Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

06:59 PM
Dark Reading
Dark Reading
Products and Releases

Cylance Announces Free Endpoint Technology

CylanceDETECT now ready for broad beta consumption

IRVINE, CA--(Marketwired - Jun 26, 2013) - Cylance, Inc., a global cybersecurity, technology and services company applying science to security, today announced that CylanceDETECT for endpoints, the lightest, easiest to use advanced threat detection, is now ready for broad beta consumption as limited time freeware at http://my.cylance.com.

"Cylance's mission is to protect the world from cyber threats and attacks," said Stuart McClure, CEO/President of Cylance. "Our Company's collective experience over the past two and a half decades building security infrastructure recognizes that hackers' advanced threats surpass the detection