Intelligent User Authentication
CylancePERSONA learns how your employees work—enabling their productivity while preventing unauthorized access.



Protect Against Evolving Threats



Ease Getting to Work for Users



Dynamically Adjust Security Policies
AI-Based User and Location Recognition
Dynamic Zero Trust Architecture
Continuous Authentication
Dynamic Action based on Risk Analysis
CylancePERSONA grants access and issues authentication challenges based on real-time risk analysis, enhancing end-user experience and productivity without sacrificing security.
Based on real-time risk score analysis, CylancePERSONA can:
- Grant Access
- Adapt a Policy
- Issue an Authentication Challenge
- Alert and Remediate
Faster Detection and Mitigation
CylancePERSONA Use Cases
CylancePERSONA solves many security issues facing enterprises with remote employees. Here are a few.



Stolen Credentials



Insider Threats



Physical Compromises
Awards for CylancePERSONA
We are proud to be recognized for our award-winning cybersecurity solutions.
Resources
CylancePERSONA FAQ
What is CylancePERSONA?
CylancePERSONA is an AI-based Identity Access Management (IAM) solution for continuous network authentication. It empowers organizations with security that travels and adapts based on changing work environments so employees can be productive—wherever they are, anytime, and on whatever device they’re using—while effectively eliminating insider threats.
What is Identity and Access Management (IAM)?
Identity and Access Management (IAM) is a framework of processes, policies, and technologies to manage digital identities. Organizations use IAM to control user access to networks and sensitive data.
What Is User and Entity Behavior Analytics?
User and Entity Behavior Analytics (UEBA) is an algorithmic approach to network monitoring that focuses on the activities of both human actors and entities such as hosts, software platforms, and endpoints.
Learn MoreWhat is Zero Trust Architecture?
Zero Trust Architecture (ZTA) is an approach to cybersecurity that applies Zero Trust principles to an organization’s infrastructure and workflows. While traditional cybersecurity models assume that everything inside an organization’s network can be trusted, ZTA requires validations at every stage of a digital transaction when granting access to applications and data—whether users are accessing resources inside the organization’s network or remotely.
Learn MoreWhat are the benefits of CylancePERSONA?
CylancePERSONA enables organizations to support remote workforces securely. It helps businesses protect against cyber threats, easing or tightening security policies based on users’ risk profiles dynamically.
What are the use cases for CylancePERSONA?
CylancePERSONA addresses an organization’s needs for preventing damage and costs due to stolen user credentials, insider threats, and the compromise or theft of users’ devices.
Is CylancePERSONA the same as BlackBerry Persona?
BlackBerry® Persona was renamed CylancePERSONA in 2022 in recognition of our cybersecurity AI heritage.
Prevention-First Cybersecurity Solutions from BlackBerry
BlackBerry Cyber Suite provides a total solution for Zero Trust with full coverage across the full spectrum of devices, network, apps, and people.



CylancePROTECT



CylanceOPTICS



CylanceGUARD



CylanceGATEWAY