Introducing Cylance Assistant: GenAI in CylanceENDPOINT
Cylance® Assistant, our generative AI model trained on BlackBerry's award-winning cyber threat intelligence, helps you achieve more with less. It uses private LLMs for enhanced privacy and accuracy to proactively predict your needs and provide expert guidance.
Fully Integrated
Beyond Chatbots
No Additional Cost
Responsible AI
So Many Threats, So Few Resources
Organizations struggle to prevent stealthy attacks like supply chain compromises that leverage trusted components. Legacy security offerings are too complex for many organizations and fail to extract value from detections, putting them at risk of advanced threats and data breaches. Download this evaluation guide to understand what questions to ask when assessing endpoint security solutions.
Data Breaches
Alert Fatigue
Lack of Visibility
Stop Threats with a Self-Defending AI Before They Cause Damage
Up to 25 percent more effective at stopping malware than the competition's solutions
Utilizes 20x less system impact on CPU processing power on average with a lightweight endpoint agent
Defends against malware, malicious scripts, zero-day threats, and fileless memory exploits
Getting the World-Class Security You Need with the Resources You Have
Automatically prevent zero-day threats and stop attacks immediately
Accurately detect lateral movement
Reduce security incident investigation and recovery time by 30 percent and alert fatigue by 90 percent*
Excels in Any Environment
Uses single-pane-of-glass management with up to 20x less CPU consumption
Doesn’t require an Internet connection
Supports cloud-native, hybrid, and on-premises software stacks
By setting up Zero Trust, we eliminated almost a million dollars worth of spend simply because we no longer needed a security operations center monitoring our endpoints. Our data is safe, and our assets are walled off and protected. We were recently targeted by zero-day ransomware — CylancePROTECT stopped it in seventeen milliseconds.
Collin Buechler, Information Security, Data Privacy & Compliance officer, ConvergeOne
Together with BlackBerry, we are putting intelligent cyber technologies and skills in reach of any sized business—to help protect, enable, and defend against new threats.
Ceppy Djakaria, Vice President of Corporate Account Management, Telkomse
BlackBerry Named a Gartner® Peer Insights Customers’ Choice 2024 in EPP
Not applicable | Standard | Advanced | Pro |
---|---|---|---|
Formerly CylancePROTECT®
|
Formerly CylancePROTECT + CylanceOPTICS®
|
CylancePROTECT + CylanceOPTICS + Threat Intelligence
|
|
Fast, easy cloud-managed threat prevention for all of your Windows®, Mac®, Linux®, Android™, and iOS® devices.
|
Advanced endpoint threat visibility with investigation, response, and threat hunting across your devices.
|
Expert features to configure, prioritize, and understand endpoint threats and automate security event communications.
|
|
Broad OS Support
|
CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS | CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS | CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS |
Modern AI Protection
|
Advanced AI that detects threats before they cause damage | Advanced AI that detects threats before they cause damage | Advanced AI that detects threats before they cause damage |
Endpoint Alert Visibility and Prioritization
|
Autonomous grouping and correlation of alerts | Autonomous grouping and correlation of alerts | Autonomous grouping and correlation of alerts |
Advanced Threat Protection - PE, Memory Protection, and Script Control
|
Detects and stops malware, malicious scripts, zero-day threats, and memory exploits | Detects and stops malware, malicious scripts, zero-day threats, and memory exploits | Detects and stops malware, malicious scripts, zero-day threats, and memory exploits |
Device Control
|
Get visibility and control over USB devices to stop internal or external threats | Get visibility and control over USB devices to stop internal or external threats | Get visibility and control over USB devices to stop internal or external threats |
App Control
|
Control what applications are allowed or blocked anywhere | Control what applications are allowed or blocked anywhere | Control what applications are allowed or blocked anywhere |
Threat Hunting and Investigation Tools
|
Detection and monitoring tools to combat threats and stop attackers | Detection and monitoring tools to combat threats and stop attackers | |
Advanced Response Actions and Automated Workflows
|
Automated response to quickly stop and remediate attacks | Automated response to quickly stop and remediate attacks | |
30-Day Data Storage
|
Easily access historic data to aid in threat hunting and analysis | Easily access historic data to aid in threat hunting and analysis | |
Contextual Threat Intel Reports
|
Expertly crafted and customized cyber threat intelligence relevant to your organization |
Standard | |
---|---|
Broad OS Support |
Formerly CylancePROTECT®
|
Fast, easy cloud-managed threat prevention for all of your Windows®, Mac®, Linux®, Android™, and iOS® devices.
|
|
Broad OS Support | CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS |
Modern AI Protection | Advanced AI that detects threats before they cause damage |
Endpoint Alert Visibility and Prioritization | Autonomous grouping and correlation of alerts |
Advanced Threat Protection - PE, Memory Protection, and Script Control | Detects and stops malware, malicious scripts, zero-day threats, and memory exploits |
Device Control | Get visibility and control over USB devices to stop internal or external threats |
App Control | Control what applications are allowed or blocked anywhere |
Threat Hunting and Investigation Tools | |
Advanced Response Actions and Automated Workflows | |
30-Day Data Storage | |
Contextual Threat Intel Reports |
Advanced | |
---|---|
Broad OS Support |
Formerly CylancePROTECT + CylanceOPTICS®
|
Advanced endpoint threat visibility with investigation, response, and threat hunting across your devices.
|
|
Broad OS Support | CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS |
Modern AI Protection | Advanced AI that detects threats before they cause damage |
Endpoint Alert Visibility and Prioritization | Autonomous grouping and correlation of alerts |
Advanced Threat Protection - PE, Memory Protection, and Script Control | Detects and stops malware, malicious scripts, zero-day threats, and memory exploits |
Device Control | Get visibility and control over USB devices to stop internal or external threats |
App Control | Control what applications are allowed or blocked anywhere |
Threat Hunting and Investigation Tools | Detection and monitoring tools to combat threats and stop attackers |
Advanced Response Actions and Automated Workflows | Automated response to quickly stop and remediate attacks |
30-Day Data Storage | Easily access historic data to aid in threat hunting and analysis |
Contextual Threat Intel Reports |
Pro | |
---|---|
Broad OS Support |
CylancePROTECT + CylanceOPTICS + Threat Intelligence
|
Expert features to configure, prioritize, and understand endpoint threats and automate security event communications.
|
|
Broad OS Support | CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS |
Modern AI Protection | Advanced AI that detects threats before they cause damage |
Endpoint Alert Visibility and Prioritization | Autonomous grouping and correlation of alerts |
Advanced Threat Protection - PE, Memory Protection, and Script Control | Detects and stops malware, malicious scripts, zero-day threats, and memory exploits |
Device Control | Get visibility and control over USB devices to stop internal or external threats |
App Control | Control what applications are allowed or blocked anywhere |
Threat Hunting and Investigation Tools | Detection and monitoring tools to combat threats and stop attackers |
Advanced Response Actions and Automated Workflows | Automated response to quickly stop and remediate attacks |
30-Day Data Storage | Easily access historic data to aid in threat hunting and analysis |
Contextual Threat Intel Reports | Expertly crafted and customized cyber threat intelligence relevant to your organization |
How to Get Started
We’re here to help. Reach out to speak with a BlackBerry expert to talk about your specific cybersecurity needs.
Talk to an Expert
See It In Action
See How Other Companies Benefit from BlackBerry Cybersecurity
Sources
- *Alert fatigue reduction measured in terms of reported alerts without grouping and correlation of alerts across tenants of 700M and reduction of alerts to 68M with our zero-touch grouping and correlation of alerts (Dec 2022)