

BlackBerry Cylance Cybersecurity and VMware Carbon Black Endpoint compete in the cybersecurity category, focusing on endpoint protection. VMware Carbon Black Endpoint appears to have the upper hand, given its deeper attack lifecycle insights and superior technical support.
Features: BlackBerry Cylance Cybersecurity emphasizes AI-based protection with minimal resource consumption and no need for constant updates. It provides centralized management and deployment that is lightweight against zero-day threats. VMware Carbon Black Endpoint offers detailed threat analysis, leverages cloud-based detection, and provides comprehensive visibility into endpoint events. It integrates well into broader IT environments, enhancing security measures and providing deeper insight into the attack lifecycle.
Room for Improvement: BlackBerry Cylance Cybersecurity could improve its UI, reporting, and false positive handling. Users suggest better integration for industrial settings and more effective support and pricing models. VMware Carbon Black Endpoint needs better alert prioritization, reporting, and integration responsiveness. Users express a need for enhanced proxy server management, endpoint compatibility, and more automation in threat detection operations.
Ease of Deployment and Customer Service: BlackBerry Cylance Cybersecurity supports diverse deployments, including cloud, on-premises, and hybrid environments, but experiences varied feedback on technical support, often citing delays. VMware Carbon Black Endpoint enjoys praise for its versatile deployment and excellent technical support, with a focus on customer service.
Pricing and ROI: BlackBerry Cylance Cybersecurity is seen as costly, yet valuable for its proactive security, though high licensing fees raise concerns compared to competitors. VMware Carbon Black Endpoint is also expensive, with mixed perceptions of cost-effectiveness. Both products claim significant ROI through labor savings and enhanced security, yet users vary in their assessments of value.
| Product | Market Share (%) |
|---|---|
| BlackBerry Cylance Cybersecurity | 1.2% |
| VMware Carbon Black Endpoint | 1.8% |
| Other | 97.0% |

| Company Size | Count |
|---|---|
| Small Business | 33 |
| Midsize Enterprise | 5 |
| Large Enterprise | 13 |
| Company Size | Count |
|---|---|
| Small Business | 31 |
| Midsize Enterprise | 9 |
| Large Enterprise | 31 |
BlackBerry Cylance Cybersecurity leverages AI and machine learning for efficient malware detection and zero-day threat protection, offering robust endpoint security with high detection accuracy and low false positive rates.
BlackBerry Cylance Cybersecurity delivers advanced threat protection with AI-driven algorithms and machine learning. Its lightweight design ensures low system resource usage, making it both efficient and effective. It's recognized for centralized management, easy deployment, and a clean interface, providing comprehensive endpoint protection against diverse threats. The integration of features like CylanceOPTICS and behavioral monitoring enhances security insights. While the system excels in malware detection, enhancements are needed in areas like user interface design, reporting, deeper threat analysis, and integration with third-party systems. Support and pricing improvements could also increase competitiveness.
What are the key features of BlackBerry Cylance Cybersecurity?Organizations deploy BlackBerry Cylance Cybersecurity for threat analytics, log management, and endpoint protection. As an antivirus replacement, it protects against zero-day malware, ransomware, and various threats. Its AI algorithms detect anomalies, minimizing risks in both internet-connected and isolated environments. Many businesses incorporate it into wider security strategies, appreciating its centralized management and proactive defense capabilities.
VMware Carbon Black Endpoint enhances endpoint security with its robust EDR, threat detection, and live response features. The cloud-based architecture supports remote management and easy setup while behavioral monitoring and dynamic grouping minimize security risks.
VMware Carbon Black Endpoint is designed for those seeking comprehensive endpoint protection. With its cloud-based deployment, organizations experience streamlined remote control and simplified rollout processes. Its behavioral monitoring, incident response capabilities, and firewall integration deliver advanced security measures. Although it addresses many security challenges, areas like manual alert management, on-demand scanning, and integration with systems like AlienVault USM require refinement. Improved UI, EDR components, and flexible pricing models would enhance user satisfaction. On-premise deployment infrastructure and compatibility issues with some operating systems need attention. Enhanced reporting, container security, and multi-tenancy support are also essential for fulfilling industry needs. AI-driven analysis and threat isolation empower companies by fostering proactive management.
What are the key features of VMware Carbon Black Endpoint?
What benefits should users look for when evaluating VMware Carbon Black Endpoint?
VMware Carbon Black Endpoint finds extensive application in industries focused on stringent security requirements. Managed security service providers leverage its capabilities to deliver comprehensive protection to multiple clients worldwide. Organizations use it primarily for antivirus protection and incident management, integrating it with their existing security frameworks to strengthen endpoint visibility and real-time threat prevention. Its advanced detection and application control features make it a preferred choice in industries that prioritize robust security measures. However, it requires improvements in terms of system compatibility and customization flexibility to better serve diverse industry environments.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.