TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Carbon Black S-1

66 点作者 pquerna大约 7 年前

5 条评论

rm_-rf_slash大约 7 年前
Five years ago all the chatter was about private financing being the “new” normal for tech, as it offered closer control with fewer disclosure requirements. Companies like Uber were raising insane amounts of private money while thumbing their nose at public markets.<p>Now all of a sudden it seems there’s a new IPO filing every week or so. Does this indicate a stronger economy and&#x2F;or pressure from shareholders to allow their investments to become more liquid, or are people smelling a downturn around the corner and hoping to cash out before valuations drop?
评论 #16794925 未加载
评论 #16794910 未加载
CSDude大约 7 年前
I deployed Carbon Black, and it seems a nice enough product. But it seems to generate too many programming related false alarms.<p>Well, they could at least identify when I used ncdu on &#x2F; and thought it was a crypto-locker, which is nice.
评论 #16796686 未加载
eitally大约 7 年前
As long as Windows machines sit on employee desktops, there will be a compelling need for things like Bit9&#x2F;Carbon Black. I helped with an enterprise deployment a few years ago and -- except the rule tweaking that required quite a lot of trial and error* -- it works as advertised.<p>* There wasn&#x27;t really any &quot;error&quot;, per se. It was really just a trial in deciding how much the CIO&#x2F;CISO was willing to deal with knowing about, versus remaining ignorant by choice since that was far less work. Given where they ended up, I&#x27;m not sure whether the millions spent on the software was a smart business decision. &lt;banghead&gt;
guiomie大约 7 年前
&quot;Endpoints are the new front line in the cyber war, and organizations are shifting their defenses as a result&quot; ... what do they mean by &#x27;endpoint&#x27; ?
评论 #16795987 未加载
评论 #16796038 未加载
评论 #16795963 未加载
P38大约 7 年前
Next gen AWL&#x2F;Endpoint solutions offer a simple and true default deny approach. Either an app (executable, script, dll) is trusted or it isn&#x27;t. If it is not trusted it can&#x27;t run - period. 100% successful at preventing zero day attacks and Shattered attacks and even malware that isn&#x27;t written yet...<p>Trusted apps are cyber fingerprinted using 6 hashes - in order to use a Shattered like attack all 6, including file length would need to be simultaneously crashed.<p>No rules are required, no scanning is needed, instant protection on installation and can be managed&#x2F;administered by non-technical staff. Can use an out of the box trust list with over 1000 apps already fingerprinted or build own trust list.<p>Can be deployed using standard tools and is scalable to global enterprise.
评论 #16797635 未加载