Key features of CylancePROTECT Desktop
Detect and quarantine malicious files
CylancePROTECT Desktopprovides options for handling files that it detects as either unsafe or abnormal. You can add files identified in threat events to a quarantine list or a safe list for handling future events.
Protect against memory exploits
CylancePROTECT Desktopprovides options for handling memory exploits, including process injections and escalations. You can also add executable files to an exclusion list, allowing these files to run when a device policy is applied.
Block malicious scripts
CylancePROTECT Desktopmonitors and protects against malicious scripts running in your environment. The
CylancePROTECT Desktopagent is able to detect the script and script path before the script is executed and block it.
Block threats from USB storage devices
CylancePROTECT Desktopcontrols how USB mass storage devices can connect to devices in your organization. You can allow or block USB mass storage devices, including USB flash drives, external hard drives, and smartphones.
Receive immediate alerts
CylancePROTECT Desktopmonitors the execution of malicious processes and alerts you when anything unsafe or abnormal attempts to run.
Detect inactive devices
CylancePROTECT Desktopagent has been out of contact for a specified period of time, the device state changes to inactive. You can review inactive devices to determine if they should be removed from the management console.
Protect virtual machines
CylancePROTECT Desktopis not as resource intensive on a per-guest basis because the technology does not require daily disk scans.
CylancePROTECT Desktopis also not as memory intensive on a per-guest basis.