TrustRadius: an HG Insights company

BlackBerry Protect (CylancePROTECT)

Score9.1 out of 10

63 Reviews and Ratings

What is BlackBerry Protect (CylancePROTECT)?

Cylance, a Blackberry company since the early 2019 acquisition, developed their flagship business antivirus and endpoint protection software in CylancePROTECT, featured in business and home editions boasting artificial intelligence guided protection. BlackBerry Protect is a post-acquisition evolution of CylanceProtect.

Categories & Use Cases

Top Performing Features

  • Hybrid Deployment Support

    Administrators should be able to choose endpoint security on-premise, cloud, or hybrid.

    Category average: 8.3

  • Endpoint Detection and Response (EDR)

    Continuous monitoring and response to advanced internet threats by endpoint agents.

    Category average: 9.1

  • Infection Remediation

    Capability to quarantine infected endpoint and terminate malicious processes.

    Category average: 8.8

Areas for Improvement

  • Anti-Exploit Technology

    In-memory and application layer attack blocking (e.g. ransomeware)

    Category average: 8.6

  • Vulnerability Management

    Vulnerability prioritization for fixes.

    Category average: 8.3

  • Malware Detection

    Detection and blocking of zero-day file and fileless malware.

    Category average: 9

CylancePROTECT is great

Use Cases and Deployment Scope

We use it to protect our endpoints from malware and malicious files. We need to have robust cybersecurity and this is one part of our overall security posture. We've had great success using it for many years and are satisfied with its performance.

Pros

  • Lightweight application
  • Does not require constant virus definitions
  • Easy to deploy, administer and use

Cons

  • Displaying more info about quarantined items
  • Making endpoint console better
  • Admin console is slightly confusing to use

Return on Investment

  • No specific ROI, but we've had no known infections since deploying this 10 years ago.

Usability

Don't Sleep on Blackberry's Cylance Protect!

Use Cases and Deployment Scope

We use this as one of many pieces of security software to protect all of our endpoints (be it laptops or servers (both physical and virtual)). There are multiple "policies" that we have in place, some completely block PowerShell from running on a specific users' machine while another one allows it for specific people based on their job functions.

Pros

  • Blocks PowerShell Scripting (when in a specific policy)
  • Blocks unwanted programs from running
  • Is able to determine what is used on a regular basis and allows it to run safely.

Cons

  • I wish it would be easier to safelist things based on install location (have a somewhat recurring issue with PhotoShop getting blocked after an update)
  • It can sometimes be a little over protective (which I guess isn't necessarily a bad thing)

Return on Investment

  • Our current subscription model is based on the number of clients used, so we have to go through and remove the clients on machines that were retired. No idea what the ArcticWolf acquisition will bring (current users of AW as well).

Usability

Alternatives Considered

Carbon Black Endpoint

Other Software Used

Cisco Umbrella, Arctic Wolf Managed Detection and Response

Cylence didn't bring down OS due to kernal access

Use Cases and Deployment Scope

Wanted a non definition based EDR, and CylancePROTECT was one of the first to do this. They lead the packed and with the recent announcement that Arctic Wolf is getting them, this adds to the powerful 1-2 punch for protection

Pros

  • non definition based detection signatures
  • predictive patterns

Cons

  • KB access and filtering

Return on Investment

  • saved a lot of problems that other EDR didnt catch

Usability

Alternatives Considered

CrowdStrike Falcon

Cyclance just works

Pros

  • It not only stops executables from running, it blocks them from unzipping
  • It is more than signature based protection, it is full EDR
  • It has a great console with granular inventory and endpoint control

Cons

  • It would be nice if it knew more user information
  • Would be nice if reporting was fully automated

Return on Investment

  • We have had zero endpoint infections in 3 years
  • See above, priceless, but it is cost effective too
  • We did not have to worry about endpoints

Alternatives Considered

Symantec Endpoint Encryption and Sophos UTM

Other Software Used

Druva inSync, Proofpoint Email Protection, Zscaler Internet Access

Very happy with BlackBerry PROTECT

Use Cases and Deployment Scope

It was initially deployed into our VMware Horizon VDI environment only. We wanted an antivirus program that was lightweight, offered quality protection, was centrally manageable, and was reasonably priced. PROTECT rose above other products we looked at.

Since that initial deployment we have rolled it out to all computers in our company (servers, desktop, laptops, and VDI desktops).

Pros

  • lightweight protection
  • central administration
  • advanced antivirus (AI-based, not signature-based)

Cons

  • I think it could be made more friendly to the non-expert security/AV admin

Return on Investment

  • We haven't been impacted by viruses or malware since implementing

Alternatives Considered

McAfee DLP Endpoint and VMware Carbon Black Endpoint