
Detect Quickly, Respond Effectively


Stop Threats with a Self-Defending AI
Utilizes less than 1 percent of CPU processing power with a lightweight endpoint agent
Scans and detects malware, malicious scripts, zero-day threats, and memory exploits


Half the Effort, Faster ROI
Easy setup, maintenance, and management via a single console
Autonomous grouping and correlation of alerts, reducing alert fatigue by 90 percent*
Over 30 percent reduction in time investigating and recovering from security incidents as reported in the Forrester Total Economic Impact™ (TEI) study commissioned by BlackBerry


Excels in Any Environment
Utilizes single-pane-of-glass management with 90 percent less CPU consumption
Doesn’t require an Internet connection
Supports cloud-native, hybrid, and on-premises software stacks
By setting up Zero Trust, we eliminated almost a million dollars worth of spend simply because we no longer needed a security operations center monitoring our endpoints. Our data is safe, and our assets are walled off and protected. We were recently targeted by zero-day ransomware — CylancePROTECT stopped it in seventeen milliseconds.
— Collin Buechler, Information Security, Data Privacy & Compliance officer, ConvergeOne
Bluebird is a trusted name. To maintain that trust, we needed to make sure our security was bulletproof. BlackBerry software, coupled with managed security and response, was the perfect solution for us to do so.
Muhammad Suhada, Former Vice President of Information Technology, Bluebird Group
Together with BlackBerry, we are putting intelligent cyber technologies and skills in reach of any sized business—to help protect, enable, and defend against new threats.
Ceppy Djakaria, Vice President of Corporate Account Management, Telkomse
Professional-grade peace of mind. I've been using this product for the last three years and it's been nothing but painless. No nag screens pestering users about updates. It just works and it works very well.
Anonymous, Consumer Goods
Cylance is a quality product that keeps our systems safe and on the ready for any kind of anomalous activity. Even with the few false positives I feel at ease knowing I have a strong partner in my corner.
Anonymous, Healthcare and Biotech Industry
Award-Winning Endpoint Protection
CylanceENDPOINT products have been honored with a variety of industry awards.
Standard | Advanced | Pro | |
---|---|---|---|
Formerly CylancePROTECT®
|
Formerly CylancePROTECT + CylanceOPTICS®
|
CylancePROTECT + CylanceOPTICS + Threat Intelligence
|
|
Fast, easy cloud-managed threat prevention for all of your Windows®, Mac®, Linux®, Android™, and iOS® devices.
|
Advanced endpoint threat visibility with investigation, response, and threat hunting across your devices.
|
Expert features to configure, prioritize, and understand endpoint threats and automate security event communications.
|
|
Broad OS Support
|
CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS | CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS | CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS |
Modern AI Protection
|
Advanced AI that detects threats before they cause damage | Advanced AI that detects threats before they cause damage | Advanced AI that detects threats before they cause damage |
Endpoint Alert Visibility and Prioritization
|
Autonomous grouping and correlation of alerts | Autonomous grouping and correlation of alerts | Autonomous grouping and correlation of alerts |
Advanced Threat Protection - PE, Memory Protection, and Script Control
|
Detects and stops malware, malicious scripts, zero-day threats, and memory exploits | Detects and stops malware, malicious scripts, zero-day threats, and memory exploits | Detects and stops malware, malicious scripts, zero-day threats, and memory exploits |
Device Control
|
Get visibility and control over USB devices to stop internal or external threats | Get visibility and control over USB devices to stop internal or external threats | Get visibility and control over USB devices to stop internal or external threats |
App Control
|
Control what applications are allowed or blocked anywhere | Control what applications are allowed or blocked anywhere | Control what applications are allowed or blocked anywhere |
Threat Hunting and Investigation Tools
|
Detection and monitoring tools to combat threats and stop attackers | Detection and monitoring tools to combat threats and stop attackers | |
Advanced Response Actions and Automated Workflows
|
Automated response to quickly stop and remediate attacks | Automated response to quickly stop and remediate attacks | |
30-Day Data Storage
|
