Cylance Announces Native AI Platform with Predictive EDR and 24x7 Prevention Services
Cylance, the leading provider of AI-driven, prevention-first security solutions, has this week announced the Cylance native AI platform, which delivers a full suite of security solutions through a single, agile agent for comprehensive attack surface protection with deep-learning Al algorithms in its DNA to support automated threat detection, prevention, forensic investigation, and response capabilities to customers worldwide.
Now that Cylance has successfully applied AI to prevent attacks from executing at the endpoint, it has advanced to another innovative use of native AI: to detect and respond to threats. By applying sophisticated machine learning to threat-detection modules, the Cylance AI platform continuously analyzes changes occurring on each endpoint to uncover threats that would be difficult, if not impossible, for a security analyst to find in real time. When a potential threat is identified, the Cylance AI platform can take selected, decisive, automated actions to respond and thwart it.
“Businesses using endpoint solutions with AI as an add-on feature continue to be challenged by over-alerting and the resource demands of chasing threats,” said Sasi Murthy, vice president of product marketing at Cylance. “Organizations that require round-the-clock, expert-level protection across endpoints and networks are better served by a native AI platform that increases the level of security automation across the kill chain. Cylance offers an open API architecture that enables organizations to combine the Cylance AI platform with their existing security environments for easy integration and streamlined data sharing across a variety of technology tools. The result? Enterprise best-of-breed deployments and a stronger return on existing investments.”
The Cylance AI platform can run as a self-driving security operations center (SOC), where response-to-active threats can be initiated without human intervention. For senior teams that want a more hands-on approach to response, Cylance delivers the critical data required to make response decisions in a powerful, easy-to-use interface. The platform reduces the frequency and density of alerts and security data passed on to other controls and supports the industry’s first AI-driven endpoint detection and response (EDR) solution for on-demand threat hunting and automated response capabilities.
“As a healthcare company, keeping our endpoints secure can quite literally be the difference between life and death,” said Jerry Sto. Tomas, chief information security officer at Apria Healthcare. “Keeping all of our devices online and shielded from threats is critical to patient safety as well as business operations. Cylance offers a robust, lightweight model that integrates easily into our technology stack and provides predictive detection and threat mitigation capabilities that free up my team for more advanced work.”
The Cylance AI platform is a unified technology architecture built on continuous-integration-continuous-delivery (CICD) principles to deliver enterprise capabilities at high velocity, in keeping with fast evolving market needs. Importantly, the Cylance AI platform delivers a predictive advantage against never-before-seen malware on average of 25 months before it appears online. Cylance deployed malware conviction models in customer environments that were able to detect and block the top 10 malware attacks—including WannaCry and NotPetya—on average of two years before those attacks were first detected in the wild. This proven over-the-horizon prevention capability against known and unknown malware is the predictive advantage that only a native AI solution, like the one delivered with the Cylance agile agent can provide.
All Cylance offerings can now be installed with a single executable. Current customers have the option to enable Cylance’s full range of AI-based prevention and EDR functionality simply by purchasing and activating licenses. The updated AI platform is managed and deployed through a completely redesigned web-based console that provides access to the full range of platform functions that include:
- AI-driven malware prevention
- Device usage policy enforcement
- Script management
- Memory exploit prevention
- Application control for fixed-function devices
- Machine behavior + threat hunting + automated responses
- Static behavior rule-based threat detection and response
- Machine learning attack-tuned models
- Root-cause analysis
- Enterprisewide threat hunting
- Remote forensic investigations
- Aggressive containment
Cylance has built the largest AI platform in the industry, enabling it to offer a portfolio of solutions ranging from enterprise endpoint protection, detection, and response, to Smart Antivirus for consumers, to OEM solutions. The lightweight Cylance agent offers high performance and resiliency and requires only minimal updates to its multigenerational AI model, providing powerful data science capabilities using deep learning algorithms designed to protect against future threat variants.
Industry: Cyber Security & Artificial Intelligence News
- Security infrastructure Engineer - Firewall | IDS | NAC | Cloud. Exclusive project, £75,000+
- United Kingdom
Security infrastructure Engineer - Firewall | IDS | NAC | Cloud. Exclusive project DCL Search exclusive Identifier Project. To join a financial services business. Key hire to be part of / influence the cyber security capability and direction within the business. Hands on experience managing / monitoring / upgrading / implementing / using the following; · Firewalls: SonicWall and or Palo Alto · NAC: Cisco OR Macmon · WAF | CASB | MDM Experience with SIEM monitoring / vulnerability analysis also highly desirable. MUST have current hands on experience with vulnerability management tooling and best practice. Current Financial services is a nice to have. Learn new skills working within a collaborative team. Grow as a security professional.
- Outside IR 35 CONTRACT SC CLEARED Cyber Security Operations Analyst SPLUNK ES- UK REMOTE- £500 a day.
6 month contract Outside IR35 Operational Cyber Security Analyst. Hands on Splunk Security Enterprise and Security clearance is required As is someone that holds SC clearance. SOC and Vulnerability management experience. Vulnerability Analysis / Management - Tenable
- SailPoint Consultant
- Upto €80,000
SailPoint Consultant is need for this rapidly expanding global business, The business is currently in the middle of a SailPoint Deployment, they require an experienced Consultant who is able to help them on this Journey You will be responsible for helping to configure and deploy SailPoint as well as on board applications onto the platform You will also work with the business to understand workflow and process to help align the way the business works to ensure that the business gets the most from the deployment We are looking for an experienced SailPoint consultant who has experience with both Deployment and BAU work and is interested in joining a business which is at the start of an interesting IAM Journey
- SOC Manager Security Operations. SIEM, Threat / Vulnerability, IR, SOC Service- Exclusive
- United Kingdom
SOC Manager- SIEM, Threat / Vulnerability, Incident response. Exclusive Project. Management and on growth growth of Security Operations Centre capability. Managing and maturing the team, technical services line and fronting client engagements where needed. An in-depth technical background is essential, experience across SOC SIEM/ Threat Hunting (IR) tools, processes, techniques, operational is a MUST. The role will include, but not limited to; evolving the technical process, building operational capability, managing and hiring team, involved at a high level overviewing policy/playbooks, fine turning of the go-to-market collateral etc.