it_user434868 - PeerSpot reviewer
Senior Director of Delivery at a tech services company with 51-200 employees
  • 0
  • 0

What do you like most about Blackberry Protect?

Hi Everyone,

What do you like most about Blackberry Protect?

Thanks for sharing your thoughts with the community!

PeerSpot user
23 Answers
Sooraj Makkancherrry - PeerSpot reviewer
Software Manager at Philips
Real User
Oct 31, 2022

The solution is easy to deploy.

Search for a product comparison
IT Manager at PBD
Real User
Jun 16, 2022

CylancePROTECT is very stable - we've had no issues with performance and no errors or bugs.

Solutions Development Manager at a manufacturing company with 10,001+ employees
Real User
Top 5
Jan 27, 2022

Blackberry Protect offers endpoint protection. It's easy to deploy. It's scalable and stable.

IT Infrastructure Manager at a financial services firm with 51-200 employees
Real User
Top 5
Jul 15, 2021

We are quite security-focused. Blackberry Protect as an endpoint solution for our service really delivers what we are expecting.

Akhlaq Ahmed - PeerSpot reviewer
BlackBerry Cylance SME - Resident Engineer at a tech services company with 201-500 employees
Real User
Top 10
Jun 21, 2021

I like the AI and mathematical components that they use.

Senior Network Administrator at a financial services firm with 51-200 employees
Real User
Top 5
Apr 23, 2021

The deployment of updates is easy.

Learn what your peers think about CylancePROTECT. Get advice and tips from experienced pros sharing their opinions. Updated: November 2022.
654,658 professionals have used our research since 2012.
Vice President Product and Strategy at a tech company with 201-500 employees
Real User
Top 10
Apr 14, 2021

A user can continue to add endpoints and the solution will continue to perform well.

President at a security firm with 11-50 employees
Real User
Top 10
Mar 10, 2021

In most cases, the solution's ability to detect in the MITRE framework, and its ability to be able to detect attacks in any one of seven or eight different areas of the life cycle of an attack is very useful.

Coordinator of special projects at a manufacturing company with 201-500 employees
Real User
Top 10
Feb 4, 2021

It does a good job of protecting us.

Senior NOC Security Engineer at a wholesaler/distributor with 51-200 employees
Top 10
Jan 5, 2021

I find the actual overall endpoint malware protection the most valuable feature of CylancePROTECT.

Sean Muller - PeerSpot reviewer
IT Security manager at a energy/utilities company with 201-500 employees
Real User
Top 5Leaderboard
Dec 13, 2020

The most functional item that we use is the process to turn off the false flags that it causes.

Orlando Barbosa - PeerSpot reviewer
Head of Systems at SKN Caribecafe Ltda
Real User
Top 10
Dec 12, 2020

The solution is very quick at easily changing the levels of protection for each computer and the server.

Gordon Powell - PeerSpot reviewer
OT Cyber Security Principal Consultant at Jacobs Engineering Group Inc.
Real User
Top 10
Dec 1, 2020

The non-daily requirement to update signatures is the most valuable feature. From a functional point of view, it is pretty spot on. For instance, we compared an algorithm from five years ago to today's algorithm, and it was 98% accurate. It has the ability to detect and mitigate.

In the industrial environment that we work in, there's what we call OT versus IT. You are IT Central, but this is OT. Generally, we don't have the same level of skillset as IT individuals or IT professionals have. This particular product doesn't require you to be a computer scientist to be able to understand its proprietary algorithm and to be able to deploy, use, and work within it. It integrates well with a robust SIEM or SOAR solution, and it plays nice with others. We use other detection solutions like CyberX or site provision with Cisco, and it plays nice. That's one of the things we really liked about it.

VP at a tech services company with 11-50 employees
Nov 2, 2020

The most valuable features are script blocking and macros within Word documents for stopping unwanted applications from running in the background.

Vice President Operations at a construction company with 11-50 employees
Real User
Oct 6, 2020

You can manage all the threats and everything from a centralized dashboard.

Security Domain Architect at a tech services company with 5,001-10,000 employees
Jun 15, 2020

It secures different entry points into the network.

Technology Specialist at a tech vendor with 11-50 employees
Real User
Mar 22, 2020

Has good RAM capacity for the power I need

Donald Dindial - PeerSpot reviewer
Owner at Terra Controls
Real User
Mar 16, 2020

Two or three years ago when the WannaCry virus struck, the people that were on Cylance were the ones that weren't affected.

Head of IT Operations at a manufacturing company with 1,001-5,000 employees
Real User
Jan 22, 2020

The Application Guard and ByteGuard are useful features.

C.J. Oosthuizen - PeerSpot reviewer
Head of Cloud Services and Projects at Grove
Real User
Jul 4, 2019

The solution is extremely scalable. It's got the hybrid functionality, it's got the system functionality and cloud functionality as well.

Co-Founder, CEO at a tech services company with 11-50 employees
Real User
Jun 30, 2019

On the management side, we liked the way it displays things.

Wirtschaftsprüfer, CPA, Steuerberater at a financial services firm with 11-50 employees
Real User
Jun 30, 2019

The solution is stable.

IT Manager at TIGRA gmbh
Real User
Jun 23, 2019

The solution is pretty easy to scale.

Related Questions
Jorge Pizarro - PeerSpot reviewer
Senior Engineer at Neosecure
Oct 30, 2021
Hi, What are the biggest differences between BlackBerry Protect vs Cortex XDR by Palo Alto Networks? Thanks
See 1 answer
Evgeny Belenky - PeerSpot reviewer
Director of Community at PeerSpot (formerly IT Central Station)
Oct 30, 2021
Hello @DeAndre Valentine, @Donald Dindial, @Mayur Jadhav ​and @KostiantynFrolov. Can you chime in here to share your professional knowledge with the community? Thanks.
Founder & CEO with 51-200 employees
Feb 11, 2020
I'm building a next-gen AI powered threat intelligence platform and am wondering what features are missing from existing products on the market and how much customers are paying for their security tools. I'm also conducting research on pricing models. What is the preferred method of payment, i.e. based on number of endpoints, storage used, user-based, flat fee subscription based? Thank you ...
2 out of 9 answers
CEO & Founder at a tech services company with 1-10 employees
Aug 26, 2019
Raffael Marty, Vice President, Forcepoint Research and Intelligence, said: "There is no artificial intelligence in the field of information security, and it is unlikely to be developed in 2019." Most of unsupervised machine learning-based network anomaly detection solution does not provide why the anomaly has been aroused and whether the anomaly is malicious or not. Most of such solution's pricing model is based on number of endpoints but I prefer to have flat fee subscription-based.
ImadTaha - PeerSpot reviewer
Group CIO with 10,001+ employees
Aug 26, 2019
I that feel there are two old problems still there in the market: 1-Vendors don't talk to each other. 2-Whoever is focusing on endpoint is missing the network and human side and the opposite is also true. I love, for example, what Darktrace is doing in the network side and the playback option to know what happened in my network during a long holiday, for example, things will never be caught by a second-generation AV but I need to have a solid 2nd gen. AV besides the total high cost of Darktrace which by the way is worth it for IT pros but not for business owners. We need to have something like virus total but for risks and threats beyond viruses where all vendors work on this and all endpoint customers with different vendors connect to it to be secured.
Related Solutions
Download Free Report
Download our free CylancePROTECT Report and get advice and tips from experienced pros sharing their opinions. Updated: November 2022.
654,658 professionals have used our research since 2012.