Durchschnittliche Bewertung

49 Bewertungen
  • Gesamt 4.5 / 5
  • Benutzerfreundlichkeit 4.5 / 5
  • Kundenservice 4.5 / 5
  • Funktionen 4.5 / 5
  • Preis-Leistungs-Verhältnis 4.5 / 5

Produktdetails

  • Startpreis 5,99 $/Monat
  • Kostenlose Version Nein
  • Kostenlose Testversion Nein
  • Einsatz Installiert - Mac
    Cloud, SaaS, Web
    Installiert - Windows
  • Training Webinare
    Dokumentation
  • Kundenbetreuung Online

Angaben zum Hersteller

  • Cylance
  • https://www.cylance.com/

Über CylancePROTECT

Höre auf, Angriffe nur zu erkennen, sondern verhindere sie, indem du CylancePROTECT verwendest, die Endpunktlösung, die 99 % der Bedrohungen in Echtzeit blockiert.

CylancePROTECT Funktionen

  • Aktivitäten-Protokoll
  • Anti-Virus
  • Anwendungssicherheit
  • Gerätemanagement
  • Unterschriften-Abgleich
  • Verhaltensbezogene Analysen
  • Verschlüsselung
  • Web-Bedrohungen verwalten
  • Whitelist / Blacklist
  • Anti-Spam
  • Anti-Virus
  • E-Mail-Anhang Schutz
  • Ereignis-Nachverfolgung
  • Erkennungssystem für unberechtigte Eingriffe
  • IP-Schutz
  • Schwachstellen-Scannen
  • Threat Response
  • Web-Bedrohungen verwalten
  • Web-Traffic-Berichterstattung
  • Anti-Spam
  • Anti-Virus
  • Audit Trail (Prüfpfad)
  • Compliance Management
  • Dateizugriffskontrolle
  • Datenbanksicherheits-Revision
  • Echtzeitüberwachung
  • Finanzdatenschutz
  • Schwachstellen-Schutz
  • Sicherheitsereignisprotokoll
  • Virus-Definition-Update
  • Wartungsplanung

Die hilfreichsten Reviews für CylancePROTECT

Ignore the marketing hype, for endpoint protection this is the real deal

Bewertet am 7.5.2019
Brian F.
IT Manager
Bau, 201-500 Mitarbeiter
Verwendete die Software für: Mehr als 2 Jahre
Quelle des Nutzers 
5/5
Gesamt
5 / 5
Benutzerfreundlichkeit
5 / 5
Eigenschaften & Funktionalitäten
Kundenbetreuung
5 / 5
Preis-Leistungs-Verhältnis
Wahrscheinlichkeit der Weiterempfehlung:
Unwahrscheinlich Äußerst wahrscheinlich

Kommentare: I have a significant number of users out in the field with limited or no edge protection, so a cloud based endpoint solution is an obvious first step. With a traditional AV client that includes web filtering, which we also have, I would consider those endpoints EXTREMELY vulnerable. Even with excellent email filtering, which we also have, there are just too many things that can go horribly wrong. With three years experience and NO compromised endpoints, I can focus on other security layers instead of faffing around fixing endpoints.

Vorteile: In the three years we've been protecting our endpoints with CylancePROTECT, we have had ZERO incidents across ~250 endpoints. I have tested the Cylance client against true zero day attacks, not recognized on VirusTotal, shared with me by an MSP friend. He has had many clients compromised by ransomware, several more than once, with nuke/pave/restore for the entire organization being the typical response. When I throw attacks against old-build agents, and those attacks are obliterated, it helps me sleep better at night. I don't see these attacks in my environment, hence the testing. The endpoint is the focus of the last line of defense, so PROTECT is critical in my security posture.

Nachteile: In comparison to traditional signature-based (useless) AV, CylancePROTECT and CylanceOPTICS seems expensive. That's why my MSP pal doesn't have his SMB clients on this product, they can't comprehend the value proposition of something so different to what they're familiar with. I guess that's why the marketing initiatives can seem a little over the top, it's hard to get the idea across when some hater says "doesn't detect EICAR!"

Primal application to detect and prevent attacks in your organization.

Bewertet am 9.3.2018
Corina P.
analista de garantias
Automotive, 13-50 Mitarbeiter
Verwendete die Software für: Mehr als 1 Jahr
Quelle des Nutzers 
5/5
Gesamt
5 / 5
Benutzerfreundlichkeit
5 / 5
Eigenschaften & Funktionalitäten
5 / 5
Kundenbetreuung
5 / 5
Preis-Leistungs-Verhältnis
Wahrscheinlichkeit der Weiterempfehlung:
Unwahrscheinlich Äußerst wahrscheinlich

Kommentare: I do not have negative aspects, since it is a very well elaborated software, with guarantees of feasibility and adaptation in each company.

Vorteile: * It is an excellent application because it is based on an artificial intelligence system, which makes it a predictive, fast and efficient unit when detecting an intrusion before reaching its final point. * Warns, evaluates and saves an exact description of the point of origin, expanding the ability to isolate the affected or involved teams during the attack. * Its compact and user-friendly system can be integrated with third-party applications for the administration or maintenance of network units. * It offers practicality, stability and fidelity by keeping tasks in constant execution and pre-programmed, which helps the user to increase their efficiency in time and evaluation of reports to maintain an accurate control in the company and to be able to handle better security routines. * It is possible to use this versatile tool in different devices separately for the protection of memory, control of scripts, control applications and review of sites with possible threats. * The artificial intelligence system for detection is changing the way attacks are predicted.

Lies weitere Bewertungen