Learn what your peers think about BlackBerry Cylance Cybersecurity. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
In most cases, the solution's ability to detect in the MITRE framework, and its ability to be able to detect attacks in any one of seven or eight different areas of the life cycle of an attack is very useful.
OT Cyber Security Principal Consultant at Jacobs Engineering Group Inc.
Real User
2020-12-01T03:07:13Z
Dec 1, 2020
The non-daily requirement to update signatures is the most valuable feature. From a functional point of view, it is pretty spot on. For instance, we compared an algorithm from five years ago to today's algorithm, and it was 98% accurate. It has the ability to detect and mitigate.
In the industrial environment that we work in, there's what we call OT versus IT. You are IT Central, but this is OT. Generally, we don't have the same level of skillset as IT individuals or IT professionals have. This particular product doesn't require you to be a computer scientist to be able to understand its proprietary algorithm and to be able to deploy, use, and work within it. It integrates well with a robust SIEM or SOAR solution, and it plays nice with others. We use other detection solutions like CyberX or site provision with Cisco, and it plays nice. That's one of the things we really liked about it.
BlackBerry Cylance provides endpoint security, threat protection, and antivirus capabilities, using AI and machine learning for protection against malware and ransomware on desktops, servers, and virtual machines worldwide. Its AI-driven threat detection operates even with limited internet, facilitating effective threat management.BlackBerry Cylance's centralized dashboard simplifies threat management and vulnerability protection for organizations globally. The platform combines AI and...
It is a good endpoint solution. It is very easy to manage and detect the threat immediately. It will take the necessary actions.
I rate the tool a ten out of ten when it comes to the ease of use or management part.
The most valuable feature of CylancePROTECT is the support.
I've found the AI engine in CylancePROTECT to be particularly effective for technology and in preventing unknown threats.
The most valuable features of CylancePROTECT are its powerful machine-learning capabilities and predictive intelligence.
CylancePROTECT works on AI technology, is always up to date, and uses very few resources on your devices.
The solution’s AI is its most valuable feature.
It actively monitors the behavior and activity of processes and will, without hesitation, terminate at root anything it determines to be suspect.
What I like best about CylancePROTECT is its accuracy, as it doesn't give many false positives.
The solution is easy to deploy.
CylancePROTECT is very stable - we've had no issues with performance and no errors or bugs.
Blackberry Protect offers endpoint protection. It's easy to deploy. It's scalable and stable.
We are quite security-focused. Blackberry Protect as an endpoint solution for our service really delivers what we are expecting.
I like the AI and mathematical components that they use.
The deployment of updates is easy.
A user can continue to add endpoints and the solution will continue to perform well.
In most cases, the solution's ability to detect in the MITRE framework, and its ability to be able to detect attacks in any one of seven or eight different areas of the life cycle of an attack is very useful.
It does a good job of protecting us.
I find the actual overall endpoint malware protection the most valuable feature of CylancePROTECT.
The most functional item that we use is the process to turn off the false flags that it causes.
The solution is very quick at easily changing the levels of protection for each computer and the server.
The non-daily requirement to update signatures is the most valuable feature. From a functional point of view, it is pretty spot on. For instance, we compared an algorithm from five years ago to today's algorithm, and it was 98% accurate. It has the ability to detect and mitigate.
In the industrial environment that we work in, there's what we call OT versus IT. You are IT Central, but this is OT. Generally, we don't have the same level of skillset as IT individuals or IT professionals have. This particular product doesn't require you to be a computer scientist to be able to understand its proprietary algorithm and to be able to deploy, use, and work within it. It integrates well with a robust SIEM or SOAR solution, and it plays nice with others. We use other detection solutions like CyberX or site provision with Cisco, and it plays nice. That's one of the things we really liked about it.
The most valuable features are script blocking and macros within Word documents for stopping unwanted applications from running in the background.
You can manage all the threats and everything from a centralized dashboard.
It secures different entry points into the network.
Has good RAM capacity for the power I need
Two or three years ago when the WannaCry virus struck, the people that were on Cylance were the ones that weren't affected.
The Application Guard and ByteGuard are useful features.
The solution is extremely scalable. It's got the hybrid functionality, it's got the system functionality and cloud functionality as well.
On the management side, we liked the way it displays things.
The solution is stable.
The solution is pretty easy to scale.