Key features of Cylance Endpoint Security
Cylance Endpoint Security
Cylance Endpoint Securityoffers a broad set of security capabilities through several interconnected features:
Detect and block ransomware, malware, and other threats
CylancePROTECT Desktop blocks ransomware and other malware on
Linuxdevices using a mathematical approach to malware identification. It uses machine learning techniques instead of reactive signatures, trust-based systems, or sandboxes to provide endpoint detection and response that renders new ransomware, malware, viruses, bots, and future variants useless.
CylancePROTECT Desktopanalyzes potential file executions for ransomware and other malware in the OS and memory layers to prevent the delivery of malicious payloads.
Mobile device protection
CylancePROTECT Mobile provides mobile threat defense for
ChromeOS devices. In addition to malware identification,
CylancePROTECT Mobilealso detects sideloaded apps, malicious URLs in text messages, and other security risks, and recommends specific actions to eliminate the threat.
Attack detection and response
CylanceOPTICS monitors your
Linuxdevices and lets you know when your organization may be under attack.
CylanceOPTICScollects information from devices and aggregates it using cloud services to track, alert upon, and respond to malicious events as soon as they occur.
CylanceOPTICScan stop attacks before they execute and automate investigation and response to attacks.
Secure access to your network and your cloud-based services
CylanceGATEWAY provides Zero Trust Network Access (ZTNA) for your users'
macOSdevices to secure user access to your extended network perimeter and protect your extended network from threats.
CylanceGATEWAYprotects devices by allowing you to block connections to Internet destinations that you don’t want devices to reach, even when the device isn't connected to your network.
CylanceGATEWAYprotects your private network and cloud-based services by allowing access only to authorized users.
Sensitive data protection
CylanceAVERTidentifies and categorizes sensitive data on
Windowsdevices in your organization's environment to create a sensitive file inventory and notify specified users when sensitive data is involved in an exfiltration event.
CylanceAVERTcan scan files that are copied to a USB device, uploaded to a browser location or network drive, or in the body content or the attachments of email messages, and recommend a remediation action.
Work with any UEM or MDM platform
Cylance Endpoint Securitycan be used with BlackBerry UEM to provide the highest level of endpoint management and security to protect your organization against a wide array of threats.
If you have an Unified Endpoint Management (UEM) or Mobile Device Management (MDM) platform other than
BlackBerry UEM, you can use
Cylance Endpoint Securityto better protect your endpoints and the data travelling between them and your network. Over time, specific integrations with MDM solutions like
Microsoft Intunewill be added to
Cylance Endpoint Securityto enhance your ability to manage devices in response to potential threats.