Skip Navigation

Key features of
Cylance Endpoint Security

Device Protection (
CylancePROTECT Desktop
  • View the count of threats that are currently running on devices, threats that are set to run automatically, quarantined threats, and threats that have been uniquely identified by
    CylancePROTECT Desktop
  • Threat protection shows the percentage of threats on which you have taken action (for example, quarantine, waive, or added to the safe list).
  • Device protection shows the percentage of devices with both unsafe and abnormal files configured for auto-quarantine in device policies. If auto-quarantine is disabled for one or both file types, the device is considered unprotected when calculating the percentage.
  • The threat events graph tracks threats detected over the last 30 days, classified by unsafe, abnormal, quarantined, waived, and cleared.
  • Threats by priority shows the total number of threats, grouped by priority, that have not yet been acted on and require attention.
  • Threat classifications shows a heat map of the types of threats detected.
  • The top ten lists show the top ten threats found on the most devices, the top ten devices with the most threats, and the top ten zones with the most threats.
Mobile Protection (
CylancePROTECT Mobile
  • View the count of devices enabled for threat protection, devices with alerts, and mobile alerts detected and unresolved.
  • View charts and graphs of mobile alerts by category.
  • View a graph of mobile operating systems with vulnerabilities, as identified, defined, and tracked by the National Vulnerability Database.
  • View charts and graphs of mobile app alerts, mobile network alerts, and mobile device security alerts.
  • View lists of the top malicious apps, sideloaded apps, insecure
    networks, unsafe networks, mobile alert detections, unsupported security patches, unsupported device models, unsupported operating systems, and the top devices with mobile alerts.
Network (
  • View the count of active users.
  • View a chart of allowed and blocked network connections.
  • View a chart of transferred bytes (uploaded and downloaded).
  • View graphs of private and public network access.
  • View lists of the top private and public network destinations and top actions.
  • View a graph of online and offline
  • View a graph of identity risk alerts.
  • View a graph of allowed, blocked, and combination of allowed and blocked destinations for the specified destination risk level.
  • View a list of top bandwidth consumers in public, private, and combined public and private paths.