BlackBerry Cylance and Cisco Secure Endpoint compete in the cybersecurity and advanced threat detection category. BlackBerry Cylance has an edge with its lightweight AI-driven approach, while Cisco Secure Endpoint has strong integration capabilities, offering advanced threat protection and centralized management.
Features: BlackBerry Cylance utilizes AI and machine learning for proactive malware detection without constant updates, efficiently handling zero-day threats. It offers a lightweight solution with minimal resource usage and integrates well with SIEM solutions. Advanced optics provide comprehensive security. Cisco Secure Endpoint offers seamless integration into Cisco ecosystems with advanced threat protection using engines like Talos Intelligence and Threat Grid. It provides excellent real-time insight and centralized management, enhancing its threat detection capabilities.
Room for Improvement: BlackBerry Cylance users suggest the need for better analytics, improved false positive handling, enhanced alerting systems, a more user-friendly interface, and broader integration with industrial solutions. Cisco Secure Endpoint could improve integration with third-party tools, simplify report generation, create a unified management portal, and enhance stability and ease of deployment. Both solutions can benefit from a more intuitive dashboard and simplified reporting attributes.
Ease of Deployment and Customer Service: BlackBerry Cylance and Cisco Secure Endpoint both offer flexible deployment options, from on-premises to public and hybrid clouds. BlackBerry Cylance's technical support is criticized for slow response times, while Cisco Secure Endpoint is typically praised for its responsive and effective customer service.
Pricing and ROI: BlackBerry Cylance is considered slightly expensive but is justified by robust security and cost-effectiveness through reduced labor hours. Cisco Secure Endpoint is noted for reasonable pricing within Cisco's agreements, with a flexible licensing structure. Both products report significant ROI due to strengthened security and reduced incident response times.
BlackBerry Cylance provides endpoint security, threat protection, and antivirus capabilities, using AI and machine learning for protection against malware and ransomware on desktops, servers, and virtual machines worldwide. Its AI-driven threat detection operates even with limited internet, facilitating effective threat management.
BlackBerry Cylance's centralized dashboard simplifies threat management and vulnerability protection for organizations globally. The platform combines AI and machine learning to deliver superior zero-day threat protection and minimize CPU usage, offering stable and accurate threat detection without frequent updates. It includes tools like CylanceOPTICS and CylancePERSONA for enhanced user behavior monitoring and adopts a proactive approach that effectively manages threats at various lifecycle stages. Renowned for stability and performance, it efficiently prevents unauthorized applications while maintaining system productivity.
What are the main features of BlackBerry Cylance?In the professional sector, BlackBerry Cylance is leveraged to protect crucial infrastructure through a robust approach accommodating environments with limited connectivity. Its widespread deployment in industries, including healthcare and finance, is attributed to its ease of deployment and comprehensive protection capabilities. However, enhancements in reporting, pricing structures, and technical support are avenues for development, reflecting user feedback for improving detection rates and overall dashboard usability.
Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader.
Cisco Secure Endpoint was formerly known as Cisco AMP for Endpoints.
Reviews from Real Users
Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.
Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.