Try our new research platform with insights from 80,000+ expert users

BlackBerry Cylance Cybersecurity vs ThreatLocker Zero Trust Endpoint Protection Platform comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 19, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

BlackBerry Cylance Cybersec...
Ranking in Endpoint Protection Platform (EPP)
19th
Average Rating
8.0
Reviews Sentiment
4.6
Number of Reviews
44
Ranking in other categories
No ranking in other categories
ThreatLocker Zero Trust End...
Ranking in Endpoint Protection Platform (EPP)
11th
Average Rating
9.0
Reviews Sentiment
7.5
Number of Reviews
18
Ranking in other categories
Network Access Control (NAC) (5th), Advanced Threat Protection (ATP) (8th), Application Control (4th), ZTNA (8th), Ransomware Protection (5th)
 

Mindshare comparison

As of February 2025, in the Endpoint Protection Platform (EPP) category, the mindshare of BlackBerry Cylance Cybersecurity is 1.2%, down from 1.5% compared to the previous year. The mindshare of ThreatLocker Zero Trust Endpoint Protection Platform is 0.7%, down from 0.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP)
 

Featured Reviews

Hadar Eshel - PeerSpot reviewer
Ensures advanced AI-driven threat detection to provide robust endpoint security, effectively preventing both known and unknown threats with minimal impact on system performance
We integrate it into our comprehensive cybersecurity strategy, specifically for antivirus and antiviral purposes. CylancePROTECT provides comprehensive endpoint security, including EDR capabilities. Additionally, BlackBerry now offers XDR, similar to other companies like CrowdStrike and SentinelOne. The AI-driven threat detection of CylancePROTECT has significantly enhanced our organization's security posture. This company has pioneered an AI-based engine that doesn't rely on signatures, thus offering protection for every computer, server, and endpoint without requiring specific signatures for malware or other attacks. Cylance stands out for pioneering the delivery of a complete AI-driven antivirus engine that relies primarily, if not solely, on AI and machine learning for threat identification. Remarkably, it identifies over 99.7% of global threats.
Musah Ibrahim - PeerSpot reviewer
Highly effective at controlling applications and securing our systems
As an architecture firm, we rely on TAISE’s Cybersecurity-as-a-Service (CaaS) to keep our systems safe from malware threats. TAISE introduced us to ThreatLocker, which has become essential in safeguarding our infrastructure by blocking unapproved applications and defending against unknown malware. Given our exposure to frequent malware, ThreatLocker, through TAISE's expert implementation, has proven invaluable ThreatLocker Protect is very simple and easy to understand. You do not need much technical knowledge to be able to use it. It is very good. Anybody with a bit of IT knowledge is able to handle it. Ringfencing adds an extra layer of defense. If an application is compromised, you can just exclude the computer and do your troubleshooting and find out what the problem was. It goes hand in hand with application whitelisting. It has been very helpful. It adds an extra security system which is very much needed for our infrastructure. ThreatLocker Protect has improved my organization greatly. Before using ThreatLocker Protect, we experienced a malware attack that caused significant damage, corrupting many of our files. Since implementing ThreatLocker Protect, we have not faced any such issues, and our operations have been smooth. We were able to realize its benefits immediately. No user can install any unknown applications or unauthorized applications on their own. I have been able to manage my systems effectively without any malware. ThreatLocker Protect has reduced our help desk tickets by about 40%, as every software they use is approved by me before use, limiting unauthorized installations. ThreatLocker Protect has freed up a lot of time. I do not have to do much with the help desk because our systems are protected with ThreatLocker Protect.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Two or three years ago when the WannaCry virus struck, the people that were on Cylance were the ones that weren't affected."
"The solution is stable."
"The solution is pretty easy to scale."
"On the management side, we liked the way it displays things."
"The most valuable feature of CylancePROTECT is the support."
"We are quite security-focused. Blackberry Protect as an endpoint solution for our service really delivers what we are expecting."
"The most valuable features of CylancePROTECT are its powerful machine-learning capabilities and predictive intelligence."
"Blackberry Protect offers endpoint protection. It's easy to deploy. It's scalable and stable."
"ThreatLocker's most valuable feature is its scanning capability, which executes all types of executable files."
"The most valuable feature is selective elevation, which allows elevating an individual process to admin privilege without granting admin privilege to that user, which has been by far the most useful feature outside of the overall solution itself."
"The biggest improvement has been knowing that something unauthorized isn't going to get installed on anyone’s machines."
"Allowlisting, in general, is valuable because it allows us to have a lot more granular control over what is executed on a desktop. We are also able to ringfence known vectors of attack through Office applications, email, browsers, etc."
"Application control, ring-fencing, and storage control are the most important features, followed closely by elevation."
"The most valuable feature is probably the ability to block programs from running. ThreatLocker has some built-in features that make it super easy. You can also contact their support within the program. If you're having issues, you can click on that button and connect with someone in five to 10 seconds."
"ThreatLocker Allowlisting has all of these features integrated into one console, making it effective."
"We use ThreatLocker's Allowlisting to whitelist specific applications and prevent unauthorized software from running."
 

