What is CylancePROTECT?
Cylance® is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Our technology is deployed on over four million endpoints and protects hundreds of enterprise clients worldwide including Fortune 100 organizations and government institutions.
CylancePROTECT Buyer's Guide
Download the CylancePROTECT Buyer's Guide including reviews and more. Updated: February 2021
Panasonic, Noble Energy, Apria Healthcare Group Inc., Charles River Laboratories, Rovi Corporation, Toyota, Kiewit
What users are saying about CylancePROTECT pricing:
- "The monthly fee is $55 USD per user."
- "The product cost is about $5, per user, per month."
- Highest Rating
- Lowest Rating
- Review Length
Showingreviews based on the current filters.
OT Cyber Security Principal Consultant at Jacobs Engineering Group Inc.
Dec 2, 2020
An outstanding product that is pretty spot on and easy to deploy and use
What is our primary use case?I direct our design and engineering teams, and we craft solutions for on-premises or autonomous networks in the industrial industry, such as oil and gas, water, and manufacturing. We use this solution as a layered defense for the defense strategy for our on-premises clients. An attractive thing about this solution is that it uses AI official algorithms to not only discover known stuff but also to discover anomalous behavior and things that are out of the ordinary. It is not just signature-based; it is an algorithm or AI and machine learning.
Pros and Cons
- "The non-daily requirement to update signatures is the most valuable feature. From a functional point of view, it is pretty spot on. For instance, we compared an algorithm from five years ago to today's algorithm, and it was 98% accurate. It has the ability to detect and mitigate. In the industrial environment that we work in, there's what we call OT versus IT. You are IT Central, but this is OT. Generally, we don't have the same level of skillset as IT individuals or IT professionals have. This particular product doesn't require you to be a computer scientist to be able to understand its proprietary algorithm and to be able to deploy, use, and work within it. It integrates well with a robust SIEM or SOAR solution, and it plays nice with others. We use other detection solutions like CyberX or site provision with Cisco, and it plays nice. That's one of the things we really liked about it."
- "It could have integration with industrial base HMIS or Human Machine Interfaces Solutions. This is the industrial environment where you have a control center for all the automation that's happening, whether it is oil, gas, or chemical manufacturing. They often have to set up a computer at the back and watch the other stuff to get alerts. In these autonomous or on-premises environments, they often don't have access to email readily. Integration with other industrial solutions, such as HMIS, will allow them to communicate and get an alert that something has been found. This way, they can react to it sooner than having somebody watch the screen and keep checking the screen. Rockwell has its own suite. Similarly, Honeywell has its own suite. There's also an independent HMI/historian solution provider out there called VTSCADA. We actually get asked if we can get it to show up on a screen, which is difficult. Getting those alerts to work within an industrial environment would be a huge plus."
What other advice do I have?They like to see licensing at a higher level. That's not the norm for on-premises economist environments in the industrial industry. If you're an integrator versus an end user, they like to look at the quantity. Even though they like to start at quantities less than a thousand, it is cumulative. I've got a thousand clients at a hundred, so now I've got a 100,000. Therefore, don't let the scalability, where they like to play in tens of thousands, dissuade you from incorporating this product. It is quite different from the standard signature-based approach to endpoint protection. At first…
Information Technology Security Manager at a energy/utilities company with 501-1,000 employees
Dec 14, 2020
Scalable product, needs work on false positives detection and application integration
What is our primary use case?We put the product on all of our desktops and servers.
Pros and Cons
- "The most functional item that we use is the process to turn off the false flags that it causes."
- "They could improve on the false positives, reporting and whitelisting features."
What other advice do I have?Beware and work out a process to restore items that were deleted by false flags. Work out a process to investigate any odd behaviour or troubleshooting tickets with open source software being even a small sub-component. For the majority of installs, the Cylance is going to break because of the small sub-component that's open-source that is out of date. Always no matter what problem is happening, double-check to see if there were any flags in Cylance because it's probably going to be Cylance blocking something along the line. It will drive you nuts to work with your third-party technical…
Learn what your peers think about CylancePROTECT. Get advice and tips from experienced pros sharing their opinions. Updated: February 2021.
464,594 professionals have used our research since 2012.
Proactive AI-based security that scales as we need it
What is our primary use case?We are a solution provider and this is one of the security products that we implement for our customers. My biggest customers are two pharmacies and a bank and this makes up part of their security solution.
Pros and Cons
- "Two or three years ago when the WannaCry virus struck, the people that were on Cylance were the ones that weren't affected."
- "I would like to see them fix the alerting system so that the endpoint reporting is a bit more streamlined."
What other advice do I have?I don't think too much about the features when it comes to an antivirus solution, such as this. When you try to combine too much into one product, you end up affecting the product as a whole. If you're a home user then it's great because you only pay once a year and it does everything including the antivirus, firewall, VPN, internet security, and more. However, when you're in an SMB or an SME installation, all of those things are decentralized. My advice for anybody who is considering this solution is to switch if you have the money put aside. I would suggest using Professional Services to…
Vice President Operations at a construction company with 11-50 employees
Oct 6, 2020
Easy to manage and deploy with a single-pane-of-glass to manage threats and updates
What is our primary use case?CylancePROTECT came packaged with our HR and IT management system, which was a selling point. It allows us to ensure that every single computer is always up to date as far as vulnerability protection and we can manage all the threats and everything from a centralized dashboard.
