100%
detection rate achieved by CrowdStrike Falcon in the MITRE ATT&CK Evaluations Enterprise Round 6 2024, with no missed detections across the adversary simulation scenarios
$61B
Broadcom's acquisition price for VMware in 2023, placing Carbon Black under Broadcom's enterprise software portfolio alongside other VMware security products

When Bit9 acquired Carbon Black in 2014 and merged under the Carbon Black name, it was one of the first enterprise EDR platforms to reach meaningful scale. The company went public in 2018 and was acquired by VMware in 2019 for $2.1 billion, then carried through VMware's own $61 billion acquisition by Broadcom in late 2023. That ownership chain matters for buyers evaluating Carbon Black in 2026: every acquisition introduces integration complexity, product rationalization risk, and support structure changes.

CrowdStrike's trajectory has been the inverse. Founded in 2011, it went public in 2019 and has grown into one of the largest pure-play cybersecurity companies in the world by market capitalization. Its Threat Graph cloud architecture, single lightweight agent model, and aggressive module expansion strategy have made it the default evaluation benchmark for enterprise EDR buyers.

These are not equivalent buyer conversations in 2026. Evaluating Carbon Black requires assessing both the product and the vendor trajectory under Broadcom. Evaluating CrowdStrike is a more straightforward platform assessment, though the July 2024 update incident that caused widespread Windows outages is a factor that enterprise risk discussions now routinely include.

CrowdStrike Falcon: Cloud-Native Architecture and the Module Ecosystem

CrowdStrike Falcon is built on a cloud-native architecture with a single lightweight agent (the Falcon sensor) deployed on endpoints. The sensor collects behavioral telemetry and streams it to CrowdStrike's Threat Graph, a cloud-scale graph database that processes trillions of events per week across the CrowdStrike customer base to identify threats using behavioral pattern matching, machine learning models, and threat intelligence.

The single-agent architecture is a genuine operational advantage. A single 5-10 MB agent handles endpoint protection, EDR, threat hunting telemetry, identity threat detection (through integration with Active Directory), USB device control, firewall management, and cloud workload protection, depending on which Falcon modules are licensed.

The Falcon module ecosystem has expanded substantially beyond core EDR. Current modules include Falcon Prevent (NGAV), Falcon Insight XDR (EDR plus extended telemetry), Falcon Identity Threat Detection (Active Directory attack detection), Falcon Cloud Security (cloud workload protection, Kubernetes runtime, CSPM, CIEM), Falcon Exposure Management (attack surface management), and Falcon Intelligence and Adversary Intelligence (threat intelligence and actor tracking).

Pricing is module-based, which allows organizations to start with core endpoint protection and expand, but full platform coverage accumulates cost quickly.

Carbon Black (VMware/Broadcom): Behavioral Detection and Deployment Flexibility

Carbon Black's product lineup under Broadcom includes Carbon Black Cloud (the SaaS-delivered platform) and Carbon Black Enterprise EDR (the on-premises option). The Cloud platform combines CB Defense (NGAV plus behavioral EDR) and CB Enterprise EDR in a unified console.

Carbon Black's detection model is built on behavioral analytics that profiles endpoint activity and flags deviations from established baseline patterns. This approach is effective at detecting fileless attacks, living-off-the-land techniques, and malware that evades signature-based detection.

Where Carbon Black historically differentiated is in deployment flexibility. The on-premises Enterprise EDR option allows organizations with air-gap requirements to run full EDR capabilities without cloud telemetry dependencies. This is a capability CrowdStrike does not offer. For classified networks, industrial control system environments, and highly regulated sectors with data residency restrictions on security telemetry, this has been a decisive factor.

Carbon Black also integrates natively with the broader VMware infrastructure portfolio (vSphere, NSX), which has been a purchasing driver for organizations heavily invested in VMware virtualization.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Head-to-Head Comparison

The following comparison covers the dimensions most relevant to organizations evaluating these two enterprise EDR platforms.

Detection architecture

CrowdStrike processes endpoint telemetry through the Threat Graph in the cloud, applying machine learning models and threat intelligence-informed detection logic to a stream of behavioral events. This cloud-scale processing enables detection patterns that leverage cross-customer threat data. Carbon Black's detection runs through a combination of on-agent behavioral analysis and cloud-based analytics. Both detect sophisticated attacks, but CrowdStrike's Threat Graph-scale processing has consistently produced higher analytic detection ratios in third-party evaluations.

MITRE ATT&CK Evaluations performance

In Enterprise Round 6 (2024), CrowdStrike achieved 100% detection coverage with no missed steps and a high proportion of technique-level detections. Carbon Black's results showed strong telemetry coverage but a lower ratio of technique-level analytic detections. Across multiple evaluation rounds, CrowdStrike has consistently produced more automated analytic signal on top of raw telemetry, reducing the manual analysis burden on SOC analysts.

