


Ivanti Endpoint Security for Endpoint Manager and BlackBerry Cylance Cybersecurity compete in the endpoint protection landscape. Ivanti tends to have an advantage with affordability and customer support, while BlackBerry Cylance offers superior advanced features, appealing to those seeking cutting-edge security.
Features: Ivanti Endpoint Manager integrates well with existing systems, provides comprehensive device management for multiple operating systems, and excels in patch management. BlackBerry Cylance uses AI-driven threat detection, offers a user-friendly dashboard, and provides predictive security technology, focusing on protecting against zero-day threats.
Room for Improvement: Ivanti could enhance its AI capabilities and expand its cloud-based solutions further. Improved dashboard intuitiveness may also be beneficial. BlackBerry Cylance might work on reducing the initial setup cost and enhancing its customization flexibility. Additional focus on reducing false positives and improving server resource usage would be valuable.
Ease of Deployment and Customer Service: BlackBerry Cylance offers a straightforward cloud-based deployment method but might require additional setup for complete customization. Ivanti is praised for its simple configuration that integrates with existing systems smoothly. While both offer strong customer support, Ivanti is particularly commended for its accessible assistance.
Pricing and ROI: Ivanti Endpoint Security for Endpoint Manager is cost-effective, offering good ROI for smaller businesses with competitive setup costs. BlackBerry Cylance, though more expensive, provides advanced features deemed worthwhile, justifying the investment for larger enterprises seeking top-tier security and offering significant long-term ROI.
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 3.6% |
| BlackBerry Cylance Cybersecurity | 1.5% |
| Ivanti Endpoint Security for Endpoint Manager | 1.0% |
| Other | 93.9% |



| Company Size | Count |
|---|---|
| Small Business | 46 |
| Midsize Enterprise | 20 |
| Large Enterprise | 49 |
| Company Size | Count |
|---|---|
| Small Business | 33 |
| Midsize Enterprise | 5 |
| Large Enterprise | 13 |
| Company Size | Count |
|---|---|
| Small Business | 2 |
| Midsize Enterprise | 4 |
| Large Enterprise | 5 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
BlackBerry Cylance Cybersecurity leverages AI and machine learning for efficient malware detection and zero-day threat protection, offering robust endpoint security with high detection accuracy and low false positive rates.
BlackBerry Cylance Cybersecurity delivers advanced threat protection with AI-driven algorithms and machine learning. Its lightweight design ensures low system resource usage, making it both efficient and effective. It's recognized for centralized management, easy deployment, and a clean interface, providing comprehensive endpoint protection against diverse threats. The integration of features like CylanceOPTICS and behavioral monitoring enhances security insights. While the system excels in malware detection, enhancements are needed in areas like user interface design, reporting, deeper threat analysis, and integration with third-party systems. Support and pricing improvements could also increase competitiveness.
What are the key features of BlackBerry Cylance Cybersecurity?Organizations deploy BlackBerry Cylance Cybersecurity for threat analytics, log management, and endpoint protection. As an antivirus replacement, it protects against zero-day malware, ransomware, and various threats. Its AI algorithms detect anomalies, minimizing risks in both internet-connected and isolated environments. Many businesses incorporate it into wider security strategies, appreciating its centralized management and proactive defense capabilities.
Ivanti Endpoint Security for Endpoint Manager combines a powerful vulnerability database with cloud-based deployment, facilitating mobile and OS management while enhancing security.
The platform features efficient patch management, remote control, and data access via mobile devices. Its unified console supports asset tracking across Windows, Mac, and Android, improving security patching processes. With inventory management, low-code workflow builders, built-in compliance, and an appealing UI, it manages thousands of devices, though it requires improvements in mobile onboarding, agent troubleshooting, and non-Windows patching. Some challenges exist with policy integration and IT tool integration, while comprehensive training is essential due to its wide range of functionalities.
What are the key features of Ivanti Endpoint Security for Endpoint Manager?Ivanti Endpoint Security for Endpoint Manager is implemented across industries for enhanced security patching, mobile device management, and data compliance. Companies utilize its features for managing personal and corporate data separately to prevent data leaks and breaches. The system enables efficient management of device fleets, though Mac management has noted limitations.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.