Cons

"It was not effective. There were a lot of false positives, even when we use Adobe, and everybody uses Adobe, which is not a threat."
"rom my experience interacting with the primary or the central administrative console, it's quite complex. You would need a fair bit of technical experience to set it up, implement and maintain it. That would be one area for improvement."
"It should have better support for Windows and Mac."
"​It needs real analysis of quarantined files. The EDR product isn't showing much right now."
"The stability could be improved."
"The product must make the interface a little more user-friendly."
"The security scripting needs improvement. It needs deeper security for scripting."
"We would like to see secure integration and multi-factor authentication to be able to access the administration dashboard."
"ThreatLocker's technical support process could be streamlined by reducing the number of steps required to reach a human agent."
"It would be beneficial to have a tighter integration into PSA systems so that approvals can be done directly without having to leave the PSA."
"From a reporting perspective, enhancing the ability to customize reports would be beneficial."
"The snapshots used in the ThreatLocker University portal are outdated snippets and have not been updated in conjunction with the portal itself."
"The support could be quicker. There are times when there is a delay in getting a response. This is problematic when immediate attention is needed."
"ThreatLocker Allowlisting needs to improve its user interface and overall workflow."
"ThreatLocker would benefit from incorporating an antivirus feature or comprehensive 24-hour log monitoring, a valuable enhancement for both business and enterprise-level users."
"A valuable addition to ThreatLocker would be a column in the audit page displaying a VirusTotal score for each file."
 

Pricing and Cost Advice

"The solution's pricing is around the same as most EDRs but slightly behind some of the major ones."
"Currently, we have competitive pricing for Cylance, which is affordable enough to consider."
"Review closely how many endpoints you actually need before buying into a pricing level. Deal and deal with the VAR of your choice."
"We pay our license on a yearly basis and have just renewed for two years."
"The tool is not that expensive."
"It's not so heavily priced; rather, it's average and decent."
"I think that the price we are paying is good for what it is."
"We would just add more if there are new users, but right now you just need one license for per user."
"The pricing is fair and there is no hard sell."
"Others say ThreatLocker is too expensive, and I tell them they're dreaming. It's well-priced for what it does."
"Although the pricing seems good, there have been inconsistencies in contract negotiations."
"The price is very reasonable, and we have been able to integrate ThreatLocker with all of our clients."
"Considering what this product does, ThreatLocker is very well-priced, if not too nicely priced for the customer."
"I can't complain. Cheaper would always be nice, but I think it's reasonable compared to other software in the cybersecurity market."
"Its price is fair. They have added some additional things to it beyond allowlisting. They are up-charging for them, but in terms of the value we get and the way it impacts us, we get a bang for our buck with ThreatLocker than a lot of our other security tools."
"The pricing is reasonable and normal. I do not have any problems with the cost."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
838,713 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
15%
Manufacturing Company
12%
Government
8%
Financial Services Firm
7%
Computer Software Company
37%
Retailer
8%
Financial Services Firm
5%
Manufacturing Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Blackberry Protect?
It is a good endpoint solution. It is very easy to manage and detect the threat immediately. It will take the necessary actions.
What is your experience regarding pricing and costs for Blackberry Protect?
The price is reasonable for us at the moment. I rate the overall solution an eight out of ten.
What needs improvement with Blackberry Protect?
I face challenges with the exclusion policy - it still scans folders we told it not to, causing issues. When we contact support, they tell us to update the latest agent, but we can't do that immedi...
What do you like most about ThreatLocker Allowlisting?
The interface is clean and well-organized, making it simple to navigate and find what we need.
What is your experience regarding pricing and costs for ThreatLocker Allowlisting?
I handle the technical aspects, while my manager deals with pricing. Although the pricing seems good, there have been inconsistencies in contract negotiations. What we are told during calls sometim...
What needs improvement with ThreatLocker Allowlisting?
ThreatLocker would benefit from incorporating an antivirus feature or comprehensive 24-hour log monitoring, a valuable enhancement for both business and enterprise-level users.
 

Also Known As

Blackberry Protect
Protect, Allowlisting, Network Control, Ringfencing
 

Overview

 

Sample Customers

Panasonic, Noble Energy, Apria Healthcare Group Inc., Charles River Laboratories, Rovi Corporation, Toyota, Kiewit
Information Not Available
Find out what your peers are saying about BlackBerry Cylance Cybersecurity vs. ThreatLocker Zero Trust Endpoint Protection Platform and other solutions. Updated: January 2025.
838,713 professionals have used our research since 2012.