Cloud workload and Kubernetes coverage

CrowdStrike's advantage here is substantial. Falcon Cloud Security provides runtime protection for containerized workloads, Kubernetes cluster security, serverless function coverage, and cloud infrastructure entitlement management from the same agent and console used for endpoint EDR. Carbon Black's cloud workload capabilities cover Windows and Linux server workloads in cloud environments but are less developed for Kubernetes runtime and serverless contexts.

Air-gap and on-premises deployment

Carbon Black retains a genuine advantage. VMware Carbon Black Enterprise EDR supports on-premises deployment for organizations with air-gapped networks or regulatory requirements that prohibit cloud telemetry transmission. CrowdStrike Falcon is cloud-only and does not offer an on-premises deployment model. For classified networks and certain regulated manufacturing environments, this is a decisive factor.

Vendor trajectory and stability

CrowdStrike is publicly traded with strong revenue growth and a clear independent roadmap. Carbon Black is owned by Broadcom, whose historical approach to large software acquisitions has involved product rationalization and support changes. Organizations committing to a multi-year Carbon Black investment should seek contractual clarity on roadmap and support commitments.

Comparison Table

CriterionCrowdStrike FalconCarbon Black (Broadcom)
Deployment modelCloud-onlyCloud and on-premises
Detection architectureCloud-native Threat GraphBehavioral analytics, hybrid
Agent footprintSingle lightweight sensorSingle agent, modular
MITRE ATT&CK Round 6100% detection, high technique coverageStrong telemetry, lower analytic ratio
Cloud workload coverageComprehensive (containers, K8s, serverless)Server workloads, limited K8s
Kubernetes runtime protectionYes (Falcon Cloud Security)Limited
XDR native integrationBroad (Falcon XDR module)Third-party ecosystem participation
Identity threat detectionNative (Falcon Identity module)Via integration
Air-gap/on-premises optionNoYes (Enterprise EDR)
Threat intelligence integrationNative (Falcon Intelligence)Third-party integration
Vendor stabilityStrong (public, high growth)Uncertain (Broadcom acquisition)

The Broadcom Acquisition Factor

Broadcom's acquisition history is instructive. After acquiring CA Technologies in 2018 and Symantec's enterprise security business in 2019, Broadcom rationalized both portfolios by focusing on the largest enterprise accounts, discontinuing or deprioritizing products that did not fit the enterprise software licensing model, and making support changes that affected smaller customers. The VMware acquisition followed the same pattern: Broadcom discontinued the perpetual license model for VMware products and moved the portfolio to subscription bundles, which created significant disruption for existing customers.

Organizations evaluating Carbon Black for a multi-year commitment should seek clear contractual language on support levels, product development commitments, and pricing stability before signing. The risk profile of a vendor commitment to a Broadcom-owned product is measurably different from the risk profile of a commitment to a standalone publicly traded cybersecurity company.

Decision Framework

Choose CrowdStrike if you are building or consolidating toward a cloud-native security architecture; cloud workload and Kubernetes runtime protection are part of your EDR scope; your threat hunting team benefits from high-fidelity analytic detection rather than raw telemetry; you want the broadest XDR module expansion path from a single vendor; or you want the strongest available threat intelligence integrated natively with your detection engine.

Carbon Black remains a defensible choice if you have genuine air-gap or on-premises-only deployment requirements that CrowdStrike's cloud-only architecture cannot meet; you are deeply embedded in VMware infrastructure and the native vSphere and NSX integration is operationally significant; or you are in the middle of a contract period and need to plan a migration over 12-18 months.

Consider SentinelOne as a third option if you want a cloud-native EDR alternative to CrowdStrike with a strong autonomous response model, competitive MITRE ATT&CK evaluation results, and a competitive XDR strategy.

The bottom line

Organizations planning a Carbon Black to CrowdStrike migration should structure the project in three phases. The first phase is scoping: inventory all endpoints currently running Carbon Black, identify any specialized configurations (custom exclusions, watchlists, on-premises connectors), and document existing detection policies so they can be re-implemented as Falcon prevention policies. The second phase is parallel deployment: deploy CrowdStrike Falcon in detection-only mode on a pilot group of endpoints while Carbon Black remains active, running both for two to four weeks to compare detection output and validate that critical enterprise applications do not conflict with the Falcon sensor. The third phase is staged rollout: activate Falcon prevention policies and retire Carbon Black agent groups in batches. The full migration timeline for a mid-enterprise organization of 5,000 to 25,000 endpoints typically runs eight to sixteen weeks when properly resourced. CrowdStrike's professional services team has migration playbooks for Carbon Black specifically that are worth requesting as part of the procurement process.

