Overview

CylancePROTECT:

  • Is installed on all endpoints (consumes less than 1% of CPU)
  • Uses a mathematical formula and artificial intelligence to determine whether or not the application/service that is being requested to be consumed by the end user is safe or not

Protect analyzes the executable (in less than 100 milliseconds) to determine if the application is trying to infect the endpoint with malware. Protect has many benefits, including:

  • It’s different than sandboxing where the application is sent to a sandbox and detonates….and then FireEye triages the executable after the detonation to see if the software code is trying install malware
  • The solution sits in line, analyzes the executable before it can go into effect, and if the executable is deemed malicious,it’s quarantined
  • Protect is able to identify malware that is cleverly obfuscated

Protect + App Control:

This solution provides all of the benefits of Protect but is paired with App Control, a whitelisting feature. Whitelisting can slow down productivity for users who are constantly consuming new applications. When they aren’t able to consume the needed application, they ask IT to fix this problem, however IT administrators aren’t malware analysts, so they aren’t in a good position to make decisions on whether or not an application is safe to use. This extra workload can bog them down quickly.

Cylance suggest that you use AppControl on devices that don’t consume new applications/services regularly (i.e. data center servers, point of sale systems, industrial control systems, ATMs, Kiosks, etc.)

Webinars

  • 8 Ways Unified Endpoint Management (UEM) Enables Productivity

    Watch Now

    During this webinar, attendees learned-

    • UEM's Unified, multi-OS endpoint management across all ownership models
    • How UEM provides an integrated view across multiple ownership models and platforms
    • Ways Zero Trust meets security team needs
  • Defend Against Future Cyberattacks in Education, State, and Local Governments

    Watch Now

    During this webinar we discussed:

    • How to minimize your organization's risk and protect it from the costs of non-compliance
    • Combining AI-driven threat detection with automated response capabilities to help analysts at all skill levels to thwart sophisticated attacks before executed
    • Using the power of Artificial Intelligence, Algorithmic Science, and Machine Learning to predict known and unknown attacks
  • Hacking Exposed - A Look Inside The Techniques of OceanLotus/APT32

    Watch Now

    During this webinar, attendees:

    • Learned about the ever-changing threat landscape and how you can prevent and respond to today's most pervasive threats - including ones never seen before
    • Received hands-on experience with modern security tools
    • Discovered vital techniques for use in your own testing

Contracts

Federal

GSA Schedule 70

GS-35F-0119Y
Dec 20, 2011- Dec 19, 2016

State and Local

City of Seattle Contract

0000003265
Jul 11, 2014- Dec 19, 2016

Department of General Services PA - Symantec

4400004253
May 01, 2009- Jun 17, 2017

Maryland Master Contract (COTS)

060B2490021
Oct 01, 2012- Sep 30, 2027
*Additional Option Years Available

State of Alabama Cloud Solutions Contract- NASPO

MA 999 190000000277
Jun 10, 2019- Sep 16, 2026
*Additional Option Years Available

State of California Cloud Solutions Contract- NASPO

7-17-70-40-05
Sep 15, 2017- Sep 15, 2026
*Additional Option Years Available

State of Delaware Cloud Solutions Contract- NASPO

GSS177930CLOUD_SOL
Jun 30, 2017- Sep 15, 2026
*Additional Option Years Available

State of Indiana Contract

0000000000000000000021430
Aug 01, 2017- Jul 31, 2019

State of New Mexico Contract

80-000-18-00002
Aug 01, 2017- Aug 01, 2021

Texas DIR-CPO-4444

DIR-CPO-4444
Jan 28, 2020- Jan 23, 2022
*Additional Option Years Available

Education

Massachusetts Higher Education Consortium (MHEC)

MC15-04
Aug 10, 2019- Jun 30, 2022
*Additional Option Years Available

NJSBA Contract

E-8801-ACESCPS
Oct 20, 2015- Oct 20, 2020

The Quilt

MSA - 05012019F
Apr 01, 2016- Mar 31, 2019

Events

News

Latest News

Today, Cylance was named to the first-ever Forbes 2016 Cloud 100, the definitive list of the top 100 private cloud companies in the world, developed in partnership with Bessemer Venture Partners. To ...
READ MORE >

Resources

Case Study

The government of one of the 44 most populous counties in the United States, which provides a comprehensive range of services to more than a million citizens. Read More.

Datasheet

The virtual borders of a corporate network are no longer defined by the corporate firewall. With the proliferation of work and personal devices at home, the distinction between the corporate network and employees’ home networks has become blurred. CISOs and their security teams have a difficult...

Cylance_BB_Logo_RGB_Horz_Black-MICROSITE-LOGO.jpg
Datasheet
Endpoint Detection and Response Designed for CylancePROTECT® Endpoints

CylanceGUARD is a 24x7 managed detection and response offering that provides actionable intelligence for customers to prevent threats quickly, while minimizing alert fatigue without requiring additional resources.

BlackBerry® Cylance® Protection Without a Connection

According to a 2019 SANS Institute survey sponsored by BlackBerry Cylance, there is now broad consensus among security professionals that artificial intelligence (AI) technologies can play an important role in reducing cyber risks. Exactly what that role is, however, and how it will evolve over...

E-Book

Download the full E-Book to learn more.

Guide

The Cylance® 2019 Threat Report provides unique findings drawn from our consulting engagements, threat research and intelligence efforts, and through feedback provided by Cylance customers.

In this evaluation guide, we’ll compare CylancePROTECT and Cylance Smart Antivirus to illustrate the role each solution can play in helping your business achieve a prevention-first security posture.

Infographic

For years, organizations have been stuck in an endless chase cycle: an attacker compromises the system, and then, analysts scramble to stem the attack and work to return to a trusted state. Why? Legacy security solutions that rely on signatures can only prevent malware that’s already been seen...