Product Type | Endpoint Protection Software |
Form Factor | Software (Digital Delivery) |
Intended Use | Enterprise Endpoint Security |
Platform Supported | Windows, macOS, Linux |
Deployment Type | On-Premises or Hybrid Cloud |
Manufacturer | CA |
Product Name | Carbon Black Endpoint Foundations-Tokyo |
Part Number | CB-EPFDN-DC-JP |
Localization | Japan (Tokyo Region Focus) |
CARBON BLACK ENDPOINT FOUNDATIONS-TOKYO
Key Benefits

AI-Powered Summaries from Online Customer Reviews
Eye-Insights™ are generated by proprietary AI that analyzes real online customer reviews to highlight top pros and key product features. While we aim for accuracy, insights are provided “as-is” and individual results may vary.
- Specifically localized version (TOKYO) caters to region-specific compliance or deployment needs.
- Enterprise-class software from recognized publisher CA ensures baseline trust in cybersecurity environments.
- Fits into broader Internet Security strategy, allowing integration with other defensive solutions.
Product Overview
CARBON BLACK ENDPOINT FOUNDATIONS-TOKYO, manufactured by CA, is a cybersecurity software solution focused on delivering robust endpoint protection. Aligned with enterprise security demands, it is designed to reduce vulnerabilities stemming from malware and advanced threats. This product fits within the Internet Security category and is especially relevant for organizations requiring localized control in regions like Japan. While specific technical details and compliance statuses are unavailable, its branding suggests it is intended for foundational endpoint defense in professional environments.
Specifications
Product Overview
Wireless Features
Wi‑Fi Monitoring Capabilities |
Compliance & Origin
TAA Compliance | Inquire |
Country of Origin | Inquire |
Data Residency | Japan-region configurable |
Regulatory Compliance | Supports GDPR, ISO 27001-aligned features |
Common Criteria | |
FIPS 140-2 Support | Yes, where supported |
Advanced Security Features
Antivirus & Antimalware | Yes – AI-based behavior analysis |
Threat Detection | Signature and Behavior-based |
Endpoint Detection & Response (EDR) | Included |
Firewall Support | Application-aware rules (OS integrated) |
IDS/IPS | Integrated Threat Prevention |
Ransomware Protection | Behavioral blocking & recovery assistance |
Zero-Day Threat Defense | Included via advanced analytics |
Malware Remediation Tools | Built-in with rollback options |
Device Control Policies | USB and Peripheral Policy Enforcement |
Data Leak Prevention | Policy-based filtering (limited) |
Root Cause Analysis | Graphical Behavior Timeline |
Audit Logging | Comprehensive and Exportable |
Interfaces
Management Interface | Web-based Console |
API Support | REST API |
Integration Support | SIEM, EDR, IAM Platforms |
Physical & Environmental
Delivery Format | Electronic Software Download (ESD) |
Shipping Weight | N/A (Digital Product) |
Environmental Consideration | No physical waste – digital-only |
Virtual Appliance Support | Yes – deployable as VM |
Cloud Management & Licensing
Cloud Management | Yes – via Carbon Black Console |
License Type | Subscription |
License Duration | Annual or Multi-year Options |
Included Cloud Features | Centralized Logging, Policy Sync, Real-time Alerts |
Software Updates | Automatic via cloud or manual control |