Frequently asked questions

Is VMware Carbon Black still being actively developed under Broadcom?

Carbon Black is officially part of Broadcom's portfolio following the VMware acquisition completed in late 2023. Broadcom has reorganized the VMware security product portfolio and positioned Carbon Black as part of its enterprise security offerings. However, Broadcom's historical approach to large software acquisitions has involved rationalization of product lines and changes to support structures that have sometimes reduced the viability of acquired products for smaller buyers. Security teams currently running Carbon Black should seek contractual clarity on support commitments and product development timelines before renewing or expanding their investment.

How did CrowdStrike and Carbon Black perform in the latest MITRE ATT&CK evaluations?

In the MITRE ATT&CK Evaluations Enterprise Round 6 (2024), CrowdStrike Falcon achieved 100% detection coverage with no missed steps and a high proportion of technique-level detections, which represents the highest-fidelity detection category in the evaluation methodology. Carbon Black's results showed strong telemetry coverage but a lower ratio of technique-level analytic detections compared to CrowdStrike. The consistent pattern across multiple evaluation rounds shows CrowdStrike with higher analytic detection fidelity and Carbon Black with stronger raw telemetry coverage but less automated triage layered on top of that telemetry.

Can Carbon Black and CrowdStrike coexist during a migration?

Running two EDR agents simultaneously on the same endpoint is technically possible but is strongly discouraged. Dual-agent deployments create performance overhead from competing real-time kernel-level monitoring processes and can produce conflicts in process interception. The standard migration approach is phased: deploy CrowdStrike in passive detection-only mode on a pilot group while Carbon Black remains active, validate detection quality and agent performance, then execute a staged rollout that removes Carbon Black from each endpoint group as CrowdStrike is activated. This phased approach is achievable within a few weeks for organizations with mature endpoint management infrastructure.

Which platform handles cloud workload protection better?

CrowdStrike has a clear advantage in cloud workload protection. CrowdStrike Falcon Cloud Security covers Linux and Windows server workloads on AWS, Azure, and GCP, Kubernetes container workloads with runtime protection, serverless function scanning, and cloud infrastructure entitlement management (CIEM) as part of an integrated Falcon module. The Threat Graph backend processes telemetry from cloud workloads using the same detection engine as endpoint telemetry, enabling unified threat hunting across endpoint and cloud surfaces. Carbon Black's cloud workload capabilities are narrower in scope, particularly for Kubernetes runtime protection and serverless coverage.

How does Carbon Black's pricing compare to CrowdStrike after the Broadcom acquisition?

Pricing for both platforms is negotiated rather than published as list prices. Carbon Black has historically been positioned as a lower-cost alternative to CrowdStrike, particularly for organizations already paying for VMware infrastructure licenses where Carbon Black could be bundled. Under Broadcom ownership, the pricing structure has shifted in ways that have reportedly made it less attractive for smaller accounts, as Broadcom has consolidated packaging and focused enterprise agreements on larger spending commitments. Organizations evaluating both should request multi-year total cost of ownership projections that account for expected module growth and user count changes.

Is Carbon Black a good choice for air-gapped or on-premises-only environments?

This is one area where Carbon Black retains a genuine advantage over CrowdStrike. VMware Carbon Black Enterprise EDR supports on-premises deployment, allowing organizations with air-gapped networks, classified environments, or regulatory requirements that prohibit cloud telemetry transmission to run Carbon Black without sending endpoint data to external cloud infrastructure. CrowdStrike Falcon is architected as a cloud-native platform and is not offered in an on-premises deployment model. For environments with genuine air-gap requirements such as defense contractors, intelligence community infrastructure, and certain regulated manufacturing environments, Carbon Black's on-premises capability is a differentiating factor that CrowdStrike cannot currently match.

What are the main reasons organizations are migrating away from Carbon Black?

Practitioners who have migrated from Carbon Black to CrowdStrike or SentinelOne consistently cite four primary drivers. First, MITRE ATT&CK evaluation results over multiple rounds have shown Carbon Black with lower analytic detection fidelity compared to CrowdStrike and SentinelOne. Second, the Broadcom acquisition introduced uncertainty about the product's long-term roadmap and support quality that makes multi-year renewal commitments harder to justify internally. Third, CrowdStrike's module ecosystem offers a broader platform expansion path for organizations pursuing XDR consolidation strategies. Fourth, CrowdStrike's threat intelligence and adversary tracking capabilities are widely regarded as among the strongest in the industry.

Sources & references

  1. MITRE ATT&CK Evaluations Enterprise Round 6 (2024)
  2. CrowdStrike Falcon Platform Documentation
  3. VMware Carbon Black Product Documentation
  4. Gartner Magic Quadrant for Endpoint Protection Platforms 2024

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Related Questions — Answer Hub

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.