CylancePROTECT

(24)
4.4 out of 5 stars

CylancePROTECT redefines what antivirus can and should do for your organization by leveraging artificial intelligence to detect AND prevent malware from executing on your endpoints in real time.

Work for CylancePROTECT?

Learning about CylancePROTECT?

We can help you find the solution that fits you best.

CylancePROTECT Features

Orchestration
Asset Management

Lets users group and organize their endpoints to gather threat intelligence on specific technologies.

85%
(Based on 7 reviews)
Security Workflow Automation

Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information.

88%
(Based on 9 reviews)
Deployment

The process in which users integrate their existing security systems and endpoints to the threat intelligence platform.

93%
(Based on 10 reviews)
Sandboxing

A feature that allows security testing and information gathering to occur in a secure, resource independent environment.

81%
(Based on 7 reviews)
System Control
Asset Management

Keeps records of each network asset and its activity. Discovers new assets accessing the network.

82%
(Based on 10 reviews)
System Isolation

Cuts off network connection or temporarily inactivate applications until incidents are remedied.

82%
(Based on 9 reviews)
Device Control

Manages user network accessibility on laptops and mobile devices.

81%
(Based on 11 reviews)
Web Control

Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network.

85%
(Based on 10 reviews)
Application Control

Blocks endpoint users from accessing restricted applications.

85%
(Based on 11 reviews)
Information
Proactive Alerts

Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered.

91%
(Based on 12 reviews)
Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

96%
(Based on 12 reviews)
Intelligence Reports

The ability for users to produce reports outlining detailed and personalized threat information

99%
(Based on 12 reviews)
Vulnerability Prevention
Endpoint Intelligence

Analysis for users to examine threat intelligence data specific to their endpoint devices.

95%
(Based on 14 reviews)
Firewall

Protects endpoint devices from a variety of attacks and malware threats.

92%
(Based on 11 reviews)
Malware Detection

Provides multiple techniques and information sources to alert users of malware occurrences.

97%
(Based on 14 reviews)
Personalization
Endpoint Intelligence

Analysis for users to examine threat intelligence data specific to their endpoint devices.

97%
(Based on 13 reviews)
Security Validation

The product has a recurring examination process to update your intelligence reports as new threats emerge.

94%
(Based on 12 reviews)
Dynamic/Code Analysis

The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities.

88%
(Based on 11 reviews)
Security Management
Incident Reports

Produces reports detailing trends and vulnerabilities related to their network and infrastructure.

94%
(Based on 12 reviews)
Security Validation

The product has a recurring examination process to update your intelligence reports as new threats emerge.

92%
(Based on 13 reviews)
Compliance

Monitors assets and enforces security policies to audit assets and infrastructure security.

94%
(Based on 12 reviews)