Managed Methods, Cylance Team Up on Endpoint Protection for Cloud ApplicationsManaged Methods, Cylance Team Up on Endpoint Protection for Cloud Applications
Managed Methods, Cylance Team Up on Endpoint Protection for Cloud Applications
August 29, 2018

PRESS RELEASE
BOULDER, Colo., Aug. 29, 2018 /PRNewswire/ -- Managed Methods Inc., the leader
in API-based cloud application security solutions, today announced a product
partnership with Cylance, the global provider of AI-driven, prevention-first
security solutions. The partnership will enhance Managed Methods' Cloud Access
Monitor CASB solution with the additional benefit of Cylance's AI-driven threat
detection to proactively prevent advanced persistent threats and malware in
cloud applications.
The use of cloud applications, including Google G Suite and Microsoft Office
365, has become nearly ubiquitous in organizations of all sizes and as a result,
threats from malware and phishing attacks are increasing in scale and
complexity. Cylance's AI-based threat detection adds enhanced protection against
advanced threats often missed by traditional anti-virus technology. By
leveraging the new integrated Managed Methods and Cylance solution,
organizations can better protect their cloud applications and gain greater
visibility and control.
"Advanced threats and malware are continually evolving to be much more difficult
to detect," said Charlie Sander, CEO of Managed Methods. "With Cylance's
powerful AI-based malware detection combined with Managed Methods' cloud-native
CASB, we can offer customers the ability to not just detect but to prevent
malware penetration of customer data, cloud assets and their business."
"We are excited that Managed Methods has selected Cylance to provide their
customers with our AI-based prevention technology," said Ryan Permeth, founder
and chief scientist at Cylance. "Our AI-based security technology, coupled with
our prevention-first approach to cybersecurity, has permanently reinvented how
businesses address endpoint security today."
You May Also Like
Securing the Remote Workforce
Feb 20, 2025Emerging Technologies and Their Impact on CISO Strategies
Feb 25, 2025How CISOs Navigate the Regulatory and Compliance Maze
Feb 26, 2025Where Does Outsourcing Make Sense for Your Organization?
Feb 27, 2025Shift Left: Integrating Security into the Software Development Lifecycle
Mar 5, 2025