Carbon Black announced the release of its third-generation cloud architecture during the company’s sold out user conference, #CBConnect19, in San Diego. The new architecture centers around a new data pipeline optimized for search, auto-scaling, and private analytics. As part of the platform introduction, Carbon Black also announced its plans for Bring Your Own Key (BYOK) encryption capabilities, becoming the industry’s first cloud endpoint protection platform (EPP) provider to publicly announce plans for such a feature. The new cloud architecture builds on more than a decade of innovation in endpoint data collection and analytics and differentiates the CB Predictive Security Cloud® (PSC) in a number of key areas, including: Built on a flexible architecture that manages each customer’s data in its own segmented data store, the new architecture will support “Bring Your Own Key” (BYOK) encryption of a customer’s data at rest. BYOK will give customers assurance that sensitive endpoint data will be encrypted using their own key versus a single shared key across all customers. Carbon Black also announced plans to offer “Flexible Data Retention” with this new architecture. This feature will allow all of its customers to have the ability to store endpoint data from one day to greater than six months, only paying for what they need. With flexible pricing options, a customer will be able to change their data retention at any time. This feature will be specifically helpful to customers who use endpoint telemetry for threat hunting and incident response purposes. Carbon Black’s new architecture supports modules across the PSC portfolio, including: CB Defense (Next Generation Antivirus and Endpoint Detection and Response), CB ThreatHunter (Threat Hunting and Incident Response) and CB LiveOps (Endpoint Query). Customers can seamlessly search across the platform using the new, easy-to-use “Investigate” feature. The new cloud architecture offers unprecedented performance and ability to scale. With thousands of customers and millions of endpoints streaming data to the PSC in real-time, the new architecture offers rapid response times for even the most advanced security queries, which might span months of data. The new architecture also allows for powerful new search capabilities, including support for regular expressions and fuzzy searches. This makes it even easier to hunt for threats even as attackers change their techniques.