Pros and Cons
- "You can manage all the threats and everything from a centralized dashboard."
- "It provides good insight into the programs, applications, or websites that may need attention."
- "It is extremely simple to manage and deploy."
- "The product does not do a lot of reporting on what it is taking care of. Enhanced reporting would be a welcome improvement."
What other advice do I have?CylancePROTECT is going to tell you if there are any issues and you are going to be able to see everything from one single dashboard. If there are any issues on any computers across your whole architecture you will know about it. If there were advice that I would give to someone thinking about working with CylancePROTECT, I would just say it is extremely — extremely — simple to manage and deploy. On a scale of one to ten (where one is the worst and ten is the best), I would rate CylancePROTECT as a ten-out-of-ten as per our experience with it thus far.
Head of Cloud Services and Projects at Grove Group
Real UserTop 10
Dec 17, 2019
Solution has picked up files that other platforms don't plus it uses machine learning and AI protection
What is our primary use case?We did a POC with Cylance, Bitdefender and ESAT. Cylance picked up Zero-Day Malware that the other two solutions did not quarantine.
Pros and Cons
- "The solution is extremely scalable. It's got the hybrid functionality, it's got the system functionality and cloud functionality as well."
- "I would say one thing that they might need to bring in is protection for mobile devices."
What other advice do I have?You can obviously get in touch with a partner (Grove Group) like us, and we can arrange a POC for your business. While we're dealing with the POC, it will showcase the product and how valuable the product is for your business. Plus, it will actually show what defective files it's picking up in real-time. You can do a side by side comparison while you're running Cylance with your existing endpoint protection to see the difference in protection. You can see exactly what Cylance does pick up on both the endpoint device and the admin console. I also love the fact that the en-point software is not…
Head of Systems at SKN Caribecafe Ltda
Real UserTop 20
Dec 13, 2020
Easy to adjust protection levels, very stable, and scalable
What is our primary use case?We primarily use the solution to protect us against ransomware.
Pros and Cons
- "The solution is very quick at easily changing the levels of protection for each computer and the server."
- "The company that sells us the licenses sometimes doesn't know how to do certain things."
What other advice do I have?I don't know exactly which version we're using. A person in charge of that in our office was the person who looked for the product. I just read some things about it and I found that it was a very good product. We have been trained to learn how to use the product and now we have a very good experience with it. The problem is, for me, sometimes it creeps into the computers and into the servers that we want to get running. Sometimes it has problems. That said, it's a very good product. We are okay with how it works. I would recommend Cylance. I think it's very good and very stable. The only thing…
Co-Founder, CEO at a tech services company with 11-50 employees
Sep 25, 2019
Nice management display, easy to install, and works satisfactorily for standard protection
What is our primary use case?We are part of a startup company that is operating in the same domain as this solution, so we tested it as part of the competition.
Pros and Cons
- "On the management side, we liked the way it displays things."
- "It should provide more details about the events that they have detected."
What other advice do I have?The lack of details for the user is partly because of the way they detect. it is done passively, rather than dynamically, so they don't have a lot of information about the things that they already caught. The suitability of this solution for any particular person will depend on their expectations. I would not rate this solution in the top five for things like presenting information, or ease of use. For standard protection they are ok, but if you have advanced demands, or a SOC, then I don't think that Cylance can compete with Carbon Black, CrowdStrike, or SentinelOne. I would rate this…
Security Domain Architect at a tech services company with 5,001-10,000 employees
Jun 18, 2020
Great protection against unauthorized applications but user interface is somewhat outdated
What is our primary use case?Our primary use case for the solution is for endpoint security. It protects your computer or any other device from any malware, APT or spyware. We are customers and I'm the security domain architect of the company.
Pros and Cons
- "It secures different entry points into the network."
- "The user interface is outdated."
What other advice do I have?I would advise anyone thinking about implementing the solution to go through a testing phase and see how the solution interacts with the users and cost out the employee population of the company. I've had this experience in another company and sometimes when you roll out a new product it can really change the way users work, sometimes negatively, and it can impact the business. I would rate this solution a seven out of 10.
See 8 more CylancePROTECT Reviews
Product CategoriesEndpoint Protection (EPP) for Business
Download our free CylancePROTECT Report and get advice and tips from experienced pros sharing their opinions.
- What is the biggest difference between EPP and EDR products?
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- When evaluating Endpoint Security, what aspect do you think is the most important to look for?
- Which ransomware is the biggest threat in 2020?
- How was the 2020 Twitter Hack carried out? How could it have been prevented?
- What is the best for ransomware infection?
- Compromise Assessment vs Threat Hunting
- What security measures should businesses prioritize to support secure remote work?
- Why is endpoint security important?