Trellix Endpoint Security and BlackBerry Cylance Cybersecurity both compete in the endpoint security category. Trellix appears to have the upper hand with its robust central management and integration capabilities, while BlackBerry Cylance is noted for its lightweight design and AI-driven threat detection.
Features: Trellix offers robust central management, comprehensive integration capabilities, and a unified console for security activities. BlackBerry Cylance features a lightweight design, AI-driven threat detection, and efficient protection without frequent updates.
Room for Improvement: Trellix needs to improve usability and simplify configuration, especially for DLP policies. Enhancements in technical support response times and ease of use are also necessary. BlackBerry Cylance could improve its pricing model and support services. There's a need to better handle false positives and provide more informative threat notifications.
Ease of Deployment and Customer Service: Trellix offers diverse deployment options, including on-premises and cloud configurations, but faces criticism for setup complexities and technical support. BlackBerry Cylance is praised for its straightforward deployment process and highly rated customer service with swift resolutions.
Pricing and ROI: Trellix is perceived as a mid-range solution offering notable ROI through cost savings in recovery expenses. BlackBerry Cylance, while offering competitive pricing, has costs seen as comparatively high. Both solutions provide substantial value and effective threat prevention.
BlackBerry Cylance provides endpoint security, threat protection, and antivirus capabilities, using AI and machine learning for protection against malware and ransomware on desktops, servers, and virtual machines worldwide. Its AI-driven threat detection operates even with limited internet, facilitating effective threat management.
BlackBerry Cylance's centralized dashboard simplifies threat management and vulnerability protection for organizations globally. The platform combines AI and machine learning to deliver superior zero-day threat protection and minimize CPU usage, offering stable and accurate threat detection without frequent updates. It includes tools like CylanceOPTICS and CylancePERSONA for enhanced user behavior monitoring and adopts a proactive approach that effectively manages threats at various lifecycle stages. Renowned for stability and performance, it efficiently prevents unauthorized applications while maintaining system productivity.
What are the main features of BlackBerry Cylance?In the professional sector, BlackBerry Cylance is leveraged to protect crucial infrastructure through a robust approach accommodating environments with limited connectivity. Its widespread deployment in industries, including healthcare and finance, is attributed to its ease of deployment and comprehensive protection capabilities. However, enhancements in reporting, pricing structures, and technical support are avenues for development, reflecting user feedback for improving detection rates and overall dashboard usability.
Trellix Endpoint Security provides aggressive robust protection for every endpoint in an enterprise organization. Trellix uses dynamic threat intelligence and mounts a superb defense across the complete threat lifecycle. This solution will keep your organization more secure and resistant to any possible threat of risks. Trellix offers an amalgamated suite of next-generation endpoint security tools. These tools give users the benefit of machine learning, intuitive intelligence, and greater assistance to ensure their networks are being protected non-stop against threats - potential or realized - and can stop attacks before they happen. Trellix uses MDR (managed detection and response) and XDR (extended detection and response) to give users a comprehensive endpoint security solution.
Trellix Endpoint Security Benefits
Trellix Endpoint Security Top Features
Reviews from Real Users
“It has a great console. We can manage everything from the central console and it is very easy. Every year we are getting the benefits of legacy also. It's easy to set up.” - S Fazlul H., IT Lead Engineer, Information Technology at Banglalink
“There is a new feature where you can set thresholds for all the CPU consumption allowing for no consumption on the servers when the scans happen. It is a separate plugin or addon, and if we have it on all the virtual machines it automatically checks the resources, and based on that, it will schedule the scans. That is something that I have not seen in other antivirus solutions, such as Symantec.” - Sabari K. Senior Engineer at a comms service provider
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.