BlackBerry’s Cybersecurity Solutions Portfolio

0

BlackBerry has announced a revamped AI-based Cylance cybersecurity portfolio that advances the company’s mission to deliver enterprise-grade security assurances to organisations at fraction of the time, effort, and initial capital typically required.

 The company says the upgraded portfolio reduces alert fatigue by 90 percent compared to previous versions, offers faster incident response, expands cloud defense coverage and makes organisations’ zero trust network access (ZTNA) adoption journey even easier with turn-key support for the most commonly used software as a service (SaaS) application.

“From the largest multi-nationals to the smallest mom and pop businesses, and every organisation in-between, no one is immune to cyber threats. Having the right cybersecurity solutions in place at the right time is critical,” said Nathan Jenniges, Vice President of Cybersecurity Product Management at BlackBerry. “By combining several of our industry-leading products to create all-in-one offerings, we’re now even better placed to work as an extension of our customers’ security and IT teams, delivering both cutting-edge technology and expertise so they can defend their organisations no matter the size, and break free from resource limitations that hinder having a holistic ‘Shields Up’ security posture.”

Updated cybersecurity offerings:

  • CylanceENDPOINT defends modern, legacy and even isolated endpoints utilising a lightweight and battle-proven AI model at its core. CylanceENDPOINT has consistently demonstrated an ability to stop more threats earlier in the attack chain while reducing alerting noise and performance overhead. CylanceENDPOINT now provides a dramatically simplified investigation and response workflow with a new extended detection and response (XDR) alert interface that reduces the volume of alerts by 90 percent. (Includes CylancePROTECT®, CylanceOPTICS®, CylancePROTECT® Mobile MTD)
  • CylanceGUARD® now includes secure Critical Event Management (CEM) capabilities powered by BlackBerry® AtHoc®. In the event of a cyberattack, CylanceGUARD customers with the new CEM integration will have secure, multi-channel internal and stakeholder communications for incident response actions. This provides them with the ability to alert, communicate, and collaborate with both internal and external stakeholders from within CylanceGUARD, even when the usual communications infrastructure is not available or has been compromised by malicious activity.
  • CylanceEDGE provides users with improved secure, fast, and effortless access to their work. CylanceEDGE streamlines SaaS app connectivity for popular productivity tools, improving collaboration and security for hybrid workforces now including Google Workspace™. This new offering also enables secure connectivity for applications hosted on AWS Cloud, improves visibility of how sensitive data is being stored, accessed, and shared, and delivers enhanced zero trust threat detection capabilities. (Includes CylanceGATEWAY™, CylanceAVERT™, CylancePERSONA™)
  • CylanceINTELLIGENCE provides organisations with faster access to contextual threat intelligence to stop breaches, identify a breach that may have occurred, and give security teams insight into who threat actors are, what motivates them, how they operate, and how to take a proactive stance to defend their enterprise. In doing so, organisations can become cyber resilient, gaining the ability to anticipate and withstand attacks, recover from cyber events, and adapt to a changing threat landscape.
  • BlackBerry® UEM now provides enhanced visibility to detect multiple eSIMs and prevents users from introducing risk by adding unmanaged eSIMs, while allowing admins to wipe eSIMs without impacting end users’ personal devices, extending the ability to separate work and personal environments.  

“When it comes to cyberattacks, no industry, institution, or state is immune, and nothing is off-limits,” said Michael Suby, Research Vice President, Security and Trust at IDC. “Time-strapped security teams need solutions that bring people, processes, and technology together into consolidated solutions that can proactively hunt down and eradicate threats wherever they appear.”

Share.