Edge UOL implements Carbon Black, the evolution in technology that offers protection against cyber threats
To strengthen cyber risk security of its endpoints devices, the IT company relies on the expertise of Edge UOL, which implemented, in partnership with VMware, the Carbon Black solution. The project was designed to provide proactive and preventive action in the face of digital threats, in addition to enabling flexible management in the context of geographical expansion within the company that consolidated home office among its employees.
With an Endpoint Detection and Response (EDR) solution, the technology identifies malicious behavior and therefore acts preventively to protect devices. The solution has a strong artificial intelligence mechanism to protect devices of the company’s professionals in real time without depending on the infrastructure of a local server.
Our challenge
From the point of view of administration and implementation, the main challenge in the project execution was to implement a robust and flexible solution for a workforce distributed in several countries. Therefore, it was also necessary to comply with the different regulations and standards of each location.
How we solved it
- To deal with the challenges of an implementation distributed geographically in the United States and in European countries, the technology was submitted to a series of international references before acquisition;
- As it is a solution that operates in the cloud and has a simple distribution process, the implementation of the technology was very fast comparing to traditional solutions on the market.
Main results
- A technology that has an extremely lightweight agent, which does not compromise the performance and uses little device memory;
- Proactive action in incident identification and response to combat cyber threats;
- Lightweight administration console with easy access to settings and reports.
Our differentials
- Vulnerability management that enables the company to have prior knowledge about threats and risks of other software installed on machines, which allows a proactive action by technical teams to prevent cyber threats from becoming a real danger;
- Automated work to reduce exposure time to cyber risks and achieve faster troubleshooting;
- Administration technology made by a cloud console that allows a complete view of the health of all devices in real time and in an extremely flexible way.