

BlackBerry Cylance Cybersecurity and Cisco Secure Endpoint compete in the AI-driven cybersecurity category. Cisco Secure Endpoint seems to have an upper hand due to its extensive system integration and consistently praised customer service, while BlackBerry offers its strengths in AI-driven malware protection.
Features: BlackBerry Cylance Cybersecurity is known for its AI-driven malware protection that operates with minimal system impact. It excels in machine learning capabilities and offers robust zero-day threat protection. Its lightweight nature ensures preemptive threat mitigation without constant updates. Cisco Secure Endpoint is noted for extensive integration within the Cisco ecosystem, real-time threat prevention using sandboxing, and file trajectory. It also provides advanced analytics through retrospective security features, supporting proactive threat management with comprehensive security coverage.
Room for Improvement: BlackBerry Cylance Cybersecurity could enhance its threat analysis and reduce false positives by improving AI models. More intuitive dashboards, better reporting, and improved integration with industrial solutions are also desired. Cisco Secure Endpoint could refine its interface and analytics, improve third-party integration, and enhance technical support responsiveness. Simplifying the deployment process is another area where users see room for improvement.
Ease of Deployment and Customer Service: Both products support diverse deployment environments, including on-premises, public cloud, hybrid cloud, and private cloud. BlackBerry Cylance Cybersecurity is noted for straightforward deployment, though customer service reviews are mixed, with some reports of slow response times. Cisco Secure Endpoint enjoys more consistently positive customer service feedback, although some challenges in deployment and technical support responsiveness have been noted. Both cater to varied deployment needs, but Cisco holds an edge in user interaction.
Pricing and ROI: BlackBerry Cylance Cybersecurity is seen as slightly more expensive but offers ROI through robust protection and reduced labor costs. Some find its cost comparable to competitors, while others seek more competitive pricing. Cisco Secure Endpoint is recognized for effective pricing within enterprise agreements, making it economical for larger deployments. Both solutions offer potential ROI through labor savings and improved security, with perceived value varying by organizational context.
| Product | Market Share (%) |
|---|---|
| BlackBerry Cylance Cybersecurity | 1.2% |
| Cisco Secure Endpoint | 1.3% |
| Other | 97.5% |


| Company Size | Count |
|---|---|
| Small Business | 33 |
| Midsize Enterprise | 5 |
| Large Enterprise | 13 |
| Company Size | Count |
|---|---|
| Small Business | 21 |
| Midsize Enterprise | 14 |
| Large Enterprise | 21 |
BlackBerry Cylance Cybersecurity leverages AI and machine learning for efficient malware detection and zero-day threat protection, offering robust endpoint security with high detection accuracy and low false positive rates.
BlackBerry Cylance Cybersecurity delivers advanced threat protection with AI-driven algorithms and machine learning. Its lightweight design ensures low system resource usage, making it both efficient and effective. It's recognized for centralized management, easy deployment, and a clean interface, providing comprehensive endpoint protection against diverse threats. The integration of features like CylanceOPTICS and behavioral monitoring enhances security insights. While the system excels in malware detection, enhancements are needed in areas like user interface design, reporting, deeper threat analysis, and integration with third-party systems. Support and pricing improvements could also increase competitiveness.
What are the key features of BlackBerry Cylance Cybersecurity?Organizations deploy BlackBerry Cylance Cybersecurity for threat analytics, log management, and endpoint protection. As an antivirus replacement, it protects against zero-day malware, ransomware, and various threats. Its AI algorithms detect anomalies, minimizing risks in both internet-connected and isolated environments. Many businesses incorporate it into wider security strategies, appreciating its centralized management and proactive defense capabilities.
Cisco Secure Endpoint is a comprehensive endpoint security solution that natively includes open and extensible extended detection and response (XDR) and advanced endpoint detection and response (EDR) capabilities. Secure Endpoint offers relentless breach protection that enables you to be confident, be bold, and be fearless with one of the industry’s most trusted endpoint security solutions. It protects your hybrid workforce, helps you stay resilient, and secures what’s next with simple, comprehensive endpoint security powered by unique insights from 300,000 security customers and deep visibility from the networking leader.
Cisco Secure Endpoint was formerly known as Cisco AMP for Endpoints.
Reviews from Real Users
Cisco Secure Endpoint stands out among its competitors for a number of reasons. Two major ones are its ability to enable developers to easily secure their endpoints with one single operation using its management console and its advanced alerting techniques.
Tim C., an IT manager at Van Der Meer Consulting, writes, "The solution makes it possible to see a threat once and block it everywhere across all endpoints and the entire security platform. It has the ability to block right down to the file and application level across all devices based on policies, such as, blacklisting and whitelisting of software and applications. This is good. Its strength is the ability to identify threats very quickly, then lock them and the network down and block the threats across the organization and all devices, which is what you want. You don't want to be spending time working out how to block something. You want to block something very quickly, letting that flow through to all the devices and avoiding the same scenario on different operating systems."
Wouter H., a technical team lead network & security at Missing Piece BV, notes, "Any alert that we get is an actionable alert. Immediately, there is information that we can just click through, see the point in time, what happened, what caused it, and what automatic actions were taken. We can then choose to take any manual actions, if we want, or start our investigation. We're no longer looking at digging into information or wading through hundreds of incidents. There's a list which says where the status is assigned, e.g., under investigation or investigation finished. That is all in the console. It has taken away a lot of the administration, which we would normally be doing, and integrated it into the console for us."
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.