


Trellix Endpoint Security Platform and BlackBerry Cylance Cybersecurity both operate in the advanced cybersecurity sector. Trellix seems to have an advantage with its comprehensive feature set, while BlackBerry is praised for efficiency and AI capabilities.
Features: Trellix offers features like advanced threat prevention, data loss prevention, and endpoint encryption. Its customizable dashboard and integration with orchestration solutions are key strengths. BlackBerry is noted for its lightweight structure, AI-driven threat detection, and low resource consumption, making it a viable option for those focusing on efficient performance.
Room for Improvement: Trellix could improve its technical support response times, simplify its user interface, and address scalability concerns. BlackBerry users suggest enhancing support resolution times, continuing development post-acquisition, and enriching user interface details post-threat detection.
Ease of Deployment and Customer Service: Trellix supports hybrid and cloud deployments, though faster deployment processes are desired. Its technical support is considered good but can be slow. BlackBerry's deployment is straightforward with satisfactory support, although there is room for improved response times.
Pricing and ROI: Trellix is often seen as affordable for enterprises, providing significant cost savings and a good ROI. BlackBerry, though slightly more expensive, offers competitive pricing and peace of mind through robust protection, contributing to positive ROI perceptions.
| Product | Mindshare (%) |
|---|---|
| Cortex XDR by Palo Alto Networks | 3.5% |
| Trellix Endpoint Security Platform | 3.6% |
| BlackBerry Cylance Cybersecurity | 1.3% |
| Other | 91.6% |



| Company Size | Count |
|---|---|
| Small Business | 44 |
| Midsize Enterprise | 20 |
| Large Enterprise | 47 |
| Company Size | Count |
|---|---|
| Small Business | 33 |
| Midsize Enterprise | 5 |
| Large Enterprise | 13 |
| Company Size | Count |
|---|---|
| Small Business | 68 |
| Midsize Enterprise | 36 |
| Large Enterprise | 62 |
Cortex XDR by Palo Alto Networks provides advanced threat detection with AI-driven endpoint protection and seamless integration, ensuring multi-layered security and automatic threat response.
Cortex XDR is designed to safeguard endpoints against malware and suspicious activities. It offers advanced threat detection and response capabilities using behavioral analysis, AI, and machine learning. It seamlessly integrates with security infrastructures, providing endpoint security, firewall integration, and enhanced visibility in both cloud-based and on-premises environments.
What are the key features of Cortex XDR?Organizations in diverse sectors deploy Cortex XDR to protect against malware, leveraging its advanced threat detection capabilities. Its integration with existing security infrastructures appeals to those seeking comprehensive protection in both cloud and on-premises environments, providing enhanced visibility and threat intelligence.
BlackBerry Cylance Cybersecurity leverages AI and machine learning for efficient malware detection and zero-day threat protection, offering robust endpoint security with high detection accuracy and low false positive rates.
BlackBerry Cylance Cybersecurity delivers advanced threat protection with AI-driven algorithms and machine learning. Its lightweight design ensures low system resource usage, making it both efficient and effective. It's recognized for centralized management, easy deployment, and a clean interface, providing comprehensive endpoint protection against diverse threats. The integration of features like CylanceOPTICS and behavioral monitoring enhances security insights. While the system excels in malware detection, enhancements are needed in areas like user interface design, reporting, deeper threat analysis, and integration with third-party systems. Support and pricing improvements could also increase competitiveness.
What are the key features of BlackBerry Cylance Cybersecurity?Organizations deploy BlackBerry Cylance Cybersecurity for threat analytics, log management, and endpoint protection. As an antivirus replacement, it protects against zero-day malware, ransomware, and various threats. Its AI algorithms detect anomalies, minimizing risks in both internet-connected and isolated environments. Many businesses incorporate it into wider security strategies, appreciating its centralized management and proactive defense capabilities.
Trellix Endpoint Security Platform offers essential features like centralized management, threat prevention, and encryption, facilitating seamless scaling and integration with other systems while prioritizing user security.
This comprehensive platform focuses on endpoint protection, antivirus capabilities, and malware defense. It enhances cybersecurity with data loss prevention, advanced threat detection, and AI-driven features for reliable protection without impacting performance. Central management and advanced reporting streamline integration and ease of use. Flexible policy deployment through the management console and its robust security measures, such as DLP and device control, further increase protection. Challenges include high CPU and memory usage affecting performance, a complex interface, and lengthy deployment. Third-party integration and Windows Hello support need improvement. Additional concerns involve improved threat detection and faster technical support responses.
What are the key features of Trellix Endpoint Security Platform?Trellix Endpoint Security Platform is widely implemented in industries such as banking and government for securing mobile and desktop devices. Its capabilities cover network security, device control, and remote access protection, catering to diverse environments by offering robust cybersecurity management against advanced threats.
We monitor all Endpoint Protection Platform (EPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.