Try our new research platform with insights from 80,000+ expert users

BlackBerry Cylance Cybersecurity vs ThreatLocker Protect comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 8, 2024
 

Categories and Ranking

BlackBerry Cylance Cybersec...
Ranking in Endpoint Protection Platform (EPP)
27th
Average Rating
8.0
Number of Reviews
44
Ranking in other categories
No ranking in other categories
ThreatLocker Protect
Ranking in Endpoint Protection Platform (EPP)
13th
Average Rating
9.0
Number of Reviews
14
Ranking in other categories
Network Access Control (NAC) (5th), Advanced Threat Protection (ATP) (8th), Application Control (4th), ZTNA (8th), Ransomware Protection (6th)
 

Mindshare comparison

As of October 2024, in the Endpoint Protection Platform (EPP) category, the mindshare of BlackBerry Cylance Cybersecurity is 1.3%, down from 1.6% compared to the previous year. The mindshare of ThreatLocker Protect is 0.8%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Sooraj Makkancherrry - PeerSpot reviewer
Sep 10, 2024
Doesn't have daily updates, which is important for healthcare IT
I face challenges with the exclusion policy - it still scans folders we told it not to, causing issues. When we contact support, they tell us to update the latest agent, but we can't do that immediately due to medical device protocols and validation testing. I wish support would try to understand our issues better instead of giving this standard response. The machine learning feature they use often tells us to upgrade the agent or add things to the exclusion list, which isn't unacceptable. It's a very good and new technology as a tool and antivirus. But sometimes, it doesn't work properly with our medical devices and products, quarantining files it shouldn't even after we add them to exclusions. This is tricky for us.
Roy Richardson - PeerSpot reviewer
Nov 28, 2023
Integration is simple, deployment is straightforward, and extensive well-written documentation is available online
We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running. We utilize Ringfencing to establish guardrails around implementations, ensuring that applications operate within defined boundaries. We leverage network access control to granularly control interactions between computer systems and servers. This enables us to restrict communication between specific applications, even within a locked-down environment. We employ storage control to impose additional security measures on data storage. This includes controlling access to network shares, network files, and folders, as well as USB storage devices. We can whitelist specific devices based on their serial numbers or allow access based on predefined conditions. We rely on ThreatLocker's Cyber Hero support, which provides exceptional assistance and responsiveness. At any time, we can initiate a chat session and receive immediate support. If the issue requires escalation, it is promptly handled. Cyber Hero support also plays a crucial role in vetting application updates. When a user attempts to install or update an application, and the update has not been approved from a security standpoint, it is blocked by ThreatLocker. A notification is presented to the user, informing them of the block and providing an option to justify the application's need. These requests are then reviewed by ThreatLocker's Cyber Hero support team, who evaluate them against our security criteria and make an informed decision to allow or deny the application. We utilize ThreatLocker's elevated control feature for applications that require administrator-level access. We avoid granting full administrative privileges to end users, as this elevates the risk of compromise if the device is infiltrated. Instead, elevated control allows us to precisely define the execution conditions for specific applications, such as QuickBooks updates. By verifying the application's signature and certificate, we can enable the update to run with administrative privileges while restricting the user's overall administrative access. Integrating ThreatLocker with other products is simple and only requires a few clicks. ThreatLocker's deployment is also very straightforward. The company provides extensive and well-written online documentation, which is continuously being improved. They also offer a variety of training resources, including university courses, training videos, webinars, and conferences. I have no complaints about the level of support and knowledge transfer provided by the company. ThreatLocker is also developing a new reporting tool, which I had the opportunity to beta test. The company has also been showcasing the new reporting tool at conferences. The new reporting tool provides a level of detail that is unmatched by any other product on the market.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"​Very easy to deploy. It can be done one by one or deployed by customizing an MSI file for GPO push.​"
"One of the best features of the solution is that it's easy to deploy."
"The deployment of updates is easy."
"The Application Guard and ByteGuard are useful features."
"I like the AI and mathematical components that they use."
"In most cases, the solution's ability to detect in the MITRE framework, and its ability to be able to detect attacks in any one of seven or eight different areas of the life cycle of an attack is very useful."
"The initial setup of CylancePROTECT is very easy."
"The platform's most valuable features are the malware detection capabilities."
"While it can be frustrating at times, we appreciate the low-level security provided by the application whitelist."
"ThreatLocker Allowlisting has all of these features integrated into one console, making it effective."
"The sandbox functionality is fantastic."
"Feature-wise, the learning mode and the fact that it's blocking everything are the most valuable. I don't see why more companies don't use the type of product."
"We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running."
"The biggest improvement has been knowing that something unauthorized isn't going to get installed on anyone’s machines."
"The great thing is that if you get a malicious email and you try to run something, ThreatLocker is not going to let it do anything. It is not going to let anything infect your network."
"The interface is clean and well-organized, making it simple to navigate and find what we need."
 

