>

>

Blackberry Cylance

Logo

Blackberry Cylance

Blackberry Cylance

Blackberry Cylance uses artificial intelligence to identify and prevent threats before they execute. It applies machine learning models to analyze files and processes, reducing reliance on traditional signature-based detection.

Blackberry Cylance uses artificial intelligence to identify and prevent threats before they execute. It applies machine learning models to analyze files and processes, reducing reliance on traditional signature-based detection.

Cost considerations

Functionality

Compatibility

User experience

Customer support

Why these ratings?

Cyberse perspective

Solution details

Target industry

Technology

Public sector

Industrials

Healthcare

Retail

Manufacturing

Financial services

Key features

Platform solution

Point solution

Integrations

Endpoint security

Services support

In-house services

Managed services

Product features

NULL

Deployment

Cloud-native

Cloud-hosted

Cloud ecosystem partners

Amazon Web Services

Microsoft Azure Cloud

Market segment

Small business

Enterprise

Midmarket

Pricing

Free trial available

Subcategory

AI Security

We use the following criteria to evaluate this product:

Cost considerations

Typical endpoint cost is about $4-5 per user each month according to reseller matrices and peer quotes. Firms pay extra for Optics EDR or MDR add-ons, and quotes come through partners, so price transparency lags vendors with posted tiers. Users describe fees as reasonable but slightly high, suggesting solid yet unremarkable ROI versus competing data-security tools.

Cost considerations

Typical endpoint cost is about $4-5 per user each month according to reseller matrices and peer quotes. Firms pay extra for Optics EDR or MDR add-ons, and quotes come through partners, so price transparency lags vendors with posted tiers. Users describe fees as reasonable but slightly high, suggesting solid yet unremarkable ROI versus competing data-security tools.

Functionality

BlackBerry CylanceAVERT automatically discovers and categorizes sensitive data on endpoints and blocks unauthorized exfiltration events. The product lacks integrated encryption or key-lifecycle management and its controls center on endpoint traffic rather than major cloud stores. Functionality therefore sits between basic file scanners and full-suite platforms that combine DLP with encryption and broad cloud coverage.

Functionality

BlackBerry CylanceAVERT automatically discovers and categorizes sensitive data on endpoints and blocks unauthorized exfiltration events. The product lacks integrated encryption or key-lifecycle management and its controls center on endpoint traffic rather than major cloud stores. Functionality therefore sits between basic file scanners and full-suite platforms that combine DLP with encryption and broad cloud coverage.

Compatibility

BlackBerry Cylance can stream security events to Splunk, QRadar and other SIEMs through a built-in syslog setting. The product also exposes a documented REST API so teams can script custom data pulls or responses. It lacks out-of-the-box connectors for corporate databases or popular SaaS apps, so extra integration effort is often required.

Compatibility

BlackBerry Cylance can stream security events to Splunk, QRadar and other SIEMs through a built-in syslog setting. The product also exposes a documented REST API so teams can script custom data pulls or responses. It lacks out-of-the-box connectors for corporate databases or popular SaaS apps, so extra integration effort is often required.

User experience

BlackBerry Cylance provides a workable cloud console, but reviewers say the dashboards are text-heavy and navigation feels dated versus newer tools; teams therefore need extra time and guidance to tune policies and investigate alerts, placing the user experience in the middle of the pack.

User experience

BlackBerry Cylance provides a workable cloud console, but reviewers say the dashboards are text-heavy and navigation feels dated versus newer tools; teams therefore need extra time and guidance to tune policies and investigate alerts, placing the user experience in the middle of the pack.

Customer support

Customer issues are handled through email tickets that reviewers say were answered in about an hour, but support is not advertised as 24×7 and there is no phone or live-chat option. A detailed knowledge base is available, yet the single contact channel and business-hours coverage make the assistance merely adequate compared with data-security rivals that provide round-the-clock, multi-channel help.

Customer support

Customer issues are handled through email tickets that reviewers say were answered in about an hour, but support is not advertised as 24×7 and there is no phone or live-chat option. A detailed knowledge base is available, yet the single contact channel and business-hours coverage make the assistance merely adequate compared with data-security rivals that provide round-the-clock, multi-channel help.