BlackBerry Named 2023 Customers’ Choice for Endpoint Protection Platforms on Gartner Peer Insights
Detect Quickly, Respond Effectively
With a 98.9 percent detection rate for both online or offline devices and an average better block rate of 36.8 percent over competitors, Cylance AI-driven endpoint security delivers the efficacy, efficiency, and automation needed for a superior security posture without the burden of heavy human resourcing.
Download this evaluation guide to understand what questions to ask when assessing endpoint security solutions.


Stop Threats with a Self-Defending AI Before They Cause Damage
Utilizes less than 6 percent of CPU processing power on average with a lightweight endpoint agent
Defends against malware, malicious scripts, zero-day threats, and fileless memory exploits
Stops 36 percent more attacks for offline devices


Getting the World-Class Security You Need with the Resources You Have
Automatically prevent zero-day threats and stop attacks immediately
Accurately detect lateral movement
Reduce security incident investigation and recovery time by 30 percent, and alert fatigue by 90 percent*


Excels in Any Environment
Utilizes single-pane-of-glass management with 90 percent less CPU consumption
Doesn’t require an Internet connection
Supports cloud-native, hybrid, and on-premises software stacks
By setting up Zero Trust, we eliminated almost a million dollars worth of spend simply because we no longer needed a security operations center monitoring our endpoints. Our data is safe, and our assets are walled off and protected. We were recently targeted by zero-day ransomware — CylancePROTECT stopped it in seventeen milliseconds.
— Collin Buechler, Information Security, Data Privacy & Compliance officer, ConvergeOne
Bluebird is a trusted name. To maintain that trust, we needed to make sure our security was bulletproof. BlackBerry software, coupled with managed security and response, was the perfect solution for us to do so.
Muhammad Suhada, Former Vice President of Information Technology, Bluebird Group
Together with BlackBerry, we are putting intelligent cyber technologies and skills in reach of any sized business—to help protect, enable, and defend against new threats.
Ceppy Djakaria, Vice President of Corporate Account Management, Telkomse
Professional-grade peace of mind. I've been using this product for the last three years and it's been nothing but painless. No nag screens pestering users about updates. It just works and it works very well.
Anonymous, Consumer Goods
Cylance is a quality product that keeps our systems safe and on the ready for any kind of anomalous activity. Even with the few false positives I feel at ease knowing I have a strong partner in my corner.
Anonymous, Healthcare and Biotech Industry
Award-Winning Endpoint Protection
CylanceENDPOINT products have been honored with a variety of industry awards.
Not applicable | Standard | Advanced | Pro |
---|---|---|---|
Formerly CylancePROTECT®
|
Formerly CylancePROTECT + CylanceOPTICS®
|
CylancePROTECT + CylanceOPTICS + Threat Intelligence
|
|
Fast, easy cloud-managed threat prevention for all of your Windows®, Mac®, Linux®, Android™, and iOS® devices.
|
Advanced endpoint threat visibility with investigation, response, and threat hunting across your devices.
|
Expert features to configure, prioritize, and understand endpoint threats and automate security event communications.
|
|
Broad OS Support
|
CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS | CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS | CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS |
Modern AI Protection
|
Advanced AI that detects threats before they cause damage | Advanced AI that detects threats before they cause damage | Advanced AI that detects threats before they cause damage |
Endpoint Alert Visibility and Prioritization
|
Autonomous grouping and correlation of alerts | Autonomous grouping and correlation of alerts | Autonomous grouping and correlation of alerts |
Advanced Threat Protection - PE, Memory Protection, and Script Control
|
Detects and stops malware, malicious scripts, zero-day threats, and memory exploits | Detects and stops malware, malicious scripts, zero-day threats, and memory exploits | Detects and stops malware, malicious scripts, zero-day threats, and memory exploits |
Device Control
|
Get visibility and control over USB devices to stop internal or external threats | Get visibility and control over USB devices to stop internal or external threats | Get visibility and control over USB devices to stop internal or external threats |
