


BlackBerry Cylance Cybersecurity and OpenText Core Endpoint Protection compete in the AI-driven cybersecurity space. BlackBerry Cylance appears to have the upper hand due to its advanced AI in threat detection and minimal system impact.
Features: BlackBerry Cylance offers robust AI-driven threat prevention, ease of deployment, and advanced visibility with CylanceOPTICS. It's efficient in malware detection and has a minimal impact on system resources. OpenText Core Endpoint Protection provides a centralized management console, cloud-based speed and efficiency, and strong malware analysis, making it cost-effective for managing multiple endpoints.
Room for Improvement: BlackBerry Cylance should improve its user interface and reduce false positives. Better integration with existing IT environments and enhanced reporting is needed. OpenText Core Endpoint Protection requires improved post-incident reporting and reduced false positives, alongside enhanced user information accessibility and integration options.
Ease of Deployment and Customer Service: BlackBerry Cylance suits on-premises and hybrid cloud setups, though technical support could be improved due to noted delays. OpenText Core Endpoint Protection is strong in public and hybrid clouds, providing reliable and knowledgeable customer support.
Pricing and ROI: BlackBerry Cylance is priced competitively with a high ROI, favored for long-term investment despite being seen as costly compared to some competitors. OpenText Core Endpoint Protection is recognized for affordability, offering a good balance of price and features, appealing to those with budget constraints.
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 3.6% |
| BlackBerry Cylance Cybersecurity | 1.5% |
| OpenText Core Endpoint Protection | 1.5% |
| Other | 93.4% |


| Company Size | Count |
|---|---|
| Small Business | 46 |
| Midsize Enterprise | 20 |
| Large Enterprise | 49 |
| Company Size | Count |
|---|---|
| Small Business | 33 |
| Midsize Enterprise | 5 |
| Large Enterprise | 13 |
| Company Size | Count |
|---|---|
| Small Business | 35 |
| Midsize Enterprise | 2 |
| Large Enterprise | 2 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
BlackBerry Cylance Cybersecurity leverages AI and machine learning for efficient malware detection and zero-day threat protection, offering robust endpoint security with high detection accuracy and low false positive rates.
BlackBerry Cylance Cybersecurity delivers advanced threat protection with AI-driven algorithms and machine learning. Its lightweight design ensures low system resource usage, making it both efficient and effective. It's recognized for centralized management, easy deployment, and a clean interface, providing comprehensive endpoint protection against diverse threats. The integration of features like CylanceOPTICS and behavioral monitoring enhances security insights. While the system excels in malware detection, enhancements are needed in areas like user interface design, reporting, deeper threat analysis, and integration with third-party systems. Support and pricing improvements could also increase competitiveness.
What are the key features of BlackBerry Cylance Cybersecurity?Organizations deploy BlackBerry Cylance Cybersecurity for threat analytics, log management, and endpoint protection. As an antivirus replacement, it protects against zero-day malware, ransomware, and various threats. Its AI algorithms detect anomalies, minimizing risks in both internet-connected and isolated environments. Many businesses incorporate it into wider security strategies, appreciating its centralized management and proactive defense capabilities.
OpenText Core Endpoint Protection offers cloud-managed endpoint security with AI integration, providing real-time protection and lightweight performance. It ensures low system impact, seamless cloud integration, and cost-effective security solutions for various devices.
OpenText Core Endpoint Protection is a comprehensive endpoint security platform utilized by managed-service providers for antivirus and firewall functionality across servers, workstations, and mobile devices. It employs AI for robust threat detection, integrating with cloud applications for real-time updates. Multi-layered security features include malware protection, network defense, and DNS protection. Although connectivity and threat reporting need improvement, this platform extensively supports remote device management and integrates efficiently with Active Directory policies.
What are the key features of OpenText Core Endpoint Protection?OpenText Core Endpoint Protection finds application in industries requiring stringent data protection and peace of mind over device security. Managed-service providers implement this for comprehensive antivirus and firewall features, safeguarding multi-device networks. It is particularly useful for DNS protection and integrating with Active Directory policies, enabling secure yet flexible operations across sectors.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.