Try our new research platform with insights from 80,000+ expert users

BlackBerry Cylance Cybersecurity vs CyberArk Endpoint Privilege Manager comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

BlackBerry Cylance Cybersec...
Average Rating
8.0
Reviews Sentiment
4.6
Number of Reviews
44
Ranking in other categories
Endpoint Protection Platform (EPP) (20th)
CyberArk Endpoint Privilege...
Average Rating
8.2
Reviews Sentiment
6.8
Number of Reviews
36
Ranking in other categories
Endpoint Compliance (4th), Privileged Access Management (PAM) (4th), Anti-Malware Tools (4th), Application Control (5th), Ransomware Protection (6th)
 

Mindshare comparison

While both are Endpoint Security solutions, they serve different purposes. BlackBerry Cylance Cybersecurity is designed for Endpoint Protection Platform (EPP) and holds a mindshare of 1.1%, down 1.4% compared to last year.
CyberArk Endpoint Privilege Manager, on the other hand, focuses on Privileged Access Management (PAM), holds 3.6% mindshare, down 3.7% since last year.
Endpoint Protection Platform (EPP)
Privileged Access Management (PAM)
 

Featured Reviews

Sooraj Makkancherrry - PeerSpot reviewer
Doesn't have daily updates, which is important for healthcare IT
I face challenges with the exclusion policy - it still scans folders we told it not to, causing issues. When we contact support, they tell us to update the latest agent, but we can't do that immediately due to medical device protocols and validation testing. I wish support would try to understand our issues better instead of giving this standard response. The machine learning feature they use often tells us to upgrade the agent or add things to the exclusion list, which isn't unacceptable. It's a very good and new technology as a tool and antivirus. But sometimes, it doesn't work properly with our medical devices and products, quarantining files it shouldn't even after we add them to exclusions. This is tricky for us.
Sumit Chavan - PeerSpot reviewer
Helps secure the infrastructure and control users with admin rights
There are many features that are currently missing. A customization option is required for certain policies. For instance, if we need to stop PowerShell scripting, we have to create a different policy for that. Being able to create a sub-level policy within a top-level policy would be good. Currently, no user-based policy option is available inside the EPM console. We can only create computer-based policies. The database is available, but there is a drawback in not being able to create local groups on the EPM console. We only have to depend on Active Directory. This limits infrastructure security as we depend on the Active Directory team to manage user groups. If they remove any users, we lose control. If we could create groups locally and block them or set specific policies, we would have more control. Local endpoint management is missing from the EPM site. Moreover, there is an issue with policies not running as expected when we make enhancements. We have to find multiple ways to whitelist applications or enhance policies.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Even if an endpoint loses connection to the Internet, I know that endpoint is protected against 99.99% of the threats in the wild today."
"Specifically for a Windows domain environment, the product can be customized and pushed via GPO or SCCM without issue.​"
"The CylancePROTECT agent is very low on CPU usage, so it has virtually no adverse impact on my servers, desktops, or workstations."
"It secures different entry points into the network."
"You can manage all the threats and everything from a centralized dashboard."
"The non-daily requirement to update signatures is the most valuable feature. From a functional point of view, it is pretty spot on. For instance, we compared an algorithm from five years ago to today's algorithm, and it was 98% accurate. It has the ability to detect and mitigate. In the industrial environment that we work in, there's what we call OT versus IT. You are IT Central, but this is OT. Generally, we don't have the same level of skillset as IT individuals or IT professionals have. This particular product doesn't require you to be a computer scientist to be able to understand its proprietary algorithm and to be able to deploy, use, and work within it. It integrates well with a robust SIEM or SOAR solution, and it plays nice with others. We use other detection solutions like CyberX or site provision with Cisco, and it plays nice. That's one of the things we really liked about it."
"The Application Guard and ByteGuard are useful features."
"Endpoints are protected in real-time without the need of a centralized server."
"This is the number one product for privilege account security."
"CyberArk Endpoint Privilege Manager is very easy to manage, which I like. The solution also has a dashboard where you can see which software is suspicious, which I find valuable."
"The most valuable features of CyberArk Endpoint Privilege Manager are password management, session management, onboarding rules, platform customization, and safety management."
"I am impressed with the product's seamless integration. The PAM wallet and enterprise password wallet are good also good."
"The most valuable feature is that it does lifecycle management and that it will change to whatever the end target is."
"The department management aspect of the solution is the most valuable aspect."
"We can do both server and endpoint protection."
"The solution is scalable."
 