Easily access historic data to aid in threat hunting and analysis | Easily access historic data to aid in threat hunting and analysis | |
Contextual Threat Intel Reports
|
Expertly crafted and customized cyber threat intelligence relevant to your organization |
Standard | |
---|---|
Broad OS Support |
Formerly CylancePROTECT®
|
Fast, easy cloud-managed threat prevention for all of your Windows®, Mac®, Linux®, Android™, and iOS® devices.
|
|
Broad OS Support | CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS |
Modern AI Protection | Advanced AI that detects threats before they cause damage |
Endpoint Alert Visibility and Prioritization | Autonomous grouping and correlation of alerts |
Advanced Threat Protection - PE, Memory Protection, and Script Control | Detects and stops malware, malicious scripts, zero-day threats, and memory exploits |
Device Control | Get visibility and control over USB devices to stop internal or external threats |
App Control | Control what applications are allowed or blocked anywhere |
Threat Hunting and Investigation Tools | |
Advanced Response Actions and Automated Workflows | |
30-Day Data Storage | |
Contextual Threat Intel Reports |
Advanced | |
---|---|
Broad OS Support |
Formerly CylancePROTECT + CylanceOPTICS®
|
Advanced endpoint threat visibility with investigation, response, and threat hunting across your devices.
|
|
Broad OS Support | CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS |
Modern AI Protection | Advanced AI that detects threats before they cause damage |
Endpoint Alert Visibility and Prioritization | Autonomous grouping and correlation of alerts |
Advanced Threat Protection - PE, Memory Protection, and Script Control | Detects and stops malware, malicious scripts, zero-day threats, and memory exploits |
Device Control | Get visibility and control over USB devices to stop internal or external threats |
App Control | Control what applications are allowed or blocked anywhere |
Threat Hunting and Investigation Tools | Detection and monitoring tools to combat threats and stop attackers |
Advanced Response Actions and Automated Workflows | Automated response to quickly stop and remediate attacks |
30-Day Data Storage | Easily access historic data to aid in threat hunting and analysis |
Contextual Threat Intel Reports |
Pro | |
---|---|
Broad OS Support |
CylancePROTECT + CylanceOPTICS + Threat Intelligence
|
Expert features to configure, prioritize, and understand endpoint threats and automate security event communications.
|
|
Broad OS Support | CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS |
Modern AI Protection | Advanced AI that detects threats before they cause damage |
Endpoint Alert Visibility and Prioritization | Autonomous grouping and correlation of alerts |
Advanced Threat Protection - PE, Memory Protection, and Script Control | Detects and stops malware, malicious scripts, zero-day threats, and memory exploits |
Device Control | Get visibility and control over USB devices to stop internal or external threats |
App Control | Control what applications are allowed or blocked anywhere |
Threat Hunting and Investigation Tools | Detection and monitoring tools to combat threats and stop attackers |
Advanced Response Actions and Automated Workflows | Automated response to quickly stop and remediate attacks |
30-Day Data Storage | Easily access historic data to aid in threat hunting and analysis |
Contextual Threat Intel Reports | Expertly crafted and customized cyber threat intelligence relevant to your organization |
Resources
Case Study
Fairfax County Partners with BlackBerry to Deter Cyberattacks
Fairfax County government needed better endpoint security. They knew it was only a matter of time before their signature-based antivirus (AV) failed. They then discovered CylancePROTECT®, which is now part of CylanceENDPOINT.
Case Study
GDEX Delivers on Its Promise of Security
See how Malaysia's largest delivery company uses Cylance AI from BlackBerry to secure their endpoints.
Case Study
DO & CO and BlackBerry: A Recipe for Success
DO & CO was understandably concerned when a design failure of a legacy AV product resulted in a security incident that could have seriously disrupted their business. It was clear that an endpoint security upgrade was needed.
How to Get Started
We’re here to help. Reach out to speak with a BlackBerry expert to talk about your specific cybersecurity needs.
Sources
- *Alert fatigue reduction measured in terms of reported alerts without grouping and correlation of alerts across tenants of 700M and reduction of alerts to 68M with our zero-touch grouping and correlation of alerts (Dec 2022)