


BlackBerry Cylance Cybersecurity and Cisco Secure Endpoint compete in the cybersecurity solutions category with advanced features for threat detection and endpoint protection. Based on feature offerings, Cisco Secure Endpoint appears to have an advantage due to its real-time prevention and strong integration with other Cisco products.
Features: BlackBerry Cylance Cybersecurity offers AI and machine learning-based threat detection with minimal system resource usage, strong zero-day threat protection, and centralized management via an online dashboard. Cisco Secure Endpoint features real-time threat prevention, excellent scalability, and integration with products like Talos Intelligence for enhanced threat intelligence, alongside advanced device and file trajectory visibility for improved forensic capabilities.
Room for Improvement: BlackBerry Cylance Cybersecurity needs to address false positives and improve its user interface. Additionally, comprehensive post-incident analytics and installation on industrial systems could be simplified. Cisco Secure Endpoint requires enhancements in CSO-level reporting, improved URL blocking, and a more user-friendly interface for non-technical users. Moreover, resolving agent update performance challenges and better third-party solution integration is needed.
Ease of Deployment and Customer Service: Both solutions offer deployment options across public, private, and hybrid cloud environments. BlackBerry Cylance Cybersecurity receives mixed reviews for technical support, with reports of slow response times, whereas Cisco Secure Endpoint is generally praised for reliable customer service and technical support.
Pricing and ROI: BlackBerry Cylance Cybersecurity is perceived as more expensive by some users, though many find its pricing justifiable considering its capabilities and ROI for endpoint protection. Cisco Secure Endpoint offers competitive pricing, especially when bundled with other Cisco products, and is seen as providing a good return on investment due to its comprehensive security and integration capabilities. Both solutions are viewed as offering significant value relative to their costs.
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 3.6% |
| BlackBerry Cylance Cybersecurity | 1.5% |
| Cisco Secure Endpoint | 1.3% |
| Other | 93.6% |



| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 21 |
| Large Enterprise | 48 |
| Company Size | Count |
|---|---|
| Small Business | 33 |
| Midsize Enterprise | 5 |
| Large Enterprise | 13 |
| Company Size | Count |
|---|---|
| Small Business | 21 |
| Midsize Enterprise | 14 |
| Large Enterprise | 21 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
BlackBerry Cylance Cybersecurity leverages AI and machine learning for efficient malware detection and zero-day threat protection, offering robust endpoint security with high detection accuracy and low false positive rates.
BlackBerry Cylance Cybersecurity delivers advanced threat protection with AI-driven algorithms and machine learning. Its lightweight design ensures low system resource usage, making it both efficient and effective. It's recognized for centralized management, easy deployment, and a clean interface, providing comprehensive endpoint protection against diverse threats. The integration of features like CylanceOPTICS and behavioral monitoring enhances security insights. While the system excels in malware detection, enhancements are needed in areas like user interface design, reporting, deeper threat analysis, and integration with third-party systems. Support and pricing improvements could also increase competitiveness.
What are the key features of BlackBerry Cylance Cybersecurity?Organizations deploy BlackBerry Cylance Cybersecurity for threat analytics, log management, and endpoint protection. As an antivirus replacement, it protects against zero-day malware, ransomware, and various threats. Its AI algorithms detect anomalies, minimizing risks in both internet-connected and isolated environments. Many businesses incorporate it into wider security strategies, appreciating its centralized management and proactive defense capabilities.
Cisco Secure Endpoint offers robust endpoint security with real-time threat prevention and cloud-based management. It is designed for seamless integration with Cisco products, delivering comprehensive protection and ease of use.
Cisco Secure Endpoint provides real-time threat detection, analytics, and rapid response capabilities. Its ease of use, integrated features like sandboxing and Device and File Trajectory, and its incorporation with Talos make it effective for threat hunting and endpoint protection. With strong machine learning and seamless integration with other tools, it addresses threat prevention and network visibility. However, there is room for improvement in AI features, SIEM API integration, user interface simplification, and cost reduction. Enhanced dashboards, reporting, and support are also areas for potential enhancement.
What are the primary features of Cisco Secure Endpoint?In industries such as finance, healthcare, and manufacturing, Cisco Secure Endpoint is vital for maintaining endpoint security and malware protection. Organizations use it within managed security services, integrating with tools like Umbrella for DNS security. It provides visibility into malware activities and supports threat hunting for devices beyond corporate networks. Deployed on workstations, servers, and laptops, it efficiently logs and blocks malicious actions, ensuring a secure environment.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.