Carbon Black S-1

  • Five years ago all the chatter was about private financing being the “new” normal for tech, as it offered closer control with fewer disclosure requirements. Companies like Uber were raising insane amounts of private money while thumbing their nose at public markets.

    Now all of a sudden it seems there’s a new IPO filing every week or so. Does this indicate a stronger economy and/or pressure from shareholders to allow their investments to become more liquid, or are people smelling a downturn around the corner and hoping to cash out before valuations drop?

  • I deployed Carbon Black, and it seems a nice enough product. But it seems to generate too many programming related false alarms.

    Well, they could at least identify when I used ncdu on / and thought it was a crypto-locker, which is nice.

  • As long as Windows machines sit on employee desktops, there will be a compelling need for things like Bit9/Carbon Black. I helped with an enterprise deployment a few years ago and -- except the rule tweaking that required quite a lot of trial and error* -- it works as advertised.

    * There wasn't really any "error", per se. It was really just a trial in deciding how much the CIO/CISO was willing to deal with knowing about, versus remaining ignorant by choice since that was far less work. Given where they ended up, I'm not sure whether the millions spent on the software was a smart business decision. <banghead>

  • "Endpoints are the new front line in the cyber war, and organizations are shifting their defenses as a result" ... what do they mean by 'endpoint' ?

  • Next gen AWL/Endpoint solutions offer a simple and true default deny approach. Either an app (executable, script, dll) is trusted or it isn't. If it is not trusted it can't run - period. 100% successful at preventing zero day attacks and Shattered attacks and even malware that isn't written yet...

    Trusted apps are cyber fingerprinted using 6 hashes - in order to use a Shattered like attack all 6, including file length would need to be simultaneously crashed.

    No rules are required, no scanning is needed, instant protection on installation and can be managed/administered by non-technical staff. Can use an out of the box trust list with over 1000 apps already fingerprinted or build own trust list.

    Can be deployed using standard tools and is scalable to global enterprise.