• Is installed on all endpoints (consumes less than 1% of CPU)
  • Uses a mathematical formula and artificial intelligence to determine whether or not the application/service that is being requested to be consumed by the end user is safe or not

Protect analyzes the executable (in less than 100 milliseconds) to determine if the application is trying to infect the endpoint with malware. Protect has many benefits, including:

  • It’s different than sandboxing where the application is sent to a sandbox and detonates….and then FireEye triages the executable after the detonation to see if the software code is trying install malware
  • The solution sits in line, analyzes the executable before it can go into effect, and if the executable is deemed malicious,it’s quarantined
  • Protect is able to identify malware that is cleverly obfuscated

Protect + App Control:

This solution provides all of the benefits of Protect but is paired with App Control, a whitelisting feature. Whitelisting can slow down productivity for users who are constantly consuming new applications. When they aren’t able to consume the needed application, they ask IT to fix this problem, however IT administrators aren’t malware analysts, so they aren’t in a good position to make decisions on whether or not an application is safe to use. This extra workload can bog them down quickly.

Cylance suggest that you use AppControl on devices that don’t consume new applications/services regularly (i.e. data center servers, point of sale systems, industrial control systems, ATMs, Kiosks, etc.)


  • 8 Ways Unified Endpoint Management (UEM) Enables Productivity

    Watch Now

    During this webinar, attendees learned-

    • UEM's Unified, multi-OS endpoint management across all ownership models
    • How UEM provides an integrated view across multiple ownership models and platforms
    • Ways Zero Trust meets security team needs
  • Defend Against Future Cyberattacks in Education, State, and Local Governments

    Watch Now

    During this webinar we discussed:

    • How to minimize your organization's risk and protect it from the costs of non-compliance
    • Combining AI-driven threat detection with automated response capabilities to help analysts at all skill levels to thwart sophisticated attacks before executed
    • Using the power of Artificial Intelligence, Algorithmic Science, and Machine Learning to predict known and unknown attacks
  • Hacking Exposed - A Look Inside The Techniques of OceanLotus/APT32

    Watch Now

    During this webinar, attendees:

    • Learned about the ever-changing threat landscape and how you can prevent and respond to today's most pervasive threats - including ones never seen before
    • Received hands-on experience with modern security tools
    • Discovered vital techniques for use in your own testing


GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021

State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021

Illinois Public Higher Education Cooperative (IPHEC)

Contract Number: #1818GAL Term: July 3, 2018 - May 31, 2020

Maryland Master Contract (COTS)

Project No.: 060B249002, Term: September 30, 2027

NASPO ValuePoint

Term: through September 15, 2026

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through November 30, 2021

State of Indiana Contract

Contract Number: 0000000000000000000021430 Term: August 1, 2017 – July 31, 2021

State of New Mexico Contract

Contract Number: 80-000-18-00002 Contract Period: August 1, 2017 – August 1, 2021

Texas DIR-TSO-4288

Texas DIR Contract: DIR-TSO-4288 Contract Period: Through February 21, 2021 (with 2 option years)

Education Contracts


NJEDGE VMware Contract: 00278834 Contract Period: Through June 30, 2020

The Quilt

Term: through April 30, 2022



Latest News

Today, Cylance was named to the first-ever Forbes 2016 Cloud 100, the definitive list of the top 100 private cloud companies in the world, developed in partnership with Bessemer Venture Partners. To ...


Case Study

The government of one of the 44 most populous counties in the United States, which provides a comprehensive range of services to more than a million citizens. Read More.


The virtual borders of a corporate network are no longer defined by the corporate firewall. With the proliferation of work and personal devices at home, the distinction between the corporate network and employees’ home networks has become blurred. CISOs and their security teams have a difficult...

Endpoint Detection and Response Designed for CylancePROTECT® Endpoints

CylanceGUARD is a 24x7 managed detection and response offering that provides actionable intelligence for customers to prevent threats quickly, while minimizing alert fatigue without requiring additional resources.

BlackBerry® Cylance® Protection Without a Connection

According to a 2019 SANS Institute survey sponsored by BlackBerry Cylance, there is now broad consensus among security professionals that artificial intelligence (AI) technologies can play an important role in reducing cyber risks. Exactly what that role is, however, and how it will evolve over...


Download the full E-Book to learn more.


The Cylance® 2019 Threat Report provides unique findings drawn from our consulting engagements, threat research and intelligence efforts, and through feedback provided by Cylance customers.

In this evaluation guide, we’ll compare CylancePROTECT and Cylance Smart Antivirus to illustrate the role each solution can play in helping your business achieve a prevention-first security posture.


For years, organizations have been stuck in an endless chase cycle: an attacker compromises the system, and then, analysts scramble to stem the attack and work to return to a trusted state. Why? Legacy security solutions that rely on signatures can only prevent malware that’s already been seen...