“Not only does Cylance replace traditional endpoint antivirus and anti-malware products, it also precludes the need for other detection, forensic recording and host intrusion prevention technologies. It does this while reducing the need for experienced threat response teams to investigate, deconstruct and remediate attacks.”
“We were up and running with CylancePROTECT within a day. The competing product required a week of planning before we could get started with the installation.”
“CylancePROTECT is a simple and elegant product that works far better than competing solutions. It consumes no system resources, and is virtually effortless to administer.”
"I came up with some measurable targets, including to make sure that Cylance was functioning 100% of the time in our environment, decrease the administrative burden as much as possible, and provide us a path to update easily. And Cylance was able to deliver on all those targets."
"After implementing Cylance, we realized significant benefits in accuracy, visibility, and control. Incidents that have required support staff to put hands on a device have dropped to zero and dormant malware previously undiscovered has been quarantined."
"CylancePROTECT is the best piece of AV/endpoint software I have seen in my 15 years. Detection rate is like no other, customer service is great, and the setup and usability is very easy."
“The CylancePROTECT product outperforms others we’ve seen and experienced. We rest a little easier knowing this level of protection is on our endpoints.”
“CylancePROTECT works like we were told it would. With the way attackers and ransomware work, generally, signature-based AV is too slow. You have to wait for someone to find the problem, wait for them to look at it, work out a signature for it, and then get it back to you. We just expect CylancePROTECT to do that on the fly.”
“With the previous AV, there was always a reason why a certain percentage were not protected. With Cylance, we no longer have those issues. I cannot guarantee we will not be attacked, but CylancePROTECT is an important layer of our security-in-depth approach.”
“Despite deploying two well-known, traditional antivirus products, it was only CylancePROTECT that located and contained the malware that was the source of a breach. We have since made Cylance and their health checks a permanent part of our security process to ensure threats are identified before they execute.”
“CylancePROTECT has really helped us clean up our infrastructure and made our VDI deployment a success! It has saved a huge amount of time and money. Also, people don’t even realize it’s there, which makes my life so much better.”
“It sounds cliché, but I actually sleep better at night knowing that Cylance is helping protect my infrastructure and customer’s data.”
“Cylance was very easy to roll out across our global network. It operates silently in the background, so we can focus on our daily work instead of constantly configuring antivirus tools.”
“We were surprised to learn that a third-party vendor performing a security test was actually responsible for a breach that had been going on for six months. Cylance not only found and remediated that threat, but also a number of threats that were up to three years old. Moving forward, we’re going to trust our security to Cylance.”
“I hate to say it, but the agony of my peers has allowed me to justify the means. With the numbers of breaches that have occurred over the past several years, the cost of recovery from a breach, the loss of public trust were huge drivers for us to invest with Cylance.”