Video Poster Image

CylanceENDPOINT Powered by Cylance AI

For over a decade, Cylance® AI has been deployed by businesses and governments around the world, stopping both current and future zero-day attacks with validated accuracy. Now it also incorporates the intelligence of generative AI.

Introducing Cylance Assistant: GenAI in CylanceENDPOINT

Cylance® Assistant, our generative AI model trained on BlackBerry's award-winning cyber threat intelligence, helps you achieve more with less. It uses private LLMs for enhanced privacy and accuracy to proactively predict your needs and provide expert guidance. ​

Fully Integrated  Fully Integrated  Fully Integrated

Fully Integrated

Included with CylanceENDPOINT™, this feature provides lightning-fast expert guidance to security analysts. The result: quicker investigations and efficient resolution of potential security threats. 
Beyond Chatbots​ Beyond Chatbots​ Beyond Chatbots​

Beyond Chatbots​

Don’t worry about being a prompt-writing expert. Cylance Assistant understands the context of your analysis workflow and immediately provides expert guidance.
No Additional Cost No Additional Cost No Additional Cost

No Additional Cost

Cylance Assistant is included at no additional cost, streamlining security operations and maximizing the value of your existing CylanceENDPOINT investment. Make the most of your security budget and staffing resources.
Responsible AI Responsible AI Responsible AI

Responsible AI

Our GenAI doesn't train on or share customer data. It offers the same level of data privacy as our Cylance Cybersecurity Platform, as BlackBerry is dedicated to ethical, responsible and secure business practices.​

So Many Threats, So Few Resources

Organizations struggle to prevent stealthy attacks like supply chain compromises that leverage trusted components. Legacy security offerings are too complex for many organizations and fail to extract value from detections, putting them at risk of advanced threats and data breaches. Download this evaluation guide to understand what questions to ask when assessing endpoint security solutions.

Data Breaches

A large exposed attack surface increases the risk of data breaches. The consequences include immeasurable damage to customers and to your organization's reputation.

Alert Fatigue

Without being able to prioritize risks, security teams are at risk of alert fatigue. The longer dwell times let attackers remain undiscovered, giving them more time to cause business disruptions.

Lack of Visibility

Disparate security tools leave gaps in visibility, and these siloed solutions obscure risks. Without a unified view of the security posture, organizations jeopardize their compliance requirements.
decorative decorative
Stop Threats with a Self-Defending AI Before They Cause Damage

Stop Threats with a Self-Defending AI Before They Cause Damage

CylanceENDPOINT™ leverages the most advanced AI in the market to detect threats before they cause damage, minimizing business disruptions and the costs incurred during a ransomware attack.​
List Item Bullet

Up to 25% more effective at stopping malware than the competition's solutions

List Item Bullet

Uses up to 8x less system impact on CPU processing power on average with a lightweight endpoint agent

List Item Bullet

Defends against malware, malicious scripts, zero-day threats, and fileless memory exploits

decorative decorative

Getting the World-Class Security You Need with the Resources You Have

Leverage the world's longest running cybersecurity AI to help collect and triage security data, using the resources you already have to minimize time spent coherently organizing alerts.
List Item Bullet

Automatically prevent zero-day threats and stop attacks immediately

List Item Bullet

Accurately detect lateral movement

List Item Bullet

Reduce security incident investigation and recovery time by 30 percent and alert fatigue by 90 percent*

decorative decorative

Excels in Any Environment

Save time and money with CylanceENDPOINT, whether your environment is modern, sleek, and connected, or old, isolated, and performance-challenged.
List Item Bullet

Uses single-pane-of-glass management with 90 percent less CPU consumption

List Item Bullet

Doesn’t require an Internet connection

List Item Bullet

Supports cloud-native, hybrid, and on-premises software stacks

BlackBerry Named 2023 Customers’ Choice for Endpoint Protection Platforms on Gartner Peer Insights

BlackBerry Named 2023 Customers’ Choice for Endpoint Protection Platforms on Gartner Peer Insights

We are proud to be recognized as a Customers’ Choice vendor for 2023 in the endpoint protection platform (EPP) category of Gartner® Peer Insights. This includes additional recognition as a Larger Enterprise Customers' Choice and a Midsize Enterprise Customers' Choice. BlackBerry is also one of just two EPP vendors recognized with a Customers' Choice distinction in every evaluated region of the world, including North America, Latin America, Europe, the Middle East and Africa (EMEA), and the Asia Pacific (APAC) region.
Not applicable Standard Advanced Pro
 
Formerly CylancePROTECT®
Formerly CylancePROTECT + CylanceOPTICS®
CylancePROTECT + CylanceOPTICS + Threat Intelligence
 
