Managed Methods, Cylance Team Up on Endpoint Protection for Cloud ApplicationsManaged Methods, Cylance Team Up on Endpoint Protection for Cloud Applications
Managed Methods, Cylance Team Up on Endpoint Protection for Cloud Applications
August 29, 2018

PRESS RELEASE
BOULDER, Colo., Aug. 29, 2018 /PRNewswire/ -- Managed Methods Inc., the leader
in API-based cloud application security solutions, today announced a product
partnership with Cylance, the global provider of AI-driven, prevention-first
security solutions. The partnership will enhance Managed Methods' Cloud Access
Monitor CASB solution with the additional benefit of Cylance's AI-driven threat
detection to proactively prevent advanced persistent threats and malware in
cloud applications.
The use of cloud applications, including Google G Suite and Microsoft Office
365, has become nearly ubiquitous in organizations of all sizes and as a result,
threats from malware and phishing attacks are increasing in scale and
complexity. Cylance's AI-based threat detection adds enhanced protection against
advanced threats often missed by traditional anti-virus technology. By
leveraging the new integrated Managed Methods and Cylance solution,
organizations can better protect their cloud applications and gain greater
visibility and control.
"Advanced threats and malware are continually evolving to be much more difficult
to detect," said Charlie Sander, CEO of Managed Methods. "With Cylance's
powerful AI-based malware detection combined with Managed Methods' cloud-native
CASB, we can offer customers the ability to not just detect but to prevent
malware penetration of customer data, cloud assets and their business."
"We are excited that Managed Methods has selected Cylance to provide their
customers with our AI-based prevention technology," said Ryan Permeth, founder
and chief scientist at Cylance. "Our AI-based security technology, coupled with
our prevention-first approach to cybersecurity, has permanently reinvented how
businesses address endpoint security today."
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023