App Control
|
Control what applications are allowed or blocked anywhere | Control what applications are allowed or blocked anywhere | Control what applications are allowed or blocked anywhere |
Threat Hunting and Investigation Tools
|
Detection and monitoring tools to combat threats and stop attackers | Detection and monitoring tools to combat threats and stop attackers | |
Advanced Response Actions and Automated Workflows
|
Automated response to quickly stop and remediate attacks | Automated response to quickly stop and remediate attacks | |
30-Day Data Storage
|
Easily access historic data to aid in threat hunting and analysis | Easily access historic data to aid in threat hunting and analysis | |
Contextual Threat Intel Reports
|
Expertly crafted and customized cyber threat intelligence relevant to your organization |
Standard | |
---|---|
Broad OS Support |
Formerly CylancePROTECT®
|
Fast, easy cloud-managed threat prevention for all of your Windows®, Mac®, Linux®, Android™, and iOS® devices.
|
|
Broad OS Support | CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS |
Modern AI Protection | Advanced AI that detects threats before they cause damage |
Endpoint Alert Visibility and Prioritization | Autonomous grouping and correlation of alerts |
Advanced Threat Protection - PE, Memory Protection, and Script Control | Detects and stops malware, malicious scripts, zero-day threats, and memory exploits |
Device Control | Get visibility and control over USB devices to stop internal or external threats |
App Control | Control what applications are allowed or blocked anywhere |
Threat Hunting and Investigation Tools | |
Advanced Response Actions and Automated Workflows | |
30-Day Data Storage | |
Contextual Threat Intel Reports |
Advanced | |
---|---|
Broad OS Support |
Formerly CylancePROTECT + CylanceOPTICS®
|
Advanced endpoint threat visibility with investigation, response, and threat hunting across your devices.
|
|
Broad OS Support | CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS |
Modern AI Protection | Advanced AI that detects threats before they cause damage |
Endpoint Alert Visibility and Prioritization | Autonomous grouping and correlation of alerts |
Advanced Threat Protection - PE, Memory Protection, and Script Control | Detects and stops malware, malicious scripts, zero-day threats, and memory exploits |
Device Control | Get visibility and control over USB devices to stop internal or external threats |
App Control | Control what applications are allowed or blocked anywhere |
Threat Hunting and Investigation Tools | Detection and monitoring tools to combat threats and stop attackers |
Advanced Response Actions and Automated Workflows | Automated response to quickly stop and remediate attacks |
30-Day Data Storage | Easily access historic data to aid in threat hunting and analysis |
Contextual Threat Intel Reports |
Pro | |
---|---|
Broad OS Support |
CylancePROTECT + CylanceOPTICS + Threat Intelligence
|
Expert features to configure, prioritize, and understand endpoint threats and automate security event communications.
|
|
Broad OS Support | CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS |
Modern AI Protection | Advanced AI that detects threats before they cause damage |
Endpoint Alert Visibility and Prioritization | Autonomous grouping and correlation of alerts |
Advanced Threat Protection - PE, Memory Protection, and Script Control | Detects and stops malware, malicious scripts, zero-day threats, and memory exploits |
Device Control | Get visibility and control over USB devices to stop internal or external threats |
App Control | Control what applications are allowed or blocked anywhere |
Threat Hunting and Investigation Tools | Detection and monitoring tools to combat threats and stop attackers |
Advanced Response Actions and Automated Workflows | Automated response to quickly stop and remediate attacks |
30-Day Data Storage | Easily access historic data to aid in threat hunting and analysis |
Contextual Threat Intel Reports | Expertly crafted and customized cyber threat intelligence relevant to your organization |
Resources
How to Get Started
We’re here to help. Reach out to speak with a BlackBerry expert to talk about your specific cybersecurity needs.
Sources
- *Alert fatigue reduction measured in terms of reported alerts without grouping and correlation of alerts across tenants of 700M and reduction of alerts to 68M with our zero-touch grouping and correlation of alerts (Dec 2022)