02:05 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly

Cylance Unveils CylancePROTECT, Applying Math to Prevent Advanced Cyber Threats on Company Endpoints

New Endpoint Security Software Instantly and Mathematically Determines What is Safe and What is a Threat Without the Use of Signatures, Heuristics, Behavioral Analysis, Sandboxing Detonation or Micro-virtualization

Irvine, CA – February 18, 2014 – Cylance, Inc., the first math-based threat detection and prevention company, today announced the release of CylancePROTECT. The product takes a unique mathematical and machine learning approach to stop the advanced threats on endpoint computers. Without the traditional use of signatures, rules, behavior, heuristics, whitelists or sandboxing, CylancePROTECT identifies and renders new malware, viruses, bots, zero-days and unknown future attacks useless.

“The fundamental flaw in today’s cybersecurity infrastructure is that protection requires detection, and detection requires a patient zero,” said Stuart McClure, Cylance founder and CEO. “Human-generated signatures, based primarily on previously discovered samples, have failed to solve the problem as zero-day threats continue to operate silently and unimpeded.”

The first to apply algorithmic science to security in a scalable way, Cylance is delivering a new threat detection model that instantly determines what is safe and what is a threat without ever having to have seen the threat before. Cylance’s deep security domain experience is uniquely combining the understanding of a hacker's mentality with algorithmic intelligence and best practices to enable CylancePROTECT to be truly predictive and preventive against advanced threats. “Attacks keep evolving, bypassing all kinds of traditional security technologies," said Richard Stiennon, chief research analyst at IT-Harvest. "The market is ripe for a revolutionary new solution to securing the endpoint. Cylance’s approach is the most exciting innovation in endpoint security I have seen." CylancePROTECT’s mathematical approach uses patent-pending, machine learning techniques to identify and stop threats before they execute. The Cylance approach has produced the most accurate, efficient and effective solution for preventing advanced malware and persistent threats from executing on endpoints. Internal testing versus third parties discovered a 500X improvement in detection of all data, good and bad, with the ability to stop 100 percent of what is found. Other solutions miss what has not already been previously identified and often can’t block the majority of what it does see. As an example, CylancePROTECT can protect against nested malware delivered in a legitimate application. CylancePROTECT is designed to complement existing endpoint security and be non-impactful to administrators and end users. Its value is to eliminate the concern for unknown and advanced threats, often missed by the other solutions.

CylancePROTECT’s tiny agent sits on top of current solutions and integrates with existing management software for ease of distribution and management. Most importantly, CylancePROTECT is not required to be continually updated, and gives the administrator complete control over configurability from the management console.

“Current endpoint technologies claim high detection rate, but in actuality the real rate is often much lower, sometimes under 50 percent,” McClure added. “No other endpoint protection product compares to the accuracy, ease of management and effectiveness of CylancePROTECT, which has more than a 95 percent detection rate.”

Key values of CylancePROTECT:

More Effective Protection • Identifies and categorizes ‘unknown’ data as safe or as a threat • Stops advanced persistent threats and malware execution • Actively monitors in real time, all the time, online and offline

Non-impactful • No conflicts with existing security or endpoint software • Tiny client: installs, scans and protects in seconds • Doesn’t slow down computers or require pop-up screens • Supports clients for Windows PCs - laptops, and servers & virtual servers • Mathematical algorithm always up-to-date -- no updates required

Enterprise Web-Based Management Console • Integration with third-party management • Group policy and structure • Whitelist and blacklist support for administrative granularity • Social threat awareness of what else is infected • Threat detail visibility

Technically Supports: • Detection mode through passive auditing • Self-protection against user of attacker tampering • Memory protection and execution control to prevent injection and hijacking techniques, overflows and in-memory execution techniques.

About Cylance

Cylance is the first company to apply artificial intelligence, algorithmic science and machine learning to cybersecurity and improve the way companies, governments and end users proactively solve the world’s most difficult security problems. Using a breakthrough mathematical process, Cylance quickly and accurately identifies what is safe and what is a threat of all data, not just what is in a blacklist or whitelist. By coupling sophisticated math and machine learning with a unique understanding of a hacker’s mentality, Cylance provides the technology and services to be truly predictive and preventive against advanced threats. www.cylance.com


Media Contact Cylance Public Relations Rachel Kaseroff rachel@methodcommunications.com 415-341-5625

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-10-24
adsetgroups in Centrify Server Suite 2008 through 2014.1 and Centrify DirectControl 3.x through 4.2.0 on Linux and UNIX allows local users to read arbitrary files with root privileges by leveraging improperly protected setuid functionality.

Published: 2014-10-24
The Remote Controls feature on Samsung mobile devices does not validate the source of lock-code data received over a network, which makes it easier for remote attackers to cause a denial of service (screen locking with an arbitrary code) by triggering unexpected Find My Mobile network traffic.

Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.