Cons

"The stability could be improved."
"Additionally, their channel management has been lacking, with a notable disregard for small and medium-sized businesses, focusing primarily on large enterprises and very large MSPs."
"It could have integration with industrial base HMIS or Human Machine Interfaces Solutions. This is the industrial environment where you have a control center for all the automation that's happening, whether it is oil, gas, or chemical manufacturing. They often have to set up a computer at the back and watch the other stuff to get alerts. In these autonomous or on-premises environments, they often don't have access to email readily. Integration with other industrial solutions, such as HMIS, will allow them to communicate and get an alert that something has been found. This way, they can react to it sooner than having somebody watch the screen and keep checking the screen. Rockwell has its own suite. Similarly, Honeywell has its own suite. There's also an independent HMI/historian solution provider out there called VTSCADA. We actually get asked if we can get it to show up on a screen, which is difficult. Getting those alerts to work within an industrial environment would be a huge plus."
"I would like to see them fix the alerting system so that the endpoint reporting is a bit more streamlined."
"It was not effective. There were a lot of false positives, even when we use Adobe, and everybody uses Adobe, which is not a threat."
"The company that sells us the licenses sometimes doesn't know how to do certain things."
"The solution’s technical support could be improved."
"Reporting is an area with shortcomings in CylancePROTECT that needs to be improved."
"The product is expensive."
"My recommendation for improvement is to add functionality for when users request access to an application. There's a pop-up UI, but it's not very customizable. I suggest creating a UI where we can write scripts or use SDKs to enhance it. This could automatically create tickets in a system like ServiceNow when users request an application. If a manager approves, we could automatically push policies to those users."
"It's an old product and has many areas that can be improved."
"CyberArk Endpoint Privilege Manager can be better by making its UI more consistent."
"The installation process is pretty difficult."
"CyberArk has some performance issues. For example, servers could not handle the solution when we first took CyberArk Endpoint Privilege Manager."
"The turnaround time of the support team is an area of concern where improvements are required."
"The price of the product is an area of concern where improvements are required. The product's price should be made more flexible."
 

Pricing and Cost Advice

"The license price for this solution could be better. It's on the expensive side."
"Review closely how many endpoints you actually need before buying into a pricing level. Deal and deal with the VAR of your choice."
"This cost of the license is approximately $5 USD monthly per user."
"The solution provides me with competitive pricing."
"It's not so heavily priced; rather, it's average and decent."
"We pay our license on a yearly basis and have just renewed for two years."
"We would just add more if there are new users, but right now you just need one license for per user."
"Currently, we have competitive pricing for Cylance, which is affordable enough to consider."
"The cost for CyberArk is very high."
"The solution's pricing is reasonable compared to other vendors' products."
"I feel that the price of the product is nominal. It must be around 10 to 15 USD per installation. I rate the product price an eight to nine out of ten, where one is high price, and ten is low price."
"The tool's pricing is reasonable for customers."
"It's not at the lower end of the market. I think the price is reasonable considering the quality it delivers. It is a top-notch solution at a fair price point."
"CyberArk Endpoint Privilege Manager is slightly expensive, but costs can be negotiated to become more competitive."
"The tool is priced high. I would rate its pricing an eight out of ten."
"It is an expensive solution."
report
Use our free recommendation engine to learn which Endpoint Protection Platform (EPP) solutions are best for your needs.
851,174 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Manufacturing Company
12%
Government
8%
Financial Services Firm
7%
Financial Services Firm
16%
Computer Software Company
14%
Manufacturing Company
11%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about Blackberry Protect?
It is a good endpoint solution. It is very easy to manage and detect the threat immediately. It will take the necessary actions.
What is your experience regarding pricing and costs for Blackberry Protect?
The price is reasonable for us at the moment. I rate the overall solution an eight out of ten.
What needs improvement with Blackberry Protect?
I face challenges with the exclusion policy - it still scans folders we told it not to, causing issues. When we contact support, they tell us to update the latest agent, but we can't do that immedi...
Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about CyberArk Endpoint Privilege Manager?
The most valuable feature of the solution is its performance.
What is your experience regarding pricing and costs for CyberArk Endpoint Privilege Manager?
I've received feedback that the pricing is high, however, for me, the value it brings is worth the cost. It's really one of the best solutions.
 

Also Known As

Blackberry Protect
Viewfinity
 

Overview

 

Sample Customers

Panasonic, Noble Energy, Apria Healthcare Group Inc., Charles River Laboratories, Rovi Corporation, Toyota, Kiewit
Information Not Available
Find out what your peers are saying about BlackBerry Cylance Cybersecurity vs. CyberArk Endpoint Privilege Manager and other solutions. Updated: May 2022.
851,174 professionals have used our research since 2012.