The best protection


Cysiv’s User Protection service provides security capabilities that deliver the best protection for your endpoints, applications, and networks. The service delivers XGenTM endpoint security that infuses high-fidelity machine learning into a blend of threat protection techniques to eliminate security gaps across any user activity.

It enables users to work securely from the platforms they find most productive while minimizing your organization’s cyber risk.




Modern threat & vulnerability protection

The latest protection for endpoints, such as physical and virtual Windows and Mac computers, POS, ATM, USB and removable devices, mail servers, cloud email, and file sharing services

Comprehensive protection

The most capabilities for protection against ransomware, unknown malware, targeted attacks, vulnerabilities, phishing, spam, spyware, rootkits, viruses, and known malware

Prevent unknown and unwanted applications

Combination of flexible, dynamic policies, whitelisting, and blacklisting capabilities as well as an extensive application catalog significantly reduce your endpoint attack exposure

Streamlines compliance

Addresses global compliance requirements (e.g., GDPR) for endpoint, email, and SaaS apps with integrated, template-based data loss prevention (DLP), and more

How it works

Maximum protection

Cysiv provides maximum protection by blending signature-less techniques, including pre-execution and runtime machine learning, behavioral analysis, variant protection, census check, application control, exploit prevention, and good-file check with file reputation, web reputation, and command and control blocking.

Our team correlates system, application, and security event data from computers, computer networks, and Trend Micro™ Smart Protection Complete products with threat intelligence. This is accomplished through advanced analytics to detect, report, and act on high-fidelity threats. Our team provides incident management to investigate, contain, and remediate malware and ransomware attacks.  

Up-to-date configurations

We also ensure that all user protection products are configured according to best practices and are up-to-date with the latest software upgrades and security updates. This service builds a solid security foundation across your network for complete end-user protection with broad platform support that protects heterogeneous environments and your unique network configuration.

User Protection

Flexible options

Consumption-based pricing
Take advantage of our unique consumption-based pricing, and choose the service that best fit your needs.

Level 1: Monitoring Service
Includes critical monitoring services and response recommendations.

Level 2: Monitoring and Management Service
Provides all of the benefits of monitoring, and includes authorized measures taken on your behalf.

Additional Professional Services
In support of monitoring and management agreements, we offer digital forensics and incident response, and product deployment services.