CylanceENDPOINT
CylanceENDPOINT
10 reviews
WH Score
8.2

Top CylanceENDPOINT Features

What are the Best CylanceENDPOINT Features?

CylanceENDPOINT, a highly sought-after endpoint security solution, boasts many features that empower organizations to safeguard their endpoints against diverse cyber threats. 

AI-Powered Threat Detection

Integrating Artificial Intelligence (AI) and Machine Learning (ML) algorithms is at the forefront of its capabilities, enabling proactive detection and prevention of malware, ransomware, and advanced threats in real-time – a distinctive edge in encountering previously unknown threats.

Device Control and Isolation 

In the unfortunate event of a lost or stolen device, CylanceENDPOINT extends the capability to remotely lock and delete, thwarting unauthorized access to corporate data. This empowers organizations to enforce policies and restrictions on devices, ensuring that only authorized devices gain access to sensitive data. 

Threat Analytics and Incident Response 

CylanceENDPOINT excels in comprehensive threat analytics and incident response capabilities, providing a centralized console for security teams to scrutinize activity logs, conduct breach assessments, and perform risk evaluations. In the face of a security incident, CylanceENDPOINT facilitates swift and effective incident response and remediation.

Compliance

CylanceENDPOINT encompasses features such as data backup and recovery, application control, and encryption, ensuring data security and compliance with stringent regulations like GDPR. 

EDR

Endpoint Detection and Response (EDR) capabilities from CylanceENDPOINT empower organizations to promptly detect and counter advanced threats, coupled with built-in failover mechanisms that assure continuous protection, even during system failure.


Cybersecurity Features
  • Network Security
  • Data Security
  • Endpoint Detection and Response (EDR)
  • Firewall
  • Encryption
  • Filtering
  • Threat Hunting
  • Incident Response & Remediation
Device Management
  • Device Discovery
  • Device Control
  • Device Isolation
  • Device Lockdown
  • Lock & Delete Lost/Stolen Devices
  • Bring Your Own Device (BYOD)
  • Device Lifecycle Management
Application Management
  • Application Discovery
  • Application Control
  • Application Isolation
Identity and Access Management (IAM)
  • User Provisioning/Deprovisioning
  • Role Based Access Control (RBAC)
  • Single Sign-On (SSO)
  • Multi-Factor Authentication (MFA)
Reporting & Analytics
  • Vulnerability Assessments
  • Activity Log
  • Breach Assessments
  • Perimeter Assessments
  • Threat Analytics
  • Risk Assessments
Cybersecurity Protection Types
  • Antivirus
  • Anti-Malware
  • Anti-Ransomware
  • Exfiltration Prevention
Systems/Administrative
  • Storage
  • Policy Management
  • Centralized Console
Compliance Accreditations
  • GDPR
Supported Technologies
  • Artificial Intelligence (AI)
  • Machine Learning (ML)
Disaster Recovery
  • Data Backup & Recovery
  • Inbuilt Failover
Data Management
  • Data Retention
Collaboration Tools
  • Workspace
Customizable Items
  • Custom Workflows
Have you used CylanceENDPOINT in the past?

Help other people find the right software by sharing your CylanceENDPOINT experience.

0

Best WH Scored CylanceENDPOINT Alternatives

Need help finding the right software?

Tell us what you're looking for and we'll offer you personalized software recommendations.

The right software for your business

Get your personalized recommendations now.