• Is installed on all endpoints (consumes less than 1% of CPU)
  • Uses a mathematical formula and artificial intelligence to determine whether or not the application/service that is being requested to be consumed by the end user is safe or not

Protect analyzes the executable (in less than 100 milliseconds) to determine if the application is trying to infect the endpoint with malware. Protect has many benefits, including:

  • It’s different than sandboxing where the application is sent to a sandbox and detonates….and then FireEye triages the executable after the detonation to see if the software code is trying install malware
  • The solution sits in line, analyzes the executable before it can go into effect, and if the executable is deemed malicious,it’s quarantined
  • Protect is able to identify malware that is cleverly obfuscated

Protect + App Control:

This solution provides all of the benefits of Protect but is paired with App Control, a whitelisting feature. Whitelisting can slow down productivity for users who are constantly consuming new applications. When they aren’t able to consume the needed application, they ask IT to fix this problem, however IT administrators aren’t malware analysts, so they aren’t in a good position to make decisions on whether or not an application is safe to use. This extra workload can bog them down quickly.

Cylance suggest that you use AppControl on devices that don’t consume new applications/services regularly (i.e. data center servers, point of sale systems, industrial control systems, ATMs, Kiosks, etc.)


  • 8 Ways Unified Endpoint Management (UEM) Enables Productivity

    Watch Now

    During this webinar, attendees learned-

    • UEM's Unified, multi-OS endpoint management across all ownership models
    • How UEM provides an integrated view across multiple ownership models and platforms
    • Ways Zero Trust meets security team needs
  • Defend Against Future Cyberattacks in Education, State, and Local Governments

    Watch Now

    During this webinar we discussed:

    • How to minimize your organization's risk and protect it from the costs of non-compliance
    • Combining AI-driven threat detection with automated response capabilities to help analysts at all skill levels to thwart sophisticated attacks before executed
    • Using the power of Artificial Intelligence, Algorithmic Science, and Machine Learning to predict known and unknown attacks
  • Hacking Exposed - A Look Inside The Techniques of OceanLotus/APT32

    Watch Now

    During this webinar, attendees:

    • Learned about the ever-changing threat landscape and how you can prevent and respond to today's most pervasive threats - including ones never seen before
    • Received hands-on experience with modern security tools
    • Discovered vital techniques for use in your own testing



GSA Schedule 70

Dec 20, 2011- Dec 19, 2021


Mar 03, 2015- Aug 10, 2020
*Additional Option Years Available

State and Local

City of Seattle Contract

Jul 11, 2014- Dec 19, 2021

Department of General Services PA - Symantec

May 01, 2009- Dec 19, 2021

Kentucky COT - NASPO

Jun 21, 2017- Sep 15, 2026

Maryland Master Contract (COTS)

Oct 01, 2012- Sep 30, 2027

NASPO ValuePoint

Oct 14, 2016- Sep 15, 2026

State of Alabama Cloud Solutions Contract- NASPO

MA 999 190000000277
Jun 10, 2019- Sep 16, 2026

State of California Cloud Solutions Contract- NASPO

Sep 15, 2017- Sep 15, 2026

State of Delaware Cloud Solutions Contract- NASPO

Jun 30, 2017- Sep 15, 2026

State of Florida Department of Management Services Cloud Solutions Contract- NASPO

Aug 01, 2017- Sep 30, 2020

State of Hawaii Cloud Solutions Contract - NASPO

Jul 01, 2017- Sep 15, 2026

State of Indiana Contract

Aug 01, 2017- Jul 31, 2021

State of Kansas Cloud Solutions Contract- NASPO

Jul 01, 2017- Sep 15, 2026

State of Louisiana Cloud Solutions Contract- NASPO

Mar 03, 2017- Sep 15, 2026

State of Minnesota Cloud Solutions Contract- NASPO

Aug 16, 2017- Sep 16, 2026

State of Missouri Cloud Solutions Contract- NASPO

Apr 21, 2018- Sep 10, 2026

State of Nebraska Cloud Solutions Contract- NASPO

78128 O4
Jul 19, 2017- Sep 16, 2026

State of Nevada Cloud Solutions Contract- NASPO

Jun 15, 2017- Sep 15, 2026

State of New Mexico Cloud Solutions Contract- NASPO

May 10, 2018- Sep 16, 2026

State of New Mexico Contract

Aug 01, 2017- Aug 01, 2021

State of Oklahoma Cloud Solutions Contract- NASPO

May 17, 2017- Sep 15, 2026

State of Washington Cloud Solutions Contract- NASPO

Jul 17, 2017- Sep 15, 2026

Texas DIR-CPO-4444

Jan 28, 2020- Jan 23, 2022
*Additional Option Years Available


Massachusetts Higher Education Consortium (MHEC)

Aug 10, 2019- Jun 30, 2022

NJSBA Contract

Oct 20, 2015- Oct 20, 2020

The Quilt

MSA - 05012019F
Apr 01, 2016- Apr 30, 2022



Aug 31, 2020- Aug 30, 2025
*Additional Option Years Available



Latest News

Today, Cylance was named to the first-ever Forbes 2016 Cloud 100, the definitive list of the top 100 private cloud companies in the world, developed in partnership with Bessemer Venture Partners. To ...


Product Brief

What's new in CylanceOPTICS v2.4.

In July, BlackBerry Cylance introduced CylanceGUARD™, a managed detection and response (MDR) solution that leverages our security experts and industry-leading native AI platform to provide continuous threat hunting and monitoring. Join us as Jason Bevis, BlackBerry Cylance Vice President, MDR, ...


BlackBerry Cylance harnesses the power of AI to deliver trusted security throughout organizations. The BlackBerry Cylance AI Platform™ is a cybersecurity suite that protects the complete attack surface with automated threat prevention, detection, and response capabilities.

A common criticism of computer security products is that they can only protect against known threats. When new attacks are detected and analysed security companies produce updates based on this new knowledge, which can then be applied to endpoint, network and cloud security software and services...

Download the full report here.

The security professional’s job has become an endless game of cat-and-mouse, continually pursuing invisible attackers that can out-think, out-run, and outsmart most security systems. No matter how efficient and nimble the professional, the attackers are fast, too. And getting faster every day. ...

The BlackBerry® Cylance® 2020 Threat Report contains a broad range of topics vital to the interests of businesses, governments, and end-users. It delivers the combined security insights of BlackBerry, a trailblazer in the Internet of things (IoT) and mobile security, and Cylance, an early ...

BlackBerry Cylance harnesses the power of AI to deliver trusted security throughout organizations. The BlackBerry Cylance AI Platform™ is a cybersecurity suite that protects the complete attack surface with automated threat prevention, detection, and response capabilities.


The Cylance 2019 Threat Report Represents the company's piece of the overall cybersecurity puzzle. It details the trends observed and the insights gained, and the threats Cylance's consulting team, research team, and customers encountered over the past year. Cylance shares this report in the hope th...