CylancePROTECT

(23)
4.3 out of 5 stars

CylancePROTECT redefines what antivirus can and should do for your organization by leveraging artificial intelligence to detect AND prevent malware from executing on your endpoints in real time.

Work for CylancePROTECT?

Learning about CylancePROTECT?

We can help you find the solution that fits you best.

CylancePROTECT Features

Orchestration
Asset Management

Lets users group and organize their endpoints to gather threat intelligence on specific technologies.

85%
(Based on 7 reviews)
Security Workflow Automation

Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information.

88%
(Based on 9 reviews)
Deployment

The process in which users integrate their existing security systems and endpoints to the threat intelligence platform.

92%
(Based on 9 reviews)
Sandboxing

A feature that allows security testing and information gathering to occur in a secure, resource independent environment.

81%
(Based on 7 reviews)
System Control
Asset Management

Keeps records of each network asset and its activity. Discovers new assets accessing the network.

80%
(Based on 9 reviews)
System Isolation

Cuts off network connection or temporarily inactivate applications until incidents are remedied.

79%
(Based on 8 reviews)
Device Control

Manages user network accessibility on laptops and mobile devices.

79%
(Based on 10 reviews)
Web Control

Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network.

83%
(Based on 9 reviews)
Application Control

Blocks endpoint users from accessing restricted applications.

84%
(Based on 10 reviews)
Information
Proactive Alerts

Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered.

90%
(Based on 11 reviews)
Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

96%
(Based on 11 reviews)
Intelligence Reports

The ability for users to produce reports outlining detailed and personalized threat information

99%
(Based on 11 reviews)
Vulnerability Prevention
Endpoint Intelligence

Analysis for users to examine threat intelligence data specific to their endpoint devices.

94%
(Based on 13 reviews)
Firewall

Protects endpoint devices from a variety of attacks and malware threats.

92%
(Based on 11 reviews)
Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

97%
(Based on 13 reviews)
Personalization
Endpoint Intelligence

Analysis for users to examine threat intelligence data specific to their endpoint devices.

96%
(Based on 12 reviews)
Security Validation

The product has a recurring examination process to update your intelligence reports as new threats emerge.

93%
(Based on 11 reviews)
Dynamic/Code Analysis

The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities.

86%
(Based on 10 reviews)
Security Management
Incident Reports

Produces reports detailing trends and vulnerabilities related to their network and infrastructure.

93%
(Based on 11 reviews)
Security Validation

The product has a recurring examination process to update your intelligence reports as new threats emerge.

91%
(Based on 12 reviews)
Compliance

Monitors assets and enforces security policies to audit assets and infrastructure security.

93%
(Based on 11 reviews)