


BlackBerry Cylance Cybersecurity and NetWitness NDR are leading cybersecurity solutions, each excelling in different areas. BlackBerry Cylance is favored for its cost-effectiveness and support, whereas NetWitness NDR is highlighted for its robust feature set and high-level protection, which some deem worth the additional cost.
Features: BlackBerry Cylance utilizes advanced AI and machine learning for malware analysis, efficiently blocking threats like WannaCry using minimal system resources. Its centralized management dashboard simplifies endpoint protection management. NetWitness NDR excels in traffic capture, providing granular market analysis and seamless integration with network security devices.
Room for Improvement: BlackBerry Cylance could enhance its alert system to reduce false positives and offer more detailed incident information. Users also request better integration with other security tools and a more intuitive interface. NetWitness NDR could improve its reporting capabilities and make the system easier to deploy, alongside enhancing scalability and automating threat response.
Ease of Deployment and Customer Service: BlackBerry Cylance supports flexible deployment in various cloud environments, while NetWitness focuses more on on-premises setups. Customer service feedback varies for BlackBerry Cylance, with technical support being a concern for some, whereas NetWitness generally meets user expectations but needs faster response times.
Pricing and ROI: BlackBerry Cylance is seen as competitively priced, offering significant ROI due to reduced labor and downtime despite being costlier than some peers. NetWitness NDR's pricing varies with deployment size and is often viewed as higher, yet its flexible pricing models provide substantial returns through enhanced security and downtime reduction.
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 3.6% |
| BlackBerry Cylance Cybersecurity | 1.5% |
| NetWitness NDR | 0.9% |
| Other | 94.0% |


| Company Size | Count |
|---|---|
| Small Business | 46 |
| Midsize Enterprise | 20 |
| Large Enterprise | 49 |
| Company Size | Count |
|---|---|
| Small Business | 33 |
| Midsize Enterprise | 5 |
| Large Enterprise | 14 |
| Company Size | Count |
|---|---|
| Small Business | 10 |
| Midsize Enterprise | 2 |
| Large Enterprise | 6 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
BlackBerry Cylance Cybersecurity leverages AI and machine learning for efficient malware detection and zero-day threat protection, offering robust endpoint security with high detection accuracy and low false positive rates.
BlackBerry Cylance Cybersecurity delivers advanced threat protection with AI-driven algorithms and machine learning. Its lightweight design ensures low system resource usage, making it both efficient and effective. It's recognized for centralized management, easy deployment, and a clean interface, providing comprehensive endpoint protection against diverse threats. The integration of features like CylanceOPTICS and behavioral monitoring enhances security insights. While the system excels in malware detection, enhancements are needed in areas like user interface design, reporting, deeper threat analysis, and integration with third-party systems. Support and pricing improvements could also increase competitiveness.
What are the key features of BlackBerry Cylance Cybersecurity?Organizations deploy BlackBerry Cylance Cybersecurity for threat analytics, log management, and endpoint protection. As an antivirus replacement, it protects against zero-day malware, ransomware, and various threats. Its AI algorithms detect anomalies, minimizing risks in both internet-connected and isolated environments. Many businesses incorporate it into wider security strategies, appreciating its centralized management and proactive defense capabilities.
NetWitness NDR provides robust network security features, offering full visibility and effective incident response. Its seamless integration and user-friendly interface support malware detection and real-time threat tracking.
NetWitness NDR stands out for its comprehensive traffic details and compatibility across operating systems. It features a unified dashboard and lightweight installation, making it user-friendly without IT support. The system supports orchestration features and user behavior analytics. While deployment is somewhat modular and complex, it serves well for network security, malware analysis, and digital forensics. NetWitness integrates smoothly with third-party apps using its intuitive API, though improvements could be made in areas like SOAR integration, hunting features, and scalability, alongside addressing pricing and licensing complexities.
What are NetWitness NDR's Key Features?Banks and telecom companies utilize NetWitness NDR for detecting indicators of compromise, analyzing intrusion history, and providing risk scores. It functions as both a SIEM tool and a network forensic instrument, proving essential for sectors focused on network security and threat prevention.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.