Skip Navigation

What are the
Cylance Endpoint Security
agents?

The
Cylance Endpoint Security
agents run on desktop computers and are typically deployed by an administrator to be automatically installed on your device. The following table lists and describes the desktop agents and how you use them.
Agent
What it does
How to use it
CylancePROTECT Desktop
CylancePROTECT Desktop
detects and blocks malware before it can affect a device.
Your administrator deploys it to be automatically installed on your device or provides instructions to manually install it.
CylancePROTECT Desktop
runs in the background on your device after you log in.
CylanceOPTICS
CylanceOPTICS
is an endpoint detection and response solution that collects and analyzes forensic data from devices to identify and resolve threats before they impact your organization’s users and data.
Your administrator deploys it to be automatically installed on your device or provides instructions to manually install it.
CylanceOPTICS
runs in the background on your device after you log in.
CylanceGATEWAY
(desktop agent)
CylanceGATEWAY
provides secure access to your organization's on-premises and cloud-based resources, services, and applications without requiring a traditional VPN. It also protects devices by allowing your organization to block connections to unsafe and potentially malicious internet destinations.
Your administrator deploys it to be automatically installed on your device or provides instructions to manually install it.
You must activate
CylanceGATEWAY
using your directory credentials or
BlackBerry Online Account
credentials. After you activate the
CylanceGATEWAY
agent, one of the following can apply:
  • You can enable Work Mode from the agent.
  • If your administrator has configured the agent to automatically start and enable Work Mode when the agent starts, no additional action is required.
CylanceAVERT
CylanceAVERT
identifies and categorizes sensitive files that were found in your organization's environment. If these sensitive files are involved in an attempt to exfiltrate the data through various sources (USB or network drive, email messages, or browser uploads),
CylanceAVERT
can take a remediation action that was specified by your administrator to protect your data.
Your administrator deploys it to be automatically installed on your device or provides instructions to manually install it.
CylanceAVERT
runs in the background on your device after you log in.