CylancePROTECT is our antivirus replacement that was deployed on every workstation and server. We intend to block anything malicious, except we had to maintain a list of white lists. We had white lists from members to protect certain areas of Cylance. We had to whitelist and maintain it. There were around over 200 exemptions within our environment that I didn't like. With CrowdStrike, we have two exemptions so far.
Computer Security and Electronic Government Section at a government with 51-200 employees
Real User
Top 20
2024-04-29T20:31:44Z
Apr 29, 2024
We utilize the solution to safeguard approximately 500 users against malware threats. It notifies us via email about any suspicious files or activities.
Division Manager, Information Technology at Lonestar
Real User
Top 5
2024-04-01T09:06:03Z
Apr 1, 2024
I used the solution in my company after we tested it against a ransomware attack. In my company, we presented CylancePROTECT with the challenge of dealing with real-time ransomware attacks, during which we saw that it works very well. In my company, we use the tool to control our devices since its device control feature is excellent. Compared to the other vendors in the market, CylancePROTECT has a much shorter turnaround time for policy applications. Otherwise, we can have granular controls over what can be run on the endpoint machines when it comes to areas involving scripting or running PowerShell scripts. Scripting or running PowerShell scripts can be controlled very well through CylancePROTECT.
Learn what your peers think about BlackBerry Cylance Cybersecurity. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
We use it for protecting our endpoints. We have a specific use case involving a closed and secure environment devoid of internet connectivity, where Cylance is utilized due to its ability to operate without requiring updates for at least twelve months.
IT Cyber Security Engineer at a legal firm with 201-500 employees
Real User
2022-11-09T18:10:09Z
Nov 9, 2022
We use CylancePROTECT for import protection, which is why we got it. We switched from one product to another, believing this would be a better fit based on what we were informed, but it just didn't work as it should.
IT Infrastructure Manager at a financial services firm with 51-200 employees
Real User
2021-07-15T16:16:48Z
Jul 15, 2021
We are currently using Blackberry Protect as our main endpoint solution, for threat prevention, script control, and scanning of malware. This is the core functionality of the Protect module. We have the Blackberry Optics, which is the AI module of Blackberry Protect. It is called Blackberry Protect Plus Optics. The Optics feature logs all of the behavior of the servers. For example, when someone runs a PowerShell script and it blocks, it will learn the behavior and knows what to do the next time another user triggers that specific functionality. It is currently deployed on-premises but our administration dashboard is in the cloud. The agents are installed for our servers and reporting is to the Blackberry cloud.
The solution is primarily used as the last line of defense for the customer. In regards to network security technologies that focus on protecting the network, the endpoint, if something gets through, someone brings it in, the endpoint protection will actually, as our last line of defense, detect it, prevent it from executing, and in some cases, actually remediate the issue. This solution is the last line of defense within your organization for events such as a breach and it also protects users.
Coordinator of special projects at a manufacturing company with 201-500 employees
Real User
2021-02-04T02:54:55Z
Feb 4, 2021
Our primary use case of this product is for protection of our computers and network. I'm the coordinator of special projects and we are customers of CyclancePROTECT.
OT Cyber Security Principal Consultant at Jacobs Engineering Group Inc.
Real User
2020-12-01T03:07:13Z
Dec 1, 2020
I direct our design and engineering teams, and we craft solutions for on-premises or autonomous networks in the industrial industry, such as oil and gas, water, and manufacturing. We use this solution as a layered defense for the defense strategy for our on-premises clients. An attractive thing about this solution is that it uses AI official algorithms to not only discover known stuff but also to discover anomalous behavior and things that are out of the ordinary. It is not just signature-based; it is an algorithm or AI and machine learning.
VP at a tech services company with 11-50 employees
Reseller
2020-11-02T18:45:06Z
Nov 2, 2020
We are resellers and CylancePROTECT is one of the products that we offer to our customers. The standard configuration is an agent that is deployed to every workstation. It protects against malware, scripting, and other threats using its built-in AI business logic.
Vice President Operations at a construction company with 11-50 employees
Real User
2020-10-06T06:57:40Z
Oct 6, 2020
CylancePROTECT came packaged with our HR and IT management system, which was a selling point. It allows us to ensure that every single computer is always up to date as far as vulnerability protection and we can manage all the threats and everything from a centralized dashboard.
Security Domain Architect at a tech services company with 5,001-10,000 employees
MSP
2020-06-15T07:33:55Z
Jun 15, 2020
Our primary use case for the solution is for endpoint security. It protects your computer or any other device from any malware, APT or spyware. We are customers and I'm the security domain architect of the company.
We are a solution provider and this is one of the security products that we implement for our customers. My biggest customers are two pharmacies and a bank and this makes up part of their security solution.
Director of IT Operations at a manufacturing company with 1,001-5,000 employees
Real User
2020-01-22T12:44:00Z
Jan 22, 2020
We are currently using CylancePROTECT and CyclanceOPTICS. Our primary use case is an anti-virus solution. It is deployed globally throughout the organization.
