No more typing reviews! Try our Samantha, our new voice AI agent.

BlackBerry Cylance Cybersecurity vs VMware Carbon Black Endpoint comparison

Sponsored
 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 8, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex XDR by Palo Alto Net...
Sponsored
Ranking in Endpoint Protection Platform (EPP)
5th
Average Rating
8.4
Reviews Sentiment
6.8
Number of Reviews
109
Ranking in other categories
Endpoint Detection and Response (EDR) (7th), Extended Detection and Response (XDR) (6th), Ransomware Protection (2nd), AI-Powered Cybersecurity Platforms (2nd)
BlackBerry Cylance Cybersec...
Ranking in Endpoint Protection Platform (EPP)
24th
Average Rating
8.0
Reviews Sentiment
4.6
Number of Reviews
44
Ranking in other categories
No ranking in other categories
VMware Carbon Black Endpoint
Ranking in Endpoint Protection Platform (EPP)
35th
Average Rating
7.8
Reviews Sentiment
6.7
Number of Reviews
64
Ranking in other categories
Security Incident Response (6th), Endpoint Detection and Response (EDR) (36th), Ransomware Protection (8th)
 

Mindshare comparison

As of April 2026, in the Endpoint Protection Platform (EPP) category, the mindshare of Cortex XDR by Palo Alto Networks is 3.5%, down from 4.0% compared to the previous year. The mindshare of BlackBerry Cylance Cybersecurity is 1.3%, up from 1.2% compared to the previous year. The mindshare of VMware Carbon Black Endpoint is 1.8%, up from 1.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Endpoint Protection Platform (EPP) Mindshare Distribution
ProductMindshare (%)
Cortex XDR by Palo Alto Networks3.5%
BlackBerry Cylance Cybersecurity1.3%
VMware Carbon Black Endpoint1.8%
Other93.4%
Endpoint Protection Platform (EPP)
 

Featured Reviews

ABHISHEK_SINGH - PeerSpot reviewer
Senior Process Expert at A.P. Moller - Maersk
Gained full visibility and streamlined threat detection through behavior-based insights and AI integration
Initially, we got to have a lot of false positives when we onboarded, but nowadays it's quite smooth. We have fine-tuned our security policies and allowed different levels of policies to get rid of those false positives. Currently, we are getting a fairly good amount of incidents that are not false positives or benign, but actionable items. The process is streamlined. In the initial days, the operations used to get involved in a lot of benign and other activities, but now the process is streamlined. We are leveraging the auto-detection and remediation plans. The operations teams are now more involved in other business roles as well, not just looking into the logs and fetching out what's happening there. They have fixed a lot of things. Initially, they didn't have IAC code drift detection, cloud posture management, or security posture management, but they have those now. They purchased different vendors and did a merger with that. They have now Prisma Cloud that gets integrated and now they are working with Cortex Cloud. Everything that was negative has now been addressed, and the product altogether looks to be in a very better and mature shape now. Currently, it's more or less detecting the workloads with AI-based best practices. Since most organizations are consuming AI agents and other things, we are looking forward to seeing what other feature enhancements Palo Alto can support in that.
Sooraj Makkancherrry - PeerSpot reviewer
Security Operations Manager at Philips
Doesn't have daily updates, which is important for healthcare IT
I face challenges with the exclusion policy - it still scans folders we told it not to, causing issues. When we contact support, they tell us to update the latest agent, but we can't do that immediately due to medical device protocols and validation testing. I wish support would try to understand our issues better instead of giving this standard response. The machine learning feature they use often tells us to upgrade the agent or add things to the exclusion list, which isn't unacceptable. It's a very good and new technology as a tool and antivirus. But sometimes, it doesn't work properly with our medical devices and products, quarantining files it shouldn't even after we add them to exclusions. This is tricky for us.
reviewer2689206 - PeerSpot reviewer
Senior VP, Technology & Leading Technology Office at a outsourcing company with 1,001-5,000 employees
Behavior analytics has strengthened threat prediction yet still needs to improve overall standing
Regarding the real-time monitoring feature with VMware Carbon Black Endpoint, it is helpful in addressing unseen threats. I find the behavior analysis feature beneficial. I assess VMware Carbon Black Endpoint's machine learning capabilities in detecting unknown threats as fantastic. The behavior and analytics feature employs machine learning, and these are features which make the product and give that distinguishing, differentiating factor. The intelligent threat hunting capabilities have impacted my customers' cybersecurity efforts by giving them the edge to be prepared well in advance. Whenever this feature provides prediction, you know what action to take. You are aware of a possible attack and what kind of attack it may be, so you are much better prepared.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"When the pandemic started, Palo Alto came up with many solutions, which helped with the quick shift from on-premises to the cloud."
"Cortex XDR features advanced threat detection capabilities."
"The initial setup is pretty easy."
"Traps pays for itself within the first 16 months of a three-year subscription."
"The most valuable for us is the correlation feature."
"It is an easy-to-use tool."
"The stability of the solution is very good. We have about 100 users on it right now, and we use it twice a week."
"Traps is quite a stable product. Once it was properly deployed and configured, you have nothing to be worried about."
"In most cases, the solution's ability to detect in the MITRE framework, and its ability to be able to detect attacks in any one of seven or eight different areas of the life cycle of an attack is very useful."
"From an administrative overhead point of view, there is a 75% reduction in administrating the solution."
"It secures different entry points into the network."
"It works well and covers a good number of the bases you need covered for general cybersecurity and vulnerability management."
"A user can continue to add endpoints and the solution will continue to perform well."
"CylancePROTECT is very stable - we've had no issues with performance and no errors or bugs."
"My advice to someone considering this solution is that it's a popular product and you should really go for it."
"It is extremely simple to manage and deploy."
"The best feature of this solution is that we have a live response, which is really tailored to our needs."
"We have another piece of that infrastructure that does what they call threat emulation. It's like sandboxing where it takes files that it doesn't know about, puts them in a VM-type environment, and it kicks them off to see if there's any malware or tendencies that might look like malware, that kind of thing."
"The most valuable asset is the time-lining capability for any breach activity."
"Some of the valuable features I have found are the online documentation of the solution is well organized and thorough. I like the simplicity of bypass and the visualization of the active components."
"Behavioral Monitoring stops known malicious events before they even begin."
"What I like the most about it is the dynamic grouping, where you get to group endpoints based on setup criteria, and I like the simplified policy management and simplified white-listing process."
"The portal is easy to use and manage."
"While there is an IR team that is responsible for managing EDR or deep analytics, our focus is on endpoint and antivirus protection, where we encounter signature updates, look for false positives in their relation to file interpretation, and can instantly respond by putting a policy in place to immediately stop the false positives instead of sending a sample and waiting for coverage."
 

