network investments to achieve better security.”