CRITICALSTART® MDR Services for VMware® Carbon Black™
CRITICALSTART® MDR Services for VMware® Carbon Black™
Achieve the full operating potential of your VMware Carbon Black Endpoint and Enterprise EDR investments
The combination of VMware Carbon Black with Critical Start Managed Detection and Response (MDR) services goes far beyond just monitoring alerts. It increases visibility across hybrid device types and operating systems to stop the most advanced attacks, reduce risk exposure, eliminate alert fatigue, and optimize the efficiency of security operations centers (SOC).
Consolidated and improved visibility of your environment all in a single interface.
Get fewer false positives over time which dramatically reduces alert fatigue and analyst burnout.
Our Cyber Research Unit (CRU) helps you stay ahead of the latest threats by building, enriching and adding threat intelligence to your security tools.
We do all the heavy lifting for you, so you don’t have to.
How Our MDR Service for VMware Carbon Black Works
Critical Start MDR adapts to your environment to deliver the full power of VMware Carbon Black Endpoint and Enterprise EDR.
Our bi-directional integration ingests every endpoint alert from VMware Carbon Black into our Cyber Operations Risk & Response™ platform (CORR), where they’re compared against known good behaviors in the Trusted Behavior Registry® (TBR®) and playbooks auto-resolve known good alerts at scale. Alerts not matching the TBR are escalated to our SOC analysts for further enrichment and investigation. Best of all, we can take response actions on your behalf and we will work with you until remediation is complete.
The managed detection and response service has significantly increased our analysts’ efficiency to the point that they can focus on other areas of the business.
We’re with you every step of the way – from onboarding through maturity.
Onboard quickly:
We will get you up and running as fast as possible: 4-6 weeks on average with total time to first value of approximately 5-10 business days.
Personalize based on your unique requirements:
We continue to add value to your implementation by tailoring our MDR service to your unique needs through playbooks and procedures adapted to your environment to reduce false positives.
Investigate and resolve alerts:
Once you’re up and running, ZTAP and our SOC analysts will monitor your environment 24x7x365 for potential threats. You can expect to see an approximate reduction in false positives of 90% on the first day of production monitoring.
Mature your VMware Carbon Black investment:
We want to help you get the most out of your VMware Carbon Black tools so we’re with you every step of the way. Your Customer Success Manager will check in with you regularly to make sure we’re meeting your expectations and our MDR services are helping you achieve your security goals.
We resolve every alert and only forward those that truly warrant additional investigation by your security team.
Our security analysts help you contain and extinguish threats as quickly as possible to stop them from spreading. They:
The Threat Detection Engineering (TDE) team develops and enriches new detections and IOCs. They also map detection to the industry-leading MITRE ATT&CK® Framework, ensuring you are protected against the latest attacker Techniques, Tactics and Procedures (TTPs).
MobileSOC puts the power of the ZTAP platform in your hands, giving you the ability to triage, escalate and isolate attacks in-the-moment from your iOS or Android phone regardless of your location or time of day.
Using the power of VMware Carbon Black EDR™, Critical Start enables customers to collect and visualize comprehensive information about endpoint events, giving security professionals unparalleled visibility and immediate response capabilities. Critical Start’s MDR utilizes a Trusted Behavior Registry to investigate every alert generated.
We offer MDR services for multiple tools all supported by one platform, ZTAP, and accessible on the go through our MobileSOC app, making these easy for our customers that work with multiple security tool vendors.