-
“The CylancePROTECT product outperforms others we’ve seen and experienced. We rest a little easier knowing this level of protection is on our endpoints.”
-
“CylancePROTECT is a simple and elegant product that works far better than competing solutions. It consumes no system resources, and is virtually effortless to administer.”
-
“CylancePROTECT works more effectively and efficiently than any other endpoint protection solution we evaluated. On top of that, it requires less effort to manage. Switching to Cylance has improved our company’s security position without disrupting end-user workflow.”
-
“Cylance was very easy to roll out across our global network. It operates silently in the background, so we can focus on our daily work instead of constantly configuring antivirus tools.”
-
“We were up and running with CylancePROTECT within a day. The competing product required a week of planning before we could get started with the installation.”
-
“Not only does Cylance replace traditional endpoint antivirus and anti-malware products, it also precludes the need for other detection, forensic recording and host intrusion prevention technologies. It does this while reducing the need for experienced threat response teams to investigate, deconstruct and remediate attacks.”
-
"Happy to say that after nine months of using CylancePROTECT (and only CylancePROTECT) on all endpoints, we have experienced zero incidents of malware infection, minimal incidents of junkware, and a negligible frequency of false positives. The math works!"
-
“CylancePROTECT is an extremely good value for a solution based on predictive modeling versus signature-based AV.”
-
“CylancePROTECT has really helped us clean up our infrastructure and made our VDI deployment a success! It has saved a huge amount of time and money. Also, people don’t even realize it’s there, which makes my life so much better.”
-
“CylancePROTECT works like we were told it would. With the way attackers and ransomware work, generally, signature-based AV is too slow. You have to wait for someone to find the problem, wait for them to look at it, work out a signature for it, and then get it back to …
-
“With the previous AV, there was always a reason why a certain percentage were not protected. With Cylance, we no longer have those issues. I cannot guarantee we will not be attacked, but CylancePROTECT is an important layer of our security-in-depth approach.”
-
"After implementing Cylance, we realized significant benefits in accuracy, visibility, and control. Incidents that have required support staff to put hands on a device have dropped to zero and dormant malware previously undiscovered has been quarantined."
-
“I watched the console all weekend as the newscasts were talking about the attacks in Europe. I was watching for an attack, waiting to see CylancePROTECT catch it, kick it to the curb, and chew it up.”
-
“Since installing CylancePROTECT, we have seen zero incidents of ransomware and zero-days, and experienced zero down time from endpoint security incidents, which is pretty impressive.”
-
"I came up with some measurable targets, including to make sure that Cylance was functioning 100% of the time in our environment, decrease the administrative burden as much as possible, and provide us a path to update easily. And Cylance was able to deliver on all those targets."