Cons

"It is not a suitable solution if you are looking for a single product with multiple features such as DLP, encryption, rollback, etc."
"It should support more mobile operating systems. That is one of the cons of their infrastructure right now."
"The solution should add unwanted malicious hash values to a block list so that whenever the action is triggered, it will automatically prevent the malicious content."
"The configuration could be simplified. I would like to see better protection, specifically to protect email applications."
"For working with the solution, you only really need a web browser, however, we've found that working on Chrome, for example, is horrible."
"The solution eats memory of the computer, unlike anything I've ever seen."
"The technical support is not very good. I find the process difficult."
"The installation should be easier and the Palo Alto pre-sales and sales teams should have more information on the product because they don't know what they are selling."
"I would like to see a better UI in terms of sifting through more specific data and providing analytics. A little bit more would be nice."
"The stability could be improved."
"Technical support is bad. I am not happy with the level of support they offer."
"It was not effective. There were a lot of false positives, even when we use Adobe, and everybody uses Adobe, which is not a threat."
"The OPTICS component could be made more user-friendly with respect to giving people more information."
"CylancePROTECT could be improved in its technical support and communication."
"The product does not do a lot of reporting on what it is taking care of. Enhanced reporting would be a welcome improvement."
"It needs real analysis of quarantined files. The EDR product isn't showing much right now."
"The node management could be much better. The one thing that they cannot do very easily is change the tenant from a backend."
"With the on-prem one, the bug has been reported by the community in early January or February, something like that, at the beginning of the year, and it's still not addressed."
"There are many different controls that are needed to be put into place for upgrading that makes it difficult. Having to re-engineer your IT infrastructure to match their software, as opposed to having it integrate and work independently causes difficulties. When there is an update to any software everyone has to be involved."
"I am not sure whether Carbon Black CB Defense can be considered as a stable solution or not."
"What was rolled out to my company are mixed versions of Carbon Black CB Defense, so what I'd like to see in the next release is more synchronization, where it can detect the endpoint that's running an old version and suggest updates."
"The solution needs expanded endpoint query tools."
"Stability is one thing that's not robust. Other products are faster, but as far as the CB Defense, it's slow."
"The local technical support is very poor, but the support from headquarters is very nice."
 