Cons

"The product does not do a lot of reporting on what it is taking care of. Enhanced reporting would be a welcome improvement."
"An area for improvement in CylancePROTECT is its pricing, as it's a bit costly."
"Enhancing the product's detection rates and streamlining the user interface for easier management in daily operations would be beneficial improvements."
"The security scripting needs improvement. It needs deeper security for scripting."
"CylancePROTECT could be improved in its technical support and communication."
"The solution needs better dashboards that are easier to use."
"CylancePROTECT's dashboard could be more user-friendly."
"The stability could be improved."
"ThreatLocker Allowlisting needs to improve its user interface and overall workflow."
"One area I see for improvement is in the visibility of support tickets within the ThreatLocker ticketing system."
"The reporting could be improved."
"More visibility in the built-ins would be nice."
"Something we have come up against a couple of times is that we have two clients that are software developers. They create software that doesn't have digital signatures and that's not easy to categorize or whitelist with ThreatLocker. We have to go in and make custom rules to allow them to do their work and to be protected from malicious threats."
"Adding applications to the allowlist can sometimes feel overwhelming."
"ThreatLocker could offer more flexible training, like online or offline classes after hours. The fact that they even provide weekly training makes it seem silly to suggest, but some people can't do it during the day, so they want to train after work. They could also start a podcast about issues they see frequently and what requires attention. A podcast would be helpful to keep us all apprised about what's going on and/or offline training for those people who can't train during the week."
"The portal can be a little overwhelming at times from an administration point of view. It displays a lot of information, and it's all useful. However, sometimes there is too much on the screen to sift through, especially if you're trying to diagnose a client's problem with a piece of software. Maybe something has stopped working since they updated it, and we need to see if ThreatLocker is blocking a component of that software."
 

Pricing and Cost Advice

"We would just add more if there are new users, but right now you just need one license for per user."
"On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a seven out of ten."
"The product cost is about $5, per user, per month."
"We pay our license on a yearly basis and have just renewed for two years."
"Review closely how many endpoints you actually need before buying into a pricing level. Deal and deal with the VAR of your choice."
"The solution provides me with competitive pricing."
"The solution's pricing is around the same as most EDRs but slightly behind some of the major ones."
"Our licensing cost for the solution is around $4,000 for six months. There are no costs in addition to the standard licensing fees."
"I believe ThreatLocker's pricing model is fair and flexible, allowing account managers to offer customized deals based on our specific needs."
"I can't complain. Cheaper would always be nice, but I think it's reasonable compared to other software in the cybersecurity market."
"The pricing works fine for me. It's very reasonably priced."
"Others say ThreatLocker is too expensive, and I tell them they're dreaming. It's well-priced for what it does."
"ThreatLocker's pricing seems justifiable."
"Considering what this product does, ThreatLocker is very well-priced, if not too nicely priced for the customer."
"The pricing is fair and there is no hard sell."
"The price is very reasonable, and we have been able to integrate ThreatLocker with all of our clients."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
813,418 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Manufacturing Company
12%
Government
8%
Financial Services Firm
7%
Computer Software Company
38%
Retailer
7%
Government
5%
Financial Services Firm
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Blackberry Protect?
It is a good endpoint solution. It is very easy to manage and detect the threat immediately. It will take the necessary actions.
What is your experience regarding pricing and costs for Blackberry Protect?
The price is reasonable for us at the moment. I rate the overall solution an eight out of ten.
What needs improvement with Blackberry Protect?
I face challenges with the exclusion policy - it still scans folders we told it not to, causing issues. When we contact support, they tell us to update the latest agent, but we can't do that immedi...
What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What needs improvement with ThreatLocker Allowlisting?
I'm not sure if I'm using it wrong; however, I find that I have to babysit it too much. I've found that if a user opens a file from another location, it might trigger an approval process. The same ...
 

Also Known As

Blackberry Protect
ThreatLocker Allowlisting, ThreatLocker Network Control, ThreatLocker Ringfencing
 

Overview

 

Sample Customers

Panasonic, Noble Energy, Apria Healthcare Group Inc., Charles River Laboratories, Rovi Corporation, Toyota, Kiewit
Information Not Available
Find out what your peers are saying about BlackBerry Cylance Cybersecurity vs. ThreatLocker Protect and other solutions. Updated: October 2024.
813,418 professionals have used our research since 2012.