BlackBerry Cylance provides endpoint security, threat protection, and antivirus capabilities, using AI and machine learning for protection against malware and ransomware on desktops, servers, and virtual machines worldwide. Its AI-driven threat detection operates even with limited internet, facilitating effective threat management.BlackBerry Cylance's centralized dashboard simplifies threat management and vulnerability protection for organizations globally. The platform combines AI and...
I am using CylancePROTECT as an active learning algorithm. We installed it on almost 20,000 servers and virtual machines.
CylancePROTECT is our antivirus replacement that was deployed on every workstation and server. We intend to block anything malicious, except we had to maintain a list of white lists. We had white lists from members to protect certain areas of Cylance. We had to whitelist and maintain it. There were around over 200 exemptions within our environment that I didn't like. With CrowdStrike, we have two exemptions so far.
We utilize the solution to safeguard approximately 500 users against malware threats. It notifies us via email about any suspicious files or activities.
We use the solution for endpoint protection.
I used the solution in my company after we tested it against a ransomware attack. In my company, we presented CylancePROTECT with the challenge of dealing with real-time ransomware attacks, during which we saw that it works very well. In my company, we use the tool to control our devices since its device control feature is excellent. Compared to the other vendors in the market, CylancePROTECT has a much shorter turnaround time for policy applications. Otherwise, we can have granular controls over what can be run on the endpoint machines when it comes to areas involving scripting or running PowerShell scripts. Scripting or running PowerShell scripts can be controlled very well through CylancePROTECT.
Our clients use CylancePROTECT for endpoint detection and antivirus.
We use it for protecting our endpoints. We have a specific use case involving a closed and secure environment devoid of internet connectivity, where Cylance is utilized due to its ability to operate without requiring updates for at least twelve months.
I use CylancePROTECT to secure our enterprise against malware, ransomware, and emerging threats.
We use CylancePROTECT for endpoint Protection and EDR.
The product is perfect for the business that I am working in. It works as needed.
I work in cybersecurity and with sensitive materials, so the solution is a proactive antivirus system.
My company uses CylancePROTECT as an antivirus solution, installed on each PC.
We use CylancePROTECT for import protection, which is why we got it. We switched from one product to another, believing this would be a better fit based on what we were informed, but it just didn't work as it should.
The best use case is that it actually lifts off a lot of burden on customers, especially when they are deploying Cylance compared to other solutions.
We are mainly using this solution on our desktop PCs. It provides endpoint protection.
We are currently using Blackberry Protect as our main endpoint solution, for threat prevention, script control, and scanning of malware. This is the core functionality of the Protect module. We have the Blackberry Optics, which is the AI module of Blackberry Protect. It is called Blackberry Protect Plus Optics. The Optics feature logs all of the behavior of the servers. For example, when someone runs a PowerShell script and it blocks, it will learn the behavior and knows what to do the next time another user triggers that specific functionality. It is currently deployed on-premises but our administration dashboard is in the cloud. The agents are installed for our servers and reporting is to the Blackberry cloud.
I use this solution as a customer and I provide services for my clients. We are system integrators and we use this solution for endpoint security.
We use this solution for endpoint protection for our external devices and laptops.
I primarily use the solution for security purposes. I use it for endpoint protection and response. That's the only real use case for us.
The solution is primarily used as the last line of defense for the customer. In regards to network security technologies that focus on protecting the network, the endpoint, if something gets through, someone brings it in, the endpoint protection will actually, as our last line of defense, detect it, prevent it from executing, and in some cases, actually remediate the issue. This solution is the last line of defense within your organization for events such as a breach and it also protects users.
Our primary use case of this product is for protection of our computers and network. I'm the coordinator of special projects and we are customers of CyclancePROTECT.
We use CylancePROTECT for overall endpoint malware protection.
We put the product on all of our desktops and servers.
We primarily use the solution to protect us against ransomware.
I direct our design and engineering teams, and we craft solutions for on-premises or autonomous networks in the industrial industry, such as oil and gas, water, and manufacturing. We use this solution as a layered defense for the defense strategy for our on-premises clients. An attractive thing about this solution is that it uses AI official algorithms to not only discover known stuff but also to discover anomalous behavior and things that are out of the ordinary. It is not just signature-based; it is an algorithm or AI and machine learning.
We are resellers and CylancePROTECT is one of the products that we offer to our customers. The standard configuration is an agent that is deployed to every workstation. It protects against malware, scripting, and other threats using its built-in AI business logic.
CylancePROTECT came packaged with our HR and IT management system, which was a selling point. It allows us to ensure that every single computer is always up to date as far as vulnerability protection and we can manage all the threats and everything from a centralized dashboard.
Our primary use case for the solution is for endpoint security. It protects your computer or any other device from any malware, APT or spyware. We are customers and I'm the security domain architect of the company.
Our primary use case is for protection.
We are a solution provider and this is one of the security products that we implement for our customers. My biggest customers are two pharmacies and a bank and this makes up part of their security solution.
We are currently using CylancePROTECT and CyclanceOPTICS. Our primary use case is an anti-virus solution. It is deployed globally throughout the organization.
We did a POC with Cylance, Bitdefender and ESAT. Cylance picked up Zero-Day Malware that the other two solutions did not quarantine.
We use this product as our antivirus solution.
We are part of a startup company that is operating in the same domain as this solution, so we tested it as part of the competition.