Top Rated CylanceENDPOINT Alternatives
56 out of 57 Total Reviews for CylanceENDPOINT
Overall Review Sentiment for CylanceENDPOINT
Log in to view review sentiment.

- The product is very lightweight and is hardly noticeable when installed or analyzing, it barely consumes resources and in this aspect surpasses any other brand.
- Its protection is based more on artificial intelligence residing in the agent and not on virus definition updates like other products in its range.
- It has a management console that is very user-friendly and easy to use and implement. Review collected by and hosted on G2.com.
- The Endpoint agent (Cylance Protect) is separate from the EDR agent (Cylance Optics) and must be installed separately, I think this takes a significant amount of time if the implementation is carried out on a large number of devices, and it should improve by unifying the installation packages.
- It does not have installation through unattended deployment, and deployment must be done from other external tools (via GPO if MSI, or through another product that deploys installations). Review collected by and hosted on G2.com.
The customer support ensure your issue is solved swiftly and effectively. They work 24/7
implementation is easy by a tech savvy person. However, it is not that easy to use by someone without technological knowledge
All the features are security-based. The Analyze CyclanceOPTICS helps you use the management console to querry device data collected by its agent to investigate any security threats and discover any comprise indicators. InstaQuery facet breakdown gives an interactive visual display of the various facets involved in the query so that it is easy to identify and follow the relational path
It enables you to lock an infected device or a potentially infected one, disable its Wi-Fi or LAN network to stop command or control activity, lateral movement of the malware or exfiltration of data.
It helps send actions to devices- here the remote response feature is used to securely execute scripts and run commands. Review collected by and hosted on G2.com.
It helps detect all that is deamed malware and provides the right exlusion measure for every detected threat.I
Generally, it has improved from the earlier features in 2020 and what they offer currently is great for various devices. I like it more Review collected by and hosted on G2.com.
Visbility and easy to understand, investigate issues Review collected by and hosted on G2.com.
Actually, the price of the licenses because this solution don't give you a lot of discounts when you exchange of solution. Review collected by and hosted on G2.com.

Individual software-specific installs versions based on different OS like MAC and Windows, threat watches search filtering. Ease of use Review collected by and hosted on G2.com.
The Uninstall process takes some time and is not very easy for a beginner. Some IT knowledge necessary Review collected by and hosted on G2.com.

It can depend on AI and on signatures also. Cybersecurity specialist help is greatful. Easy to use with their support help. Review collected by and hosted on G2.com.
Sometimes endpoint has comunication errors. Review collected by and hosted on G2.com.
It detects everything and requires exclusion, for each detection item. It adds a layer of security. Review collected by and hosted on G2.com.
CylanceOPTICS slows down the CPU when used alongside antivirus solutions. It impacts machines with high IO as well. Review collected by and hosted on G2.com.

Hey I was started learning Endpoint protection technology and methodology before handling this Cylance Protect. Machine learning and AI is the trending technology on which the EPP was working I think best part for me that cylance is completely AI Driven machine learning algorithm based platform. Review collected by and hosted on G2.com.
It's not like that I am disliking the solution, but when we are considering this with market leader solution then definitely feature wise I can see it have limited control features. May be in future scope they can add. Review collected by and hosted on G2.com.
Script control over endpoints and threats dashboard showing a combined list of threats. Review collected by and hosted on G2.com.
Lavks automatic remediation to the exploit attempts on the endpoints Review collected by and hosted on G2.com.

Capability to dynamic scanning and customized option make cylance a good protector Review collected by and hosted on G2.com.
How everything get detected then for each detection item require exclusion Review collected by and hosted on G2.com.