Services
Industry
Use Case
Axiom Alliance
Solution Partners
Partners
Knowledge Center
Events
Support
About Us
News and Press
Contact Us
…we determined signature-based AV wasn’t going to do it — not on its own. We need something more sophisticated for the endpoint.
Kevin Lovegrove, Bahrain Petroleum Company
CylancePROTECT runs very streamlined. Our users report that their computers are running more smoothly and faster now that the previous antivirus software is gone.
Jeremy Mayfield, IT director, American Cement
We were up and running with CylancePROTECT within a day. The competing product required a week of planning before we could get started with the installation.
Nathan Powell, IT Manager, Investa
ROI can be calculated in many ways, but failing to consider all factors can leave you with an equation that just doesn’t add up.
Data Loss
System Damage
Operation Slowdown
Staff Shortage
Reputation
| Capability | CylancePROTECT | Previous Generation Legacy Solution |
|---|---|---|
| Malware prevention | AI is the primary conviction tool, no signatures required | Signature-based – requires frequent updates to catch-up to identified threats |
| Other threat prevention capabilities | Gain script control, application control, memory protection, device usage policy enforcement | Varies from product to product but generally offers rudimentary threat prevention techniques |
| Deployment model | Deployed on endpoint with management console in the cloud | Deployed on the endpoint with the management console deployed in the cloud |
| Continuous prevention | Endpoints are protected regardless of network connection – the ML model runs on the endpoint no cloud connection required | Cloud connection usually required; prevention can progressively degrade if the endpoint is offline even for a short period of time |
| CylancePROTECT | |
|---|---|
| Malware prevention | AI is the primary conviction tool, no signatures required |
| Other threat prevention capabilities | Gain script control, application control, memory protection, device usage policy enforcement |
| Deployment model | Deployed on endpoint with management console in the cloud |
| Continuous prevention | Endpoints are protected regardless of network connection – the ML model runs on the endpoint no cloud connection required |
| Previous Generation Legacy Solution | |
|---|---|
| Malware prevention | Signature-based – requires frequent updates to catch-up to identified threats |
| Other threat prevention capabilities | Varies from product to product but generally offers rudimentary threat prevention techniques |
| Deployment model | Deployed on the endpoint with the management console deployed in the cloud |
| Continuous prevention | Cloud connection usually required; prevention can progressively degrade if the endpoint is offline even for a short period of time |
Data Sheet
Report
Infographic