Blackberry Cylance
Blackberry Cylance
Blackberry Cylance uses artificial intelligence to identify and prevent threats before they execute. It applies machine learning models to analyze files and processes, reducing reliance on traditional signature-based detection.
Blackberry Cylance uses artificial intelligence to identify and prevent threats before they execute. It applies machine learning models to analyze files and processes, reducing reliance on traditional signature-based detection.
Cost considerations
Functionality
Compatibility
User experience
Customer support
Why these ratings?
Cyberse perspective
Solution details
Target industry
Technology
Public sector
Industrials
Healthcare
Retail
Manufacturing
Financial services
Key features
Platform solution
Point solution
Integrations
Endpoint security
Services support
In-house services
Managed services
Product features
NULL
Deployment
Cloud-native
Cloud-hosted
Cloud ecosystem partners
Amazon Web Services
Microsoft Azure Cloud
Market segment
Small business
Enterprise
Midmarket
Pricing
Free trial available
Subcategory
AI Security
We use the following criteria to evaluate this product:
Cost considerations
Typical endpoint cost is about $4-5 per user each month according to reseller matrices and peer quotes. Firms pay extra for Optics EDR or MDR add-ons, and quotes come through partners, so price transparency lags vendors with posted tiers. Users describe fees as reasonable but slightly high, suggesting solid yet unremarkable ROI versus competing data-security tools.
Cost considerations
Typical endpoint cost is about $4-5 per user each month according to reseller matrices and peer quotes. Firms pay extra for Optics EDR or MDR add-ons, and quotes come through partners, so price transparency lags vendors with posted tiers. Users describe fees as reasonable but slightly high, suggesting solid yet unremarkable ROI versus competing data-security tools.
Functionality
BlackBerry CylanceAVERT automatically discovers and categorizes sensitive data on endpoints and blocks unauthorized exfiltration events. The product lacks integrated encryption or key-lifecycle management and its controls center on endpoint traffic rather than major cloud stores. Functionality therefore sits between basic file scanners and full-suite platforms that combine DLP with encryption and broad cloud coverage.
Functionality
BlackBerry CylanceAVERT automatically discovers and categorizes sensitive data on endpoints and blocks unauthorized exfiltration events. The product lacks integrated encryption or key-lifecycle management and its controls center on endpoint traffic rather than major cloud stores. Functionality therefore sits between basic file scanners and full-suite platforms that combine DLP with encryption and broad cloud coverage.
Compatibility
BlackBerry Cylance can stream security events to Splunk, QRadar and other SIEMs through a built-in syslog setting. The product also exposes a documented REST API so teams can script custom data pulls or responses. It lacks out-of-the-box connectors for corporate databases or popular SaaS apps, so extra integration effort is often required.
Compatibility
BlackBerry Cylance can stream security events to Splunk, QRadar and other SIEMs through a built-in syslog setting. The product also exposes a documented REST API so teams can script custom data pulls or responses. It lacks out-of-the-box connectors for corporate databases or popular SaaS apps, so extra integration effort is often required.
User experience
BlackBerry Cylance provides a workable cloud console, but reviewers say the dashboards are text-heavy and navigation feels dated versus newer tools; teams therefore need extra time and guidance to tune policies and investigate alerts, placing the user experience in the middle of the pack.
User experience
BlackBerry Cylance provides a workable cloud console, but reviewers say the dashboards are text-heavy and navigation feels dated versus newer tools; teams therefore need extra time and guidance to tune policies and investigate alerts, placing the user experience in the middle of the pack.
Customer support
Customer issues are handled through email tickets that reviewers say were answered in about an hour, but support is not advertised as 24×7 and there is no phone or live-chat option. A detailed knowledge base is available, yet the single contact channel and business-hours coverage make the assistance merely adequate compared with data-security rivals that provide round-the-clock, multi-channel help.
Customer support
Customer issues are handled through email tickets that reviewers say were answered in about an hour, but support is not advertised as 24×7 and there is no phone or live-chat option. A detailed knowledge base is available, yet the single contact channel and business-hours coverage make the assistance merely adequate compared with data-security rivals that provide round-the-clock, multi-channel help.