Video Poster Image

CylancePERSONA

CylancePERSONA™ is an artificial intelligence-based Identity and Access Management (IAM) solution for continuous authentication within a User and Entity Behavior Analytics (UEBA) context. It dynamically adapts policy to protect against cyberattacks and insider threats and empowers organizations with Zero Trust security that travels and adapts based on changing work environments so employees can be productive—wherever they are, anytime, and on whatever device they’re using.

Intelligent User Authentication

CylancePERSONA learns how your employees work—enabling their productivity while preventing unauthorized access.

Protect Against Evolving Threats
Every business is increasingly vulnerable to cyberattacks, user impersonation, data theft—even insider threats. CylancePERSONA automatically eliminates the risks posed by compromised credentials and lateral movement behind the firewall—on the fly and in an instant. 
Ease Getting to Work for Users
CylancePERSONA enables end users to use any device to connect to your organization’s data, tools, and apps seamlessly, securing access wherever they are, and easing security requirements when they are working from trusted locations performing their typical tasks.
Dynamically Adjust Security Policies
CylancePERSONA uses AI to continuously adapt and optimize your network’s security/policy posture, determining what level of access should be granted to any device or application at any given moment and adapting security requirements for devices and applications in real time.    
AI-Based User and Location Recognition

AI-Based User and Location Recognition

The machine learning capability of CylancePERSONA enables it to identify behavioral and location patterns of multiple users to determine location risk. For example, if the system identifies repeated patterns of large clusters of employees in the same location, it can automatically determine that as an office or other known location.
Dynamic Zero Trust Architecture

Dynamic Zero Trust Architecture

The Zero Trust model trusts nothing and no one by default—including users inside the network perimeter: Every user, device, and network are assumed to be hostile until proven otherwise. CylancePERSONA applies analytics and AI as part of a Zero Trust Security model while still enabling authorized users instant access to resources.
Continuous Authentication

Continuous Authentication

CylancePERSONA uses behavior analysis to recognize typical desktop software usage patterns to determine what behavior is high or low risk in real time. The usage-based patterns include time of day and how the user is using the software, forwarding internally vs. externally, etc.
Dynamic Action based on Risk Analysis

Dynamic Action based on Risk Analysis

CylancePERSONA grants access and issues authentication challenges based on real-time risk analysis, enhancing end-user experience and productivity without sacrificing security. 

Based on real-time risk score analysis, CylancePERSONA can:

  • Grant Access
  • Adapt a Policy
  • Issue an Authentication Challenge
  • Alert and Remediate 
Faster Detection and Mitigation

Faster Detection and Mitigation

In contrast to traditional solutions that must first send all data from the endpoint to the cloud for processing CylancePERSONA leverages and processes unencrypted, clean data from the point of truth—the endpoint. CylancePERSONA’s data and logic also reside at the endpoint, allowing for faster time to detection and proactive mitigation actions.

CylancePERSONA Use Cases

CylancePERSONA solves many security issues facing enterprises with remote employees. Here are a few.

Stolen Credentials 
Protect your organization from damage done when employee credentials have been compromised.  CylancePERSONA analyzes the user’s interaction with their device in real time to determine user risk. If the user exceeds the risk threshold, CylancePERSONA sends alerts to the cloud and automatically takes mitigation actions.
Insider Threats
Protect your organization from rogue employees by continuously analyzing their conduct and determining if their actions are malicious. If an employee’s normal conduct deviates from their standard behavior, such as downloading risky applications and data exfiltration, CylancePERSONA will identify this conduct as anomalous and take proactive action based on your security policies.
Physical Compromises
Protect your employees and organization against attacks where the device has been physically compromised or stolen. If unauthorized users gain access to the endpoint, the behavior analysis models can sense a new user and send alerts or lock the device automatically—no network or cloud connection necessary.

CylancePERSONA FAQ

What is CylancePERSONA?

CylancePERSONA is an AI-based Identity Access Management (IAM) solution for continuous network authentication. It empowers organizations with security that travels and adapts based on changing work environments so employees can be productive—wherever they are, anytime, and on whatever device they’re using—while effectively eliminating insider threats.

What is Identity and Access Management (IAM)?

Identity and Access Management (IAM) is a framework of processes, policies, and technologies to manage digital identities. Organizations use IAM to control user access to networks and sensitive data.

What Is User and Entity Behavior Analytics?

User and Entity Behavior Analytics (UEBA) is an algorithmic approach to network monitoring that focuses on the activities of both human actors and entities such as hosts, software platforms, and endpoints.

Learn More
What is Zero Trust Architecture?

Zero Trust Architecture (ZTA) is an approach to cybersecurity that applies Zero Trust principles to an organization’s infrastructure and workflows. While traditional cybersecurity models assume that everything inside an organization’s network can be trusted, ZTA requires validations at every stage of a digital transaction when granting access to applications and data—whether users are accessing resources inside the organization’s network or remotely.

Learn More
What are the benefits of CylancePERSONA?

CylancePERSONA enables organizations to support remote workforces securely. It helps businesses protect against cyber threats, easing or tightening security policies based on users’ risk profiles dynamically.

What are the use cases for CylancePERSONA?

CylancePERSONA addresses an organization’s needs for preventing damage and costs due to stolen user credentials, insider threats, and the compromise or theft of users’ devices. 

Is CylancePERSONA the same as BlackBerry Persona?

BlackBerry® Persona was renamed CylancePERSONA in 2022 in recognition of our cybersecurity AI heritage.

Prevention-First Cybersecurity Solutions from BlackBerry

BlackBerry Cyber Suite provides a total solution for Zero Trust with full coverage across the full spectrum of devices, network, apps, and people.

CylancePROTECT
CylancePROTECT® is an AI-based endpoint protection platform (EPP) that prevents breaches and provides added controls for safeguarding against sophisticated cyberthreats—no human intervention, Internet connections, signature files, heuristics or sandboxes required.
CylanceOPTICS
CylanceOPTICS® is a prevention-based Endpoint Detection and Response (EDR) solution that monitors systemic and user behaviors to automatically react and protect against cyberattacks in real time.
CylanceGUARD
CylanceGUARD® is a subscription-based 24x7 managed extended detection and response (XDR) service. Our expert analysts act as an extension of your team, providing actionable intelligence to prevent threats quickly while minimizing alert fatigue.
CylanceGATEWAY
CylanceGATEWAY delivers AI-driven Zero Trust Network Access (ZTNA) to protect private applications hosted on-premises or in the cloud, providing scalable outbound-only access.

How to Get Started with CylancePERSONA

Schedule a Demo
Talk to a BlackBerry Cybersecurity Expert
See How Other Companies Benefit from BlackBerry Cybersecurity