SHARE
Facebook X Pinterest WhatsApp

Carbon Black Acquires Confer to Gain Antivirus Software

Cyber Crime Report Finds Old Breaches Led to New Breaches As part of a larger effort to redefine what encompasses endpoint security, Carbon Black has acquired Confer, a provider of antivirus software that uses heuristics and a cloud-based management platform to change the way IT organizations maintain IT security. Carbon Black CEO Patrick Morley says […]

Written By
MV
Mike Vizard
Jul 25, 2016
Slide Show

Cyber Crime Report Finds Old Breaches Led to New Breaches

As part of a larger effort to redefine what encompasses endpoint security, Carbon Black has acquired Confer, a provider of antivirus software that uses heuristics and a cloud-based management platform to change the way IT organizations maintain IT security.

Carbon Black CEO Patrick Morley says the ultimate goal is to combine the whitelisting and cybersecurity threat intelligence software developed by Carbon Black with the next-generation antivirus (NGAV) software developed by Confer. Confer’s software solution will be renamed “Cb Defense.”

Rather than simply focusing on developing signatures after an attack is launched, Morley says, Cb Defense will use heuristics at the endpoint and analytics in the cloud to identify threats, enabling IT organizations to proactively respond to them before they infect an endpoint.

Just as importantly, Morley says, Cb Defense is a much lighter-weight implementation of NGAV software that can be more effectively used across a number of IT scenarios, including mobile computing and Internet of Things (IoT) use cases.

Because Cb Defense relies on threat intelligence and heuristics rather than just signatures, Morley says, it’s a lot more effective than traditional AV software. While most providers of AV software are incorporating more heuristics to varying degrees, Morley says endpoint security is now being judged by a vendor’s ability to detect, respond to and remediate a security breach within the context of an integrated endpoint security lifecycle framework.

While there’s a lot of focus these days on trying to protect data wherever it resides in the enterprise, the endpoint remains the front line of IT security. Most IT security attacks target an endpoint in one form or another. It’s usually when that endpoint is compromised that the rest of the IT security nightmare unfolds. Every endpoint attack that is thwarted not only represents a small victory for the IT organization, it also serves to make launching those attacks a less profitable endeavor for the cybercriminal in the first place.

Save

Save

Save

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.