CylanceENDPOINT
CylanceENDPOINT
10 reviews
WH Score
8.1

Top CylanceENDPOINT Features

What are the Best CylanceENDPOINT Features?

CylanceENDPOINT, a highly sought-after endpoint security solution, boasts many features that empower organizations to safeguard their endpoints against diverse cyber threats. 

AI-Powered Threat Detection

Integrating Artificial Intelligence (AI) and Machine Learning (ML) algorithms is at the forefront of its capabilities, enabling proactive detection and prevention of malware, ransomware, and advanced threats in real-time – a distinctive edge in encountering previously unknown threats.

Device Control and Isolation 

In the unfortunate event of a lost or stolen device, CylanceENDPOINT extends the capability to remotely lock and delete, thwarting unauthorized access to corporate data. This empowers organizations to enforce policies and restrictions on devices, ensuring that only authorized devices gain access to sensitive data. 

Threat Analytics and Incident Response 

CylanceENDPOINT excels in comprehensive threat analytics and incident response capabilities, providing a centralized console for security teams to scrutinize activity logs, conduct breach assessments, and perform risk evaluations. In the face of a security incident, CylanceENDPOINT facilitates swift and effective incident response and remediation.

Compliance

CylanceENDPOINT encompasses features such as data backup and recovery, application control, and encryption, ensuring data security and compliance with stringent regulations like GDPR. 

EDR

Endpoint Detection and Response (EDR) capabilities from CylanceENDPOINT empower organizations to promptly detect and counter advanced threats, coupled with built-in failover mechanisms that assure continuous protection, even during system failure.


Cybersecurity Features

  • Network Security
  • Data Security
  • Endpoint Detection and Response (EDR)
  • Firewall
  • Encryption
  • Filtering
  • Threat Hunting
  • Incident Response & Remediation

Device Management

  • Device Discovery
  • Device Control
  • Device Isolation
  • Device Lockdown
  • Lock & Delete Lost/Stolen Devices
  • Bring Your Own Device (BYOD)
  • Device Lifecycle Management

Application Management

  • Application Discovery
  • Application Control
  • Application Isolation

Identity and Access Management (IAM)

  • User Provisioning/Deprovisioning
  • Role Based Access Control (RBAC)
  • Single Sign-On (SSO)
  • Multi-Factor Authentication (MFA)

Reporting & Analytics

  • Activity Logs
  • Vulnerability Assessments
  • Breach Assessments
  • Perimeter Assessments
  • Threat Analytics
  • Risk Assessments

Cybersecurity Protection Types

  • Antivirus
  • Anti-Malware
  • Anti-Ransomware
  • Exfiltration Prevention

Systems/Administrative

  • Policy Management
  • Centralized Console
  • Storage

Compliance Accreditations

  • GDPR

Supported Technologies

  • Artificial Intelligence (AI)
  • Machine Learning (ML)

Disaster Recovery

  • Data Backup & Recovery
  • Inbuilt Failover

Data Management

  • Data Retention

Collaboration Tools

  • Workspace

Customizable Items

  • Custom Workflows

CylanceENDPOINT Top Features Related Review


F
Farah
Reviewed on 18 May 2023

Happy with its performance

It is a good tool overall for protection and security

Pros
  • The ease of use and seamless agent updates are highly commendable.
Cons
  • The feature options are relatively limited when compared to Carbon Black and CrowdStrike.

Have you used CylanceENDPOINT in the past?

Help other people find the right software by sharing your CylanceENDPOINT experience.

Need help finding the right software?

Tell us what you're looking for and we'll offer you personalized software recommendations.

The right software for your business

Get your personalized recommendations now.