

BlackBerry Cylance Cybersecurity and Cisco Secure Endpoint compete in the cybersecurity solutions category with advanced features for threat detection and endpoint protection. Based on feature offerings, Cisco Secure Endpoint appears to have an advantage due to its real-time prevention and strong integration with other Cisco products.
Features: BlackBerry Cylance Cybersecurity offers AI and machine learning-based threat detection with minimal system resource usage, strong zero-day threat protection, and centralized management via an online dashboard. Cisco Secure Endpoint features real-time threat prevention, excellent scalability, and integration with products like Talos Intelligence for enhanced threat intelligence, alongside advanced device and file trajectory visibility for improved forensic capabilities.
Room for Improvement: BlackBerry Cylance Cybersecurity needs to address false positives and improve its user interface. Additionally, comprehensive post-incident analytics and installation on industrial systems could be simplified. Cisco Secure Endpoint requires enhancements in CSO-level reporting, improved URL blocking, and a more user-friendly interface for non-technical users. Moreover, resolving agent update performance challenges and better third-party solution integration is needed.
Ease of Deployment and Customer Service: Both solutions offer deployment options across public, private, and hybrid cloud environments. BlackBerry Cylance Cybersecurity receives mixed reviews for technical support, with reports of slow response times, whereas Cisco Secure Endpoint is generally praised for reliable customer service and technical support.
Pricing and ROI: BlackBerry Cylance Cybersecurity is perceived as more expensive by some users, though many find its pricing justifiable considering its capabilities and ROI for endpoint protection. Cisco Secure Endpoint offers competitive pricing, especially when bundled with other Cisco products, and is seen as providing a good return on investment due to its comprehensive security and integration capabilities. Both solutions are viewed as offering significant value relative to their costs.
| Product | Market Share (%) |
|---|---|
| BlackBerry Cylance Cybersecurity | 1.3% |
| Cisco Secure Endpoint | 1.3% |
| Other | 97.4% |


| Company Size | Count |
|---|---|
| Small Business | 33 |
| Midsize Enterprise | 5 |
| Large Enterprise | 13 |
| Company Size | Count |
|---|---|
| Small Business | 21 |
| Midsize Enterprise | 14 |
| Large Enterprise | 21 |
BlackBerry Cylance Cybersecurity leverages AI and machine learning for efficient malware detection and zero-day threat protection, offering robust endpoint security with high detection accuracy and low false positive rates.
BlackBerry Cylance Cybersecurity delivers advanced threat protection with AI-driven algorithms and machine learning. Its lightweight design ensures low system resource usage, making it both efficient and effective. It's recognized for centralized management, easy deployment, and a clean interface, providing comprehensive endpoint protection against diverse threats. The integration of features like CylanceOPTICS and behavioral monitoring enhances security insights. While the system excels in malware detection, enhancements are needed in areas like user interface design, reporting, deeper threat analysis, and integration with third-party systems. Support and pricing improvements could also increase competitiveness.
What are the key features of BlackBerry Cylance Cybersecurity?Organizations deploy BlackBerry Cylance Cybersecurity for threat analytics, log management, and endpoint protection. As an antivirus replacement, it protects against zero-day malware, ransomware, and various threats. Its AI algorithms detect anomalies, minimizing risks in both internet-connected and isolated environments. Many businesses incorporate it into wider security strategies, appreciating its centralized management and proactive defense capabilities.
Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader.
Cisco Secure Endpoint was formerly known as Cisco AMP for Endpoints.
Reviews from Real Users
Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.
Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.