image7.jpeg
download.png

FAST, RELIABLE ENDPOINT DETECTION & RESPONSE

 

Our cloud-native BlackBerry® Optics provide visibility, on-device threat detection and remediation across your organization.

In milliseconds. And our EDR approach effectively and efficiently hunts threats while eliminating response latency. It’s the difference between a minor security event—and one that’s widespread and uncontrolled. 

Cloud Enabled

CLOUD-ENABLED—NOT CLOUD-DEPENDENT

Our cloud-based BlackBerry Optics provide monitoring and visibility that span your entire organization, enabling detection and threat hunting for both online and offline devices. 

image6 (1).jpeg
image7.jpeg

Edge AI

QUICKLY DETECT AND RESPOND TO RANSOMWARE

Ready to move beyond attack visibility? Our AI-driven security proactively detects and automates response capabilities. So you can find and neutralize advanced cyberthreats in milliseconds–not hours or days.

Minimize Attack Surface

PREVENT WIDESPREAD INCIDENTS WITH MACHINE LEARNING

BlackBerry Optics mitigates and contains threats at the endpoints–drastically minimizing your attack surface and potential lateral movement. So your SOC teams have more time to perform essential duties, instead of monitoring and re-imaging compromised endpoints.

image8 (2).jpeg
image9.jpeg

Respond in Milliseconds

CUSTOM AUTOMATED RESPONSES

BlackBerry Optics have a built-in playbook with automated incident responses to mitigate endpoint threats. As it automatically collects relevant security information for hunting and forensic analysis, you’ll save your SOC analysts some time.

Deep Insight

UNCONSTRAINED THREAT HUNTING

Our advanced, intuitive querying capabilities with Query language objects is purpose-built for MITRE ATT&CK®. It’s designed to enable deep insight for threat hunting and forensics with superior data retention packages—30 days out-of-the-box and up to 365 days.

image10.jpeg

BLACKBERRY® OPTICS CAPABILITIES

Frosty (5).png
  • EDR Engine

  • Automated forensic events logging

  • Automated response

  • Custom detection rules

  • Integrated MITRE ATT&CK

  • Secure remote response

  • Private Network Visibility

  • Advanced Scripting Visibility

  • Deep Insight 30-day retention, included

  • Deep Insight 90-day, 365-day retention, available

  • Cryptomining detection

  • Audit logging