In most cases, the solution's ability to detect in the MITRE framework, and its ability to be able to detect attacks in any one of seven or eight different areas of the life cycle of an attack is very useful.
Learn what your peers think about BlackBerry Cylance Cybersecurity. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
OT Cyber Security Principal Consultant at Jacobs Engineering Group Inc.
Real User
2020-12-01T03:07:13Z
Dec 1, 2020
The non-daily requirement to update signatures is the most valuable feature. From a functional point of view, it is pretty spot on. For instance, we compared an algorithm from five years ago to today's algorithm, and it was 98% accurate. It has the ability to detect and mitigate.
In the industrial environment that we work in, there's what we call OT versus IT. You are IT Central, but this is OT. Generally, we don't have the same level of skillset as IT individuals or IT professionals have. This particular product doesn't require you to be a computer scientist to be able to understand its proprietary algorithm and to be able to deploy, use, and work within it. It integrates well with a robust SIEM or SOAR solution, and it plays nice with others. We use other detection solutions like CyberX or site provision with Cisco, and it plays nice. That's one of the things we really liked about it.
Software Engineer at a tech services company with 1-10 employees
Real User
2019-03-11T07:21:00Z
Mar 11, 2019
It handles situations that the other threat management tools wouldn't find. It has worked well covering the weaker sides of the other products that we're integrating.
BlackBerry Cylance provides endpoint security, threat protection, and antivirus capabilities, using AI and machine learning for protection against malware and ransomware on desktops, servers, and virtual machines worldwide. Its AI-driven threat detection operates even with limited internet, facilitating effective threat management.BlackBerry Cylance's centralized dashboard simplifies threat management and vulnerability protection for organizations globally. The platform combines AI and...
A user can continue to add endpoints and the solution will continue to perform well.
In most cases, the solution's ability to detect in the MITRE framework, and its ability to be able to detect attacks in any one of seven or eight different areas of the life cycle of an attack is very useful.
It does a good job of protecting us.
I find the actual overall endpoint malware protection the most valuable feature of CylancePROTECT.
The most functional item that we use is the process to turn off the false flags that it causes.
The solution is very quick at easily changing the levels of protection for each computer and the server.
The non-daily requirement to update signatures is the most valuable feature. From a functional point of view, it is pretty spot on. For instance, we compared an algorithm from five years ago to today's algorithm, and it was 98% accurate. It has the ability to detect and mitigate.
In the industrial environment that we work in, there's what we call OT versus IT. You are IT Central, but this is OT. Generally, we don't have the same level of skillset as IT individuals or IT professionals have. This particular product doesn't require you to be a computer scientist to be able to understand its proprietary algorithm and to be able to deploy, use, and work within it. It integrates well with a robust SIEM or SOAR solution, and it plays nice with others. We use other detection solutions like CyberX or site provision with Cisco, and it plays nice. That's one of the things we really liked about it.
The most valuable features are script blocking and macros within Word documents for stopping unwanted applications from running in the background.
You can manage all the threats and everything from a centralized dashboard.
It secures different entry points into the network.
Has good RAM capacity for the power I need
Two or three years ago when the WannaCry virus struck, the people that were on Cylance were the ones that weren't affected.
The Application Guard and ByteGuard are useful features.
The solution is extremely scalable. It's got the hybrid functionality, it's got the system functionality and cloud functionality as well.
On the management side, we liked the way it displays things.
The solution is stable.
The solution is pretty easy to scale.
It handles situations that the other threat management tools wouldn't find. It has worked well covering the weaker sides of the other products that we're integrating.