Blackberry Protect Overview

Blackberry Protect is the #12 ranked solution in our list of endpoint security software. It is most often compared to CrowdStrike Falcon: Blackberry Protect vs CrowdStrike Falcon

What is Blackberry Protect?

BlackBerry® Protect is an artificial intelligence (AI) based endpoint protection platform (EPP) that prevents breaches and provides added controls for safeguarding against sophisticated cyberthreats—no human intervention, Internet connections, signature files, heuristics or sandboxes required.

Blackberry Protect Buyer's Guide

Download the Blackberry Protect Buyer's Guide including reviews and more. Updated: June 2021

Blackberry Protect Customers

Panasonic, Noble Energy, Apria Healthcare Group Inc., Charles River Laboratories, Rovi Corporation, Toyota, Kiewit

Blackberry Protect Video

Filter Archived Reviews (More than two years old)

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
BN
Software Engineer at a tech services company with 1-10 employees
Real User
Streamlines vulnerability data and makes it a lot easier to access and sift through it

What is our primary use case?

Our primary use case is threat analytics and log management.

Pros and Cons

  • "It handles situations that the other threat management tools wouldn't find. It has worked well covering the weaker sides of the other products that we're integrating."
  • "I would like to see a better UI in terms of sifting through more specific data and providing analytics. A little bit more would be nice."

What other advice do I have?

It works well and covers a good number of the bases you need covered for general cybersecurity and vulnerability management. I would rate it a nine out of ten for great usage and really good customer service if anything goes wrong.
Eric Rise
Network & Security Engineer at a healthcare company with 51-200 employees
Real User
Endpoints are protected in real-time without the need of a centralized server

Pros and Cons

  • "​Centralized dashboard online which can be used for managing a huge product."
  • "Even if an endpoint loses connection to the Internet, I know that endpoint is protected against 99.99% of the threats in the wild today."
  • "Specifically for a Windows domain environment, the product can be customized and pushed via GPO or SCCM without issue.​"
  • "Endpoints are protected in real-time without the need of a centralized server."
  • "​Work on the math model. We are catching a lot of false positives, which gets to be a pain at the start of a deployment."

What other advice do I have?

Do your homework. Demo products to see how they will work within your environment and involve your end users. End users are key to testing these deployments and what their experiences will be with it. Above all, do not get hung up on price. You pay for what you get and expensive will hurt one time, where cheap will hurt forever, especially if you fall victim to a ransom attack, etc.
Learn what your peers think about Blackberry Protect. Get advice and tips from experienced pros sharing their opinions. Updated: June 2021.
511,607 professionals have used our research since 2012.
Andrew S. Baker (ASB)
Cybersecurity & IT Operations Professional (VirtualCxO) at BrainWave Consulting Company, LLC
Consultant
Top 20Popular
The machine learning algorithm is able to protect systems against zero-day threats

Pros and Cons

  • "The CylancePROTECT agent is very low on CPU usage, so it has virtually no adverse impact on my servers, desktops, or workstations."
  • "The management console needs a little maturity in how it presents data and allows the administrator to drill down or search across systems."

What other advice do I have?

We would encourage everyone evaluating endpoint protection solutions to run a 30-day pilot (minimum) in their own environments and with a representative set of devices. Be sure to test the management of the systems, including the policy management and whitelisting/exception management.
ITCS user
Lead Systems Administrator at a energy/utilities company with 1,001-5,000 employees
Vendor
Does malware analysis. Blocks WannaCry and other attacks that have come out.

Pros and Cons

  • "Does malware analysis. Blocks WannaCry and other attacks that have come out."
  • "​It needs real analysis of quarantined files. The EDR product isn't showing much right now."

What other advice do I have?

Review the performance of Cylance over the next year and ask for a 60 day trial, not just a 30 day trial. Monitoring the growth of this company is very important to determine if the product remains at the level that is in today.
Buyer's Guide
Download our free Blackberry Protect Report and get advice and tips from experienced pros sharing their opinions.