Fast, easy cloud-managed threat prevention for all of your Windows®, Mac®, Linux®, Android, and iOS® devices.
Advanced endpoint threat visibility with investigation, response, and threat hunting across your devices.
Expert features to configure, prioritize, and understand endpoint threats and automate security event communications.
Broad OS Support
CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS
Modern AI Protection
Advanced AI that detects threats before they cause damage Advanced AI that detects threats before they cause damage Advanced AI that detects threats before they cause damage
Endpoint Alert Visibility and Prioritization
Autonomous grouping and correlation of alerts Autonomous grouping and correlation of alerts Autonomous grouping and correlation of alerts
Advanced Threat Protection - PE, Memory Protection, and Script Control
Detects and stops malware, malicious scripts, zero-day threats, and memory exploits Detects and stops malware, malicious scripts, zero-day threats, and memory exploits Detects and stops malware, malicious scripts, zero-day threats, and memory exploits
Device Control
Get visibility and control over USB devices to stop internal or external threats Get visibility and control over USB devices to stop internal or external threats Get visibility and control over USB devices to stop internal or external threats
App Control
Control what applications are allowed or blocked anywhere Control what applications are allowed or blocked anywhere Control what applications are allowed or blocked anywhere
Threat Hunting and Investigation Tools
Detection and monitoring tools to combat threats and stop attackers Detection and monitoring tools to combat threats and stop attackers
Advanced Response Actions and Automated Workflows
Automated response to quickly stop and remediate attacks Automated response to quickly stop and remediate attacks
30-Day Data Storage
Easily access historic data to aid in threat hunting and analysis Easily access historic data to aid in threat hunting and analysis
Contextual Threat Intel Reports
Expertly crafted and customized cyber threat intelligence relevant to your organization
Standard
Broad OS Support
Formerly CylancePROTECT®
Fast, easy cloud-managed threat prevention for all of your Windows®, Mac®, Linux®, Android, and iOS® devices.
Broad OS Support CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS
Modern AI Protection Advanced AI that detects threats before they cause damage
Endpoint Alert Visibility and Prioritization Autonomous grouping and correlation of alerts
Advanced Threat Protection - PE, Memory Protection, and Script Control Detects and stops malware, malicious scripts, zero-day threats, and memory exploits
Device Control Get visibility and control over USB devices to stop internal or external threats
App Control Control what applications are allowed or blocked anywhere
Threat Hunting and Investigation Tools
Advanced Response Actions and Automated Workflows
30-Day Data Storage
Contextual Threat Intel Reports
Advanced
Broad OS Support
Formerly CylancePROTECT + CylanceOPTICS®
Advanced endpoint threat visibility with investigation, response, and threat hunting across your devices.
Broad OS Support CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS
Modern AI Protection Advanced AI that detects threats before they cause damage
Endpoint Alert Visibility and Prioritization Autonomous grouping and correlation of alerts
Advanced Threat Protection - PE, Memory Protection, and Script Control Detects and stops malware, malicious scripts, zero-day threats, and memory exploits
Device Control Get visibility and control over USB devices to stop internal or external threats
App Control Control what applications are allowed or blocked anywhere
Threat Hunting and Investigation Tools Detection and monitoring tools to combat threats and stop attackers
Advanced Response Actions and Automated Workflows Automated response to quickly stop and remediate attacks
30-Day Data Storage Easily access historic data to aid in threat hunting and analysis
Contextual Threat Intel Reports
Pro
Broad OS Support
CylancePROTECT + CylanceOPTICS + Threat Intelligence
Expert features to configure, prioritize, and understand endpoint threats and automate security event communications.
Broad OS Support CylanceENDPOINT covers Windows, Mac, Linux, iOS/iPadOS, Android, and Chrome OS
Modern AI Protection Advanced AI that detects threats before they cause damage
Endpoint Alert Visibility and Prioritization Autonomous grouping and correlation of alerts
Advanced Threat Protection - PE, Memory Protection, and Script Control Detects and stops malware, malicious scripts, zero-day threats, and memory exploits
Device Control Get visibility and control over USB devices to stop internal or external threats
App Control Control what applications are allowed or blocked anywhere
Threat Hunting and Investigation Tools Detection and monitoring tools to combat threats and stop attackers
Advanced Response Actions and Automated Workflows Automated response to quickly stop and remediate attacks
30-Day Data Storage Easily access historic data to aid in threat hunting and analysis
Contextual Threat Intel Reports Expertly crafted and customized cyber threat intelligence relevant to your organization

How to Get Started

We’re here to help. Reach out to speak with a BlackBerry expert to talk about your specific cybersecurity needs.

Talk to an Expert

See It In Action

See How Other Companies Benefit from BlackBerry Cybersecurity

Sources

  • *Alert fatigue reduction measured in terms of reported alerts without grouping and correlation of alerts across tenants of 700M and reduction of alerts to 68M with our zero-touch grouping and correlation of alerts (Dec 2022)