


BlackBerry Cylance Cybersecurity and Symantec Endpoint Security Complete are competitors in the cybersecurity domain, particularly in endpoint protection. BlackBerry Cylance's advantage lies in its AI-driven, resource-efficient approach, while Symantec provides extensive feature sets and adaptability to diverse threats.
Features: BlackBerry Cylance emphasizes AI and machine learning capabilities, offering robust zero-day threat protection without dependency on signature-based methods. It performs in-depth anomaly detection and is lightweight. Symantec provides a comprehensive firewall, URL filtering, and SONAR for real-time protection. Its superior adaptability handles emerging threats, securing various devices effectively.
Room for Improvement: BlackBerry Cylance could enhance its reporting, industrial system integrations, and user-friendly features. Customers mention issues with technical support and pricing. Symantec faces challenges to simplify installation, improve mobile device support, and integrate modern EDR/XDR functionalities. Its software demands more resources than competitors and could better cloud security and hybrid deployments.
Ease of Deployment and Customer Service: BlackBerry Cylance efficiently deploys across public, private, and hybrid clouds, though it needs to improve technical support responsiveness. Symantec is similarly adaptable, and customers appreciate its consistent support via robust managed provider channels, requiring less direct interaction.
Pricing and ROI: BlackBerry Cylance's pricing is viewed as high, but users appreciate its value in comprehensive protection with minimal performance impact. Symantec offers competitive pricing with additional feature costs. Users report ROI with Cylance through reduced labor and incident prevention, while Symantec's comprehensive coverage presents good value for small and midrange companies.
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 3.6% |
| BlackBerry Cylance Cybersecurity | 1.5% |
| Symantec Endpoint Security Complete | 0.7% |
| Other | 94.2% |



| Company Size | Count |
|---|---|
| Small Business | 46 |
| Midsize Enterprise | 20 |
| Large Enterprise | 49 |
| Company Size | Count |
|---|---|
| Small Business | 33 |
| Midsize Enterprise | 5 |
| Large Enterprise | 14 |
| Company Size | Count |
|---|---|
| Small Business | 7 |
| Midsize Enterprise | 5 |
| Large Enterprise | 7 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
BlackBerry Cylance Cybersecurity leverages AI and machine learning for efficient malware detection and zero-day threat protection, offering robust endpoint security with high detection accuracy and low false positive rates.
BlackBerry Cylance Cybersecurity delivers advanced threat protection with AI-driven algorithms and machine learning. Its lightweight design ensures low system resource usage, making it both efficient and effective. It's recognized for centralized management, easy deployment, and a clean interface, providing comprehensive endpoint protection against diverse threats. The integration of features like CylanceOPTICS and behavioral monitoring enhances security insights. While the system excels in malware detection, enhancements are needed in areas like user interface design, reporting, deeper threat analysis, and integration with third-party systems. Support and pricing improvements could also increase competitiveness.
What are the key features of BlackBerry Cylance Cybersecurity?Organizations deploy BlackBerry Cylance Cybersecurity for threat analytics, log management, and endpoint protection. As an antivirus replacement, it protects against zero-day malware, ransomware, and various threats. Its AI algorithms detect anomalies, minimizing risks in both internet-connected and isolated environments. Many businesses incorporate it into wider security strategies, appreciating its centralized management and proactive defense capabilities.
Symantec Endpoint Security Complete offers robust defense capabilities including firewalls, advanced threat protection, and real-time SONAR monitoring to safeguard digital environments. This solution addresses virus outbreaks and reduces attack surfaces with a suite of advanced features.
With focus on comprehensive endpoint protection, Symantec Endpoint Security Complete is designed to detect, prevent, and respond to advanced cyber threats while maintaining minimal performance impact. It integrates various security measures such as sandboxing, threat hunting, EDR, and more, ensuring complete protection. Its deployment across different platforms is customizable, allowing adaptation to evolving security needs, from network security and secure messaging to Active Directory protection. Facilitating easy policy compliance and low administrative effort, this solution enhances cybersecurity readiness effectively.
What are the most important features of Symantec Endpoint Security Complete?In sectors such as finance and healthcare, Symantec Endpoint Security Complete plays a crucial role in safeguarding sensitive data and maintaining compliance. Retailers employ it to secure payment ecosystems, while educational institutions utilize its capabilities to protect against cyber threats in an increasingly digital learning environment. Its flexibility allows it to cater to varied industry requirements, ensuring reliable protection and efficient management of cybersecurity operations.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.