Skip Navigation

Key features of
Cylance Endpoint Security

Device Protection (
CylancePROTECT Desktop
  • Running Threats: View the count of threats that are currently running on devices.
  • Auto-Run Threats: View the count of threats that are set to run automatically.
  • Quarantined Threats: View the count of quarantined threats.
  • Unique to Cylance: View the count of threats that have been uniquely identified by
    CylancePROTECT Desktop
  • Total Files Analyzed: View a count of the total number of files analyzed by
    CylancePROTECT Desktop
  • Threat Events: View the threats detected over the last 30 days, classified by unsafe, abnormal, quarantined, waived, and cleared.
  • Threat Protection: View the percentage of threats on which you have taken action (for example, quarantine, waive, or added to the safe list).
  • Device Protection: View the percentage of devices with both unsafe and abnormal files configured for auto-quarantine in device policies. If auto-quarantine is disabled for one or both file types, the device is considered unprotected when calculating the percentage.
  • Threats By Priority: View the total number of threats, grouped by priority, that have not yet been acted on and require attention.
  • Threat Classifications: View a heat map of the types of threats detected.
  • Top Ten Lists: View the top ten threats found on the most devices, the top ten devices with the most threats, and the top ten zones with the most threats.
Mobile Protection (
CylancePROTECT Mobile
  • Mobile Alerts Detected: View the count of mobile alerts that are detected and the count of mobile alerts that are unresolved.
  • Mobile Devices with Alerts: View the count of mobile devices with alerts detected by the
    CylancePROTECT Mobile
  • Mobile Devices Enabled for Alerts Detection: View the count of mobile devices with the
    CylancePROTECT Mobile
    app installed and activated.
  • Mobile Alerts by Category: View charts and graphs of mobile alerts by category.
  • Mobile OSs with Vulnerabilities: View a graph of mobile operating systems with vulnerabilities, as identified, defined, and tracked by the National Vulnerability Database.
  • Mobile App Alerts: View statistics for detected malicious and sideloaded apps.
  • Mobile Network Alerts: View statistics for unsafe network and insecure
  • Mobile Device Security Alerts: View statistics for device security detections (screen lock disabled, attestation failure, and so on).
  • View lists and statistics for the top threats in the following categories:
    • Top Devices with Mobile Alerts
    • Top Insecure
    • Top Malicious Apps
    • Top Mobile Alert Detections
    • Top Sideloaded Apps
    • Top Unsafe Message URLs
    • Top Unsafe Networks
    • Top Unsupported Device Models
    • Top Unsupported OSs
    • Top Unsupported Security Patches
Network (
  • Total Active Gateway Users: View the count of active users.
  • Network Connections: View a chart of allowed and blocked network connections.
  • Transferred Bytes: View a chart of transferred bytes (uploaded and downloaded).
  • Private Network Access, Public Network Access: View graphs of private and public network access.
  • Private Top Network Destinations, Public Top Network Destinations: View lists of the top private and public network destinations and top actions.
  • Connector Connection History: View a graph of online and offline
    CylanceGATEWAY Connectors
  • Connector Status: View the connection status of the
    CylanceGATEWAY Connectors
    in your environment.
  • Destination Reputation Risk: View a list of low, medium, and high destination risk alerts.
  • Security Risk Categories: View the allowed, blocked, and combination of allowed and blocked risk categories for a specified category.
  • TLS Versions: View a chart of TLS versions in your environment.
  • Top Blocked Categories: View a graph of allowed, blocked, and combination of allowed and blocked destinations for the specified destination risk level.
  • Top Bandwidth Consumers: View a list of top bandwidth consumers in public, private, and combined public and private paths.
Information protection (
  • Information Exfiltration Events: View the count of
    exfiltration events, grouped by exfiltration type. This widget can be filtered by a custom time.
  • Top 10 Exfiltration Events by Category: View the count of the top 10 exfiltration events by category (policies, users, devices, files, and data types). This widget can be filtered by a custom time.
  • Top 10 File Inventory Items by Category: View the count of the top 10 inventory items by category (policies, file extensions, info types, and data types).
  • Top 10 Exfiltration Events by Location:  View the count of the top 10 exfiltration events by location (web domains, email domains, and removable media). This widget can be filtered by a custom time.
  • File Inventory: View the count of sensitive files in the file inventory.
  • Evidence Locker: View the count of sensitive files in the evidence locker.
  • Total Active
    Users: View the count of total connected
  • Total Active
    Devices: View the count of total connected