• Is installed on all endpoints (consumes less than 1% of CPU)
  • Uses a mathematical formula and artificial intelligence to determine whether or not the application/service that is being requested to be consumed by the end user is safe or not

Protect analyzes the executable (in less than 100 milliseconds) to determine if the application is trying to infect the endpoint with malware. Protect has many benefits, including:

  • It’s different than sandboxing where the application is sent to a sandbox and detonates….and then FireEye triages the executable after the detonation to see if the software code is trying install malware
  • The solution sits in line, analyzes the executable before it can go into effect, and if the executable is deemed malicious,it’s quarantined
  • Protect is able to identify malware that is cleverly obfuscated

Protect + App Control:

This solution provides all of the benefits of Protect but is paired with App Control, a whitelisting feature. Whitelisting can slow down productivity for users who are constantly consuming new applications. When they aren’t able to consume the needed application, they ask IT to fix this problem, however IT administrators aren’t malware analysts, so they aren’t in a good position to make decisions on whether or not an application is safe to use. This extra workload can bog them down quickly.

Cylance suggest that you use AppControl on devices that don’t consume new applications/services regularly (i.e. data center servers, point of sale systems, industrial control systems, ATMs, Kiosks, etc.)


  • 8 Ways Unified Endpoint Management (UEM) Enables Productivity

    Watch Now

    During this webinar, attendees learned-

    • UEM's Unified, multi-OS endpoint management across all ownership models
    • How UEM provides an integrated view across multiple ownership models and platforms
    • Ways Zero Trust meets security team needs
  • Defend Against Future Cyberattacks in Education, State, and Local Governments

    Watch Now

    During this webinar we discussed:

    • How to minimize your organization's risk and protect it from the costs of non-compliance
    • Combining AI-driven threat detection with automated response capabilities to help analysts at all skill levels to thwart sophisticated attacks before executed
    • Using the power of Artificial Intelligence, Algorithmic Science, and Machine Learning to predict known and unknown attacks
  • Hacking Exposed - A Look Inside The Techniques of OceanLotus/APT32

    Watch Now

    During this webinar, attendees:

    • Learned about the ever-changing threat landscape and how you can prevent and respond to today's most pervasive threats - including ones never seen before
    • Received hands-on experience with modern security tools
    • Discovered vital techniques for use in your own testing



GSA Schedule 70

Dec 20, 2011- Dec 19, 2021


Mar 03, 2015- Aug 10, 2020
*Additional Option Years Available

State and Local

City of Seattle Contract

Jul 11, 2014- Dec 19, 2021

Department of General Services PA - Symantec

May 01, 2009- Dec 19, 2021

Kentucky COT - NASPO

Jun 21, 2017- Sep 15, 2026

Maryland Master Contract (COTS)

Oct 01, 2012- Sep 30, 2027

NASPO ValuePoint

Oct 14, 2016- Sep 15, 2026

State of Alabama Cloud Solutions Contract- NASPO

MA 999 190000000277
Jun 10, 2019- Sep 16, 2026

State of California Cloud Solutions Contract- NASPO

Sep 15, 2017- Sep 15, 2026

State of Delaware Cloud Solutions Contract- NASPO

Jun 30, 2017- Sep 15, 2026

State of Florida Department of Management Services Cloud Solutions Contract- NASPO

Aug 01, 2017- Sep 30, 2020

State of Hawaii Cloud Solutions Contract - NASPO

Jul 01, 2017- Sep 15, 2026

State of Indiana Contract

Aug 01, 2017- Jul 31, 2021

State of Kansas Cloud Solutions Contract- NASPO

Jul 01, 2017- Sep 15, 2026

State of Louisiana Cloud Solutions Contract- NASPO

Mar 03, 2017- Sep 15, 2026

State of Minnesota Cloud Solutions Contract- NASPO

Aug 16, 2017- Sep 16, 2026

State of Missouri Cloud Solutions Contract- NASPO

Apr 21, 2018- Sep 10, 2026

State of Nebraska Cloud Solutions Contract- NASPO

78128 O4
Jul 19, 2017- Sep 16, 2026

State of Nevada Cloud Solutions Contract- NASPO

Jun 15, 2017- Sep 15, 2026

State of New Mexico Cloud Solutions Contract- NASPO

May 10, 2018- Sep 16, 2026

State of New Mexico Contract

Aug 01, 2017- Aug 01, 2021

State of Oklahoma Cloud Solutions Contract- NASPO

May 17, 2017- Sep 15, 2026

State of Washington Cloud Solutions Contract- NASPO

Jul 17, 2017- Sep 15, 2026

Texas DIR-CPO-4444

Jan 28, 2020- Jan 23, 2022
*Additional Option Years Available


Massachusetts Higher Education Consortium (MHEC)

Aug 10, 2019- Jun 30, 2022

NJSBA Contract

Oct 20, 2015- Oct 20, 2020

The Quilt

MSA - 05012019F
Apr 01, 2016- Apr 30, 2022



Aug 31, 2020- Aug 30, 2025
*Additional Option Years Available



Latest News

Today, Cylance was named to the first-ever Forbes 2016 Cloud 100, the definitive list of the top 100 private cloud companies in the world, developed in partnership with Bessemer Venture Partners. To ...


Case Study

The government of one of the 44 most populous counties in the United States, which provides a comprehensive range of services to more than a million citizens. Read More.


The virtual borders of a corporate network are no longer defined by the corporate firewall. With the proliferation of work and personal devices at home, the distinction between the corporate network and employees’ home networks has become blurred. CISOs and their security teams have a difficult...

Endpoint Detection and Response Designed for CylancePROTECT® Endpoints

CylanceGUARD is a 24x7 managed detection and response offering that provides actionable intelligence for customers to prevent threats quickly, while minimizing alert fatigue without requiring additional resources.

BlackBerry® Cylance® Protection Without a Connection

According to a 2019 SANS Institute survey sponsored by BlackBerry Cylance, there is now broad consensus among security professionals that artificial intelligence (AI) technologies can play an important role in reducing cyber risks. Exactly what that role is, however, and how it will evolve over...


Download the full E-Book to learn more.


The Cylance® 2019 Threat Report provides unique findings drawn from our consulting engagements, threat research and intelligence efforts, and through feedback provided by Cylance customers.

In this evaluation guide, we’ll compare CylancePROTECT and Cylance Smart Antivirus to illustrate the role each solution can play in helping your business achieve a prevention-first security posture.


For years, organizations have been stuck in an endless chase cycle: an attacker compromises the system, and then, analysts scramble to stem the attack and work to return to a trusted state. Why? Legacy security solutions that rely on signatures can only prevent malware that’s already been seen...