Cylance, a Blackberry company since the early 2019 acquisition, developed their flagship business antivirus and endpoint protection software in CylancePROTECT, featured in business and home editions boasting artificial intelligence guided protection. BlackBerry Protect is a post-acquisition evolution of CylanceProtect.
N/A
Carbon Black Endpoint
Score 8.8 out of 10
N/A
The VMware Carbon Black Endpoint solution (formerly Cb Defense) is an endpoint security and "next-gen antivirus (NGAV)" that uses machine learning and behavioral models to analyze endpoint data and uncover malicious activity to stop all types of attacks before they reach critical systems. Endpoint Standard captures and stores endpoint activity, enabling a comprehensive view of any suspicious activity on endpoints, including visibility into the entire attack chain, so users can understand the…
N/A
Pricing
BlackBerry Protect (CylancePROTECT)
VMware Carbon Black Endpoint
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
BlackBerry Protect (CylancePROTECT)
Carbon Black Endpoint
Free Trial
No
No
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
—
—
More Pricing Information
Community Pulse
BlackBerry Protect (CylancePROTECT)
VMware Carbon Black Endpoint
Considered Both Products
BlackBerry Protect (CylancePROTECT)
Verified User
Director
Chose BlackBerry Protect (CylancePROTECT)
Cost was much better than McAfee. PROTECT can cover non-virtual endpoints.
We evaluated 3 other competitors and determined that Cb Defense was the best "bang for the buck" when it comes to Next-Generation Anti Virus. Their support (and sales) teams have been very helpful and offered a tremendous level of transparency. Our sales representative went …
Some of the other products did not allow you to whitelist items on a Mac. We are a heavy Mac shop so this was a requirement. Cb Defense had superior reporting, making it easy to track what was happening on a machine and how to respond. We ran known malware and zero days …