Pricing and Cost Advice

"If one wishes to work with another team or large number of users at a future point, he must purchase a license for them."
"I am using the Community edition."
"It is cost-effective compared to similar solutions. It fits for the small businesses through to the big businesses."
"Our customers have expressed that the price is high."
"It has a higher cost than other solutions, like CrowdStrike or Microsoft’s EDR tools, but it reduces the cost of our operations because it’s a new generation antivirus tool."
"It's the most expensive solution, but features-wise, it's quite strong. It's very good for protection, so the results are very good in the case of protection. I would rate it a two out of ten in terms of pricing."
"The cost of Cortex XDR by Palo Alto Networks is $55 to $90 USD per endpoint per month."
"The pricing is a little high. It is per user per year."
"We would just add more if there are new users, but right now you just need one license for per user."
"We pay our license on a yearly basis and have just renewed for two years."
"The licensing part of the product is too expensive compared to other solutions in the market."
"It's not so heavily priced; rather, it's average and decent."
"Review closely how many endpoints you actually need before buying into a pricing level. Deal and deal with the VAR of your choice."
"This cost of the license is approximately $5 USD monthly per user."
"The initial end-point cost may seem a little high (~$55/device/year) but when you look at the total peace of mind that the solution provides, with no reboots for updates, and negligible performance impact, it is well worth it."
"Do not get hung up on price. You pay for what you get and expensive will hurt one time, where cheap will hurt forever, especially if you fall victim to a ransom attack, etc.​"
"​The cost/benefit factor has great relevance in Cb Defense implementations​."
"It is more expensive, but it's worth it. There are no additional costs beyond the standard licensing fee."
"The pricing is very high."
"The price for the solution is completely at government level, meaning one which is very high."
"The solution has almost the same price as other different kinds of infrastructures, but it offers a lot of different features."
"The license is annual. It's a standard license."
"This is a really expensive product and we pay licensing fees on a yearly basis."
"The pricing [is] more or less the same as other similar solutions."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
885,837 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
14%
Financial Services Firm
12%
Comms Service Provider
7%
Manufacturing Company
7%
Construction Company
10%
Manufacturing Company
8%
Computer Software Company
8%
Comms Service Provider
6%
Financial Services Firm
10%
Manufacturing Company
9%
Government
8%
Comms Service Provider
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business44
Midsize Enterprise20
Large Enterprise48
By reviewers
Company SizeCount
Small Business33
Midsize Enterprise5
Large Enterprise13
By reviewers
Company SizeCount
Small Business31
Midsize Enterprise9
Large Enterprise31
 

Questions from the Community

Cortex XDR by Palo Alto vs. Sentinel One
Cortex XDR by Palo Alto vs. SentinelOne SentinelOne offers very detailed specifics with regard to risks or attacks. ...
Comparing CrowdStrike Falcon to Cortex XDR (Palo Alto)
Cortex XDR by Palo Alto vs. CrowdStrike Falcon Both Cortex XDR and Crowd Strike Falcon offer cloud-based solutions th...
How is Cortex XDR compared with Microsoft Defender?
Microsoft Defender for Endpoint is a cloud-delivered endpoint security solution. The tool reduces the attack surface,...
What do you like most about Blackberry Protect?
It is a good endpoint solution. It is very easy to manage and detect the threat immediately. It will take the necessa...
What is your experience regarding pricing and costs for Blackberry Protect?
The price is reasonable for us at the moment. I rate the overall solution an eight out of ten.
What needs improvement with Blackberry Protect?
I face challenges with the exclusion policy - it still scans folders we told it not to, causing issues. When we conta...
What to choose: an endpoint antivirus, an EDR solution or both?
I can recommend Carbon Black, an award-winning next-gen anti-virus (NGAV) and endpoint detection and response (EDR) s...
What's the difference between Carbon Black CB Response and Carbon Black CB Defense?
Carbon Black offers two different levels of Endpoint Detection and Response. One is the VM Carbon Black Cloud Endpoin...
 

Also Known As

Cyvera, Cortex XDR, Palo Alto Networks Traps
Blackberry Protect
Carbon Black CB Defense, Bit9, Confer
 

Overview

 

Sample Customers

CBI Health Group, University Honda, VakifBank
Panasonic, Noble Energy, Apria Healthcare Group Inc., Charles River Laboratories, Rovi Corporation, Toyota, Kiewit
Netflix, Progress Residential, Indeed, Hologic, Gentle Giant, Samsung Research America
Find out what your peers are saying about BlackBerry Cylance Cybersecurity vs. VMware Carbon Black Endpoint and other solutions. Updated: March 2026.
885,837 professionals have used our research since 2012.