CylanceENDPOINT Overview

CylanceENDPOINT revolutionizes endpoint protection by using AI-driven technology to prevent malware and cyber threats before they can cause damage. Unlike traditional security solutions, CylanceENDPOINT uses machine learning to predict and neutralize potential threats with minimal impact on system resources. Its proactive approach eliminates the need for frequent updates, ensuring continuous protection against evolving cyberattacks. The software provides robust protection for endpoints such as desktops, laptops, and mobile devices. With easy deployment and a cloud-based management console, CylanceENDPOINT is ideal for businesses seeking advanced, hassle-free security solutions that minimize the risk of data breaches and safeguard their sensitive information across multiple devices.

Read More

CylanceENDPOINT Screenshot & Video

Contact Details

  • Vendor Name Blackberry
  • Founded 2007
  • Location United States

Support

  • Chat Chat

Training

  • Webinar Webinar
  • Documentation Documentation

Licensing & Deployment

  • Proprietary Proprietary
  • Cloud Hosted Cloud Hosted
  • Web-Based Web-Based

Typical Customers

  • Self-Employed Self-Employed
  • Small-Business Small-Business
  • Midsize-Business Midsize-Business

Languages Supported

English


Industries

Accounting, Computer Software, Construction, Information Technology & Services, Non-profit Organization Management

You May Also Like

Sponsor

NinjaOne

NinjaOne

Contact Vendor

ESET Endpoint Security

ESET Endpoint Security

$211 Per year

Bitdefender GravityZone

Bitdefender GravityZone

$77.69 Per year

GlobalProtect

GlobalProtect

Contact Vendor

CylanceENDPOINT Features

  • Arrow Icon Endpoint Protection
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Security Auditing
  • Arrow Icon Real Time Monitoring
  • Arrow Icon Data Security
  • Arrow Icon Secure Data Storage
  • Arrow Icon Application Security
  • Arrow Icon Password Management
  • Arrow Icon Alerts/Escalation
  • Arrow Icon Anti Virus
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Network Security
  • Arrow Icon SSL Security
  • Arrow Icon Incident Management
  • Arrow Icon Server Monitoring
  • Arrow Icon Remote Monitoring & Management
  • Arrow Icon Financial Data Protection
  • Arrow Icon HIPAA Compliant
  • Arrow Icon Anti Spam
  • Arrow Icon Audit Trail
  • Arrow Icon Maintenance Scheduling
  • Arrow Icon Patch Management
  • Arrow Icon Threat Intelligence
  • Arrow Icon Threat Response
  • Arrow Icon VPN
  • Arrow Icon Encryption
  • Arrow Icon Firewalls
  • Arrow Icon Whitelisting/Blacklisting
  • Arrow Icon Compliance Management
  • Arrow Icon Policy Management
  • Arrow Icon Audit Trail
  • Arrow Icon Real Time Reporting
  • Arrow Icon Single Sign On
  • Arrow Icon Secure Data Storage
  • Arrow Icon Behavior Tracking
  • Arrow Icon Incident Management
  • Arrow Icon Activity Tracking
  • Arrow Icon SSL Security
  • Arrow Icon Patch Management
  • Arrow Icon Endpoint Protection
  • Arrow Icon Risk Alerts
  • Arrow Icon Remote Monitoring & Management
  • Arrow Icon Security Auditing
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Event Logs
  • Arrow Icon HIPAA Compliant
  • Arrow Icon Server Monitoring
  • Arrow Icon Anti Virus
  • Arrow Icon Authentication
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Two-Factor Authentication
  • Arrow Icon Threat Response
  • Arrow Icon Data Security
  • Arrow Icon Firewalls
  • Arrow Icon Application Security
  • Arrow Icon Alerts/Escalation
  • Arrow Icon Real Time Reporting
  • Arrow Icon Behavioral Analytics
  • Arrow Icon Incident Management
  • Arrow Icon Secure Data Storage
  • Arrow Icon Compliance Management
  • Arrow Icon Patch Management
  • Arrow Icon HIPAA Compliant
  • Arrow Icon Risk Analysis
  • Arrow Icon Policy Management
  • Arrow Icon User Management
  • Arrow Icon Encryption
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Server Monitoring
  • Arrow Icon Event Logs
  • Arrow Icon Remote Monitoring & Management
  • Arrow Icon Device Management
  • Arrow Icon Web Threat Management
  • Arrow Icon Security Auditing
  • Arrow Icon Monitoring
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Anomaly/Malware Detection
  • Arrow Icon Threat Response
  • Arrow Icon Policy Management
  • Arrow Icon Threat Response
  • Arrow Icon Event Logs
  • Arrow Icon VPN
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Activity Monitoring
  • Arrow Icon Audit Trail
  • Arrow Icon Patch Management
  • Arrow Icon Compliance Management
  • Arrow Icon Firewalls
  • Arrow Icon Real-Time Monitoring
  • Arrow Icon Risk Alerts
  • Arrow Icon Access Controls/Permissions
  • Arrow Icon Intrusion Detection System
  • Arrow Icon Reporting/Analytics
  • Arrow Icon Anti Virus
  • Arrow Icon Network Provisioning
  • Arrow Icon Threat Response
  • Arrow Icon Prioritization
  • Arrow Icon Reporting/Analytics
  • Arrow Icon Vulnerability Scanning
  • Arrow Icon Network Monitoring
  • Arrow Icon Server Monitoring
  • Arrow Icon Activity Dashboard
  • Arrow Icon Web-Application Security
  • Arrow Icon Incident Reporting
  • Arrow Icon Alerts/Notifications
  • Arrow Icon Application Security
  • Arrow Icon Data Visualization
  • Arrow Icon Monitoring
  • Arrow Icon Real-Time Data

CylanceENDPOINT Pricing

Pricing Type

  • Pricing Type Contact Vendor

Preferred Currency

  • USD ($) USD ($)

Free Trial

  • NA

Free Version

  • NA

Payment Frequency

  • Monthly Subscription Monthly Subscription

CylanceENDPOINT FAQs

CylanceENDPOINT revolutionizes endpoint protection by using AI-driven technology to prevent malware and cyber threats before they can cause damage. Unlike traditional security solutions, CylanceENDPOINT uses machine learning to predict and neutralize potential threats with minimal impact on system resources. Its proactive approach eliminates the need for frequent updates, ensuring continuous protection against evolving cyberattacks. The software provides robust protection for endpoints such as desktops, laptops, and mobile devices. With easy deployment and a cloud-based management console, CylanceENDPOINT is ideal for businesses seeking advanced, hassle-free security solutions that minimize the risk of data breaches and safeguard their sensitive information across multiple devices.

  • No, CylanceENDPOINT does not offer a free version.

  • Yes, CylanceENDPOINT offers a free trial.

  • No, Credit Card details are not required for the CylanceENDPOINT trial.

  • CylanceENDPOINT supports the following payment frequencies:

    • Monthly Subscription

  • No, CylanceENDPOINT does not offer an API.

  • CylanceENDPOINT offers support with the following options:
    • Chat

  • CylanceENDPOINT offers training with the following options:
    • Webinar , Documentation

  • CylanceENDPOINT supports the following languages:
    • English

  • Following are the typical users of the CylanceENDPOINT:
    • Self-Employed , Small-Business , Midsize-Business

  • CylanceENDPOINT supports the following deployment:
    • Cloud Hosted

  • CylanceENDPOINT supports the following devices and operating systems:
    • Web-Based

CylanceENDPOINT Comparisons

CylanceENDPOINT vs Avast Ultimate Business Security

CylanceENDPOINT vs ESET Endpoint Security

CylanceENDPOINT vs Malwarebytes for Business

CylanceENDPOINT vs Bitdefender GravityZone

CylanceENDPOINT vs Splunk Enterprise

CylanceENDPOINT vs Webroot Business Endpoint Protection

CylanceENDPOINT vs Jamf Protect

CylanceENDPOINT vs Falcon LogScale

CylanceENDPOINT vs SentinelOne

CylanceENDPOINT vs Invicti

CylanceENDPOINT vs ConnectWise SIEM

CylanceENDPOINT vs WebTitan

CylanceENDPOINT vs Perimeter 81

CylanceENDPOINT vs Netsurion

CylanceENDPOINT vs Xcitium Endpoint Detection & Resonse

CylanceENDPOINT vs GoodAccess