Cylance    API Connector

Endpoint Protection (EPP)

Leveraging artificial intelligence (AI) and machine learning capabilities, BlackBerry® Protect (previously known as Cylance) provides automated malware prevention, application and script control, memory protection, and device policy enforcement. It predicts and prevents cyber-attacks with unparalleled effectiveness, ease of use and minimal system impact.

Example widgets from the Cylance data-suite...

Qualys API Connector

Total Devices

BlackBerry Protect (previously Cylance) is an AI-based endpoint security solution that prevents breaches and provides added controls for safeguarding against sophisticated threats. Human intervention, cloud connections, signatures, heuristics, and sandboxes are not required.

Monitor total devices in your Infrastructure using Stratiam and cross-correlate these against other security protection signals, for example Active Directory and Breach Aware.


Online Devices

Unified Endpoint Security (UES) needs to protect people, devices, networks and apps by offering improved cross-platform visibility and cyber threat prevention and remediation, while simplifying administration.

Cylance leverages artificial intelligence, machine learning and automation to provide improved cyber threat prevention and remediation, while offering visibility to help you manage all endpoints with the highest level of security. Track all end-points including desktop, mobile, server and IoT. Monitor the percentage of your entire estate online at any one time and send this signal to your Strataim instance.

Unprotected Devices

Unprotected Devices

Monitoring the number of Unprotected Devices is crucial to your endpoint protection strategy. Surface signals on exposed, un-protected, devices with 'no device control' to your Stratiam instance, so you can rapidly take action and optimise your IT security infrastructure.

Unprotected Devices

Unsafe Devices

Use Unsafe Devices to quickly display the number of devices with a policy that has both Unsafe and Abnormal properties.


Malware Threats.

Recently, Cylance® observed a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Overall Malware attacks rose by 10% as attackers continued to hone their tools, skills, and tactics to threaten Windows, macOS, and various IoT platforms.

Carefully monitor these, and others, within Stratiam to add value to your overall IT Security strategy.

Example chart types from the Cylance data-suite...

Chart types are an enhancement beyond what would be available in the native Cylance platform and are an example Stratiam value-added features. Actual platform visualisations may differ to what is demonstrated in the concepts below. All charts have linked drill-paths for further data-exploration.

Cross Correlate

Monitor devices in Cylance and other platforms. Use the combined signals from both to cross-correlate and surface completely unique views.

Threat Explorer

Explore threats in Cylance and other platforms. Use the combined signals from both to cross-correlate and surface completely unique views.

Connecting to Cylance via our API connector is easy, you simply need to request a trial, after which we'll help set you up with your API credentials, select visualisation types and relevant permissions to get started. If you have other data-services you are interested in connecting to, we'd recommend checking out our other data-connectors.