Carbon Black (CB) Protection, Carbon Black (CB) Response for Core-Mark International

Additional information

Source: Web-site of vendor

The project has been delivered on schedule

The budget has not been exceeded

Functionality complies with task

Description

Summary As one of the largest and most valued distributors of consumer goods to convenience stores throughout North America, Core-Mark International is very invested in having a strong security posture. Director of Network Systems Ken Merrigan and his team chose Carbon Black to meet various security needs within the organization and have found the visibility and control into their environment unmatched. Expanding Their Security Footprint Several years ago when high profile company breaches became increasingly news-worthy, Core-Mark received a mandate from their executives to increase the security footprint of the organization. With the very basic antivirus product that they had, the security team set out to upgrade to a solution that would provide them both visibility and protection. “We didn’t have that comprehensive protection that traditional antivirus doesn’t give,” said Julian Alexander, Network Analyst. “We needed visibility into our environment that we didn’t have in the past.”
After evaluating several vendors they found Carbon Black’s products best met the needs of the security team and the organization. Gaining Control Over Their Environment After deploying both CB Protection and CB Response, Core-Mark International gained both the insight into their environment and the application whitelisting capabilities they had been looking for. “By having chosen Carbon Black we now have visibility, awareness and control over our environment,” said Alexander. “When we looked into the Carbon Black technology we wanted the change control approach which Carbon Black definitely had. We looked at other vendors in the space and Carbon Black was definitely the best choice.” Conclusion As strong believers in the whitelisting approach to security for their critical systems the team has found Carbon Black continues to prevent unwanted files from running and gives them the insight they need into what is happening on their endpoints.
“Carbon Black has a wide variety of products that could fit the need of almost any company,” concludes Merrigan.

Details

Problems

Insufficient risk management

Risk of data loss or damage

No control over the state of communication channels

No control over data access

No automated business processes

Non-compliant with IT security requirements

Business tasks

Ensure Security and Business Continuity

Manage Risks

Ensure Compliance

Similar deployments

prev
next