Mark BonnamyTechnical Director at Ridgewall Ltd
Anonymous UserCo-Founder, CEO at a tech services company
Randy LahtiFounding Partner, Security Architect at ISS
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"For the initial first level of support, we provide it from our side. If there's escalation required, we use Cisco tech for the AMP. And again, they are perfect. I mean, one of the best, compared to any other vendors."
"The most valuable features of this solution are the IPS and the integration with ISE."
"The simplicity of use is its most valuable feature. You can very clearly see things."
"The stability of the solution is perfect. I believe it's the most stable solution on the market right now."
"I am really satisfied with the technical support."
"It is a very stable program."
"The solution's integration capabilities are excellent. It's one of the best features."
"It doesn't impact the devices. It is an agent-based solution, and we see no performance knock on cell phones. That was a big thing for us, especially in the mobile world. We don't see battery degradation like you do with other solutions which really drain the battery, as they're constantly doing things. That can shorten the useful life of a device."
"The solution is pretty easy to scale."
"The solution is stable."
"On the management side, we liked the way it displays things."
"The solution is extremely scalable. It's got the hybrid functionality, it's got the system functionality and cloud functionality as well."
"The Application Guard and ByteGuard are useful features."
"Two or three years ago when the WannaCry virus struck, the people that were on Cylance were the ones that weren't affected."
"Has good RAM capacity for the power I need"
"It secures different entry points into the network."
"The offline networking is the most important feature. Some of our users are engineers that work offsite, and they can still be on the solution, which is also great."
"The most valuable feature is that it detects and stops malicious executables."
"You can deploy it through the cloud so that even if your stuff is outside of your controlled environment, you are still under control, based on the policies you create. The policies are controlled through the cloud. For example, if I don't allow anyone to do a certain activity or to install a particular app, and a consultant or a partner who is not part of our environment is doing so, it will stop them as well."
"The triage feature that shows you the whole chain of the malware is useful."
"What I like the most about it is the dynamic grouping, where you get to group endpoints based on setup criteria. That's pretty cool. I like the simplified policy management and simplified white-listing process."
"It has intelligent learning behind it and we have been very successful in preventing attacks."
"I like the historical features, interface, and integration."
"The initial setup is pretty straightforward."
"The solution needs more in-depth analytics."
"In the next version of this solution, I would like to see the addition of local authentication."
"The initial setup is a bit complex because you need to execute existing antiviruses or security software that you have on your device."
"In the next release, I would for it to have back up abilities. I would like the ability to go back to a point in time to when my PC was uninfected and to the moment of when the infection happened."
"The reporting and analytics areas of the solution need to be improved."
"I would like more seamless integration."
"The technical support is very slow."
"I would recommend that the solution offer more availability in terms of the product portfolio and integration with third-party products."
"The security scripting needs improvement. It needs deeper security for scripting."
"The solution needs better dashboards that are easier to use."
"It should provide more details about the events that they have detected."
"I would say one thing that they might need to bring in is protection for mobile devices."
"The OPTICS component could be made more user-friendly with respect to giving people more information."
"I would like to see them fix the alerting system so that the endpoint reporting is a bit more streamlined."
"It should have better support for Windows and Mac."
"The user interface is outdated."
"The endpoint machines need improvement."
"This solution works well but needs lots of tuning and optimization."
"As far as I know, Carbon Defense has nothing that can be installed on mobile devices. It lacks a defense solution for mobile devices, especially mobile tablets. I would like to see support for mobile devices and the pricing should be less than the pricing for a normal workstation."
"When you view the triage, it will show you everything within a given time frame, and not only the attack that caused the alert, which is what I want to see. It shows you all the events during that time, and that can be quite confusing."
"The EDR portion could be better. I'm not a big fan, but it works."
"At this point, we're test-bedding several other providers right now to see if there's anything that does equally or better and that comes at a better price point."
"The feature set for the firewall needs improvement."
"The solution needs better overall compatibility with other products."
"The costs of 50 licenses of AMP for three years is around $9,360."
"The price is very good."
"The visibility that we have into the endpoint and the forensics that we're able to collect give us value for the price. This is not an overly expensive solution, considering all the things that are provided. You get great performance and value for the cost."
"Whenever you are doing the licensing process, I would highly advise to look at what other Cisco solutions you have in your organization, then evaluate if an Enterprise Agreement is the best way to go. In our case, it was the best way to go. Since we had so many other Cisco products, we were able to tie those in. We were actually able to get several Cisco security solutions for less than if we had bought three or four Cisco security solutions independently or ad hoc."
"In our case, it is a straightforward annual payment through our Enterprise Agreement."
"Our company was very happy with the price of Cisco AMP. It was about a third of what we were paying for System Center Endpoint Protection."
"There are a couple of different consumption models: Pay up front, or if you have an enterprise agreement, you can do a monthly thing. Check your licensing possibilities and see what's best for your organization."
"The Enterprise Agreement is like an all-you-can-eat buffet of Cisco products. In that vein, it was very affordable."
"We would just add more if there are new users, but right now you just need one license for per user."
"I think that the price we are paying is good for what it is."
"The monthly fee is $55 USD per user."
"The product cost is about $5, per user, per month."
"This cost of the license is approximately $5 USD monthly per user."
"We have branches, we have different companies, but we cannot buy less than 100 licenses. This does not make sense to me... It should be more flexible. I can understand their saying, "Okay, to be a customer you need 100," but to add on to that number it should be something very straightforward. If I need to add five, for example, I shouldn't need to add 100."
"The pricing [is] more or less the same as other similar solutions."
"It's reasonable in price"
"The price for the solution is completely at government level, meaning one which is very high."
Advanced Malware Protection (AMP) is subscription-based, managed through a web-based management console, and deployed on a variety of platforms that protects endpoints, network, email and web Traffic. AMP key features include the following: Global threat intelligence to proactively defend against known and emerging threats, Advanced sandboxing that performs automated static and dynamic analysis of files against more than 700 behavioral indicators, Point-in-time malware detection and blocking in real time and Continuous analysis and retrospective security regardless of the file's disposition and Continuous analysis and retrospective security.
BlackBerry® Protect is an artificial intelligence (AI) based endpoint protection platform (EPP) that prevents breaches and provides added controls for safeguarding against sophisticated cyberthreats—no human intervention, Internet connections, signature files, heuristics or sandboxes required.
CB Defense is an industry-leading next-generation antivirus (NGAV) and endpoint detection and response (EDR) solution. CB Defense is delivered through the CB Predictive Security Cloud, an endpoint protection platform that consolidates security in the cloud using a single agent, console and data set. CB Defense is certified to replace AV and designed to deliver the best endpoint security with the least amount of administrative effort. It protects against the full spectrum of modern cyber attacks, including the ability to detect and prevent both known and unknown attacks. CB Defense leverages the powerful capabilities of the CB Predictive Security Cloud, applying our unique streaming analytics to unfiltered endpoint data in order to predict, detect, prevent, respond to and remediate cyber threats. In addition, CB Defense provides a suite of response and remediation tools, including Live Response, which allows security personnel to perform remote live investigations, intervene with ongoing attacks and instantly remediate endpoint threats. For peace of mind, CB Defense customers can also leverage CB ThreatSight, Carbon Black’s managed threat alert service, to validate alerts and uncover new threats.
Blackberry Protect is ranked 12th in Endpoint Protection (EPP) for Business with 18 reviews while Carbon Black CB Defense is ranked 5th in Endpoint Protection (EPP) for Business with 19 reviews. Blackberry Protect is rated 7.8, while Carbon Black CB Defense is rated 7.8. The top reviewer of Blackberry Protect writes "An outstanding product that is pretty spot on and easy to deploy and use". On the other hand, the top reviewer of Carbon Black CB Defense writes "Centralization via the cloud allows us to protect and control people working from home". Blackberry Protect is most compared with CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne, McAfee Endpoint Security and Kaspersky Endpoint Security, whereas Carbon Black CB Defense is most compared with CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint, Carbon Black CB Response and Secureworks Red Cloak Threat Detection and Response. See our Blackberry Protect vs. Carbon Black CB Defense report.
See our list of best Endpoint Protection (EPP) for Business vendors.
We monitor all Endpoint Protection (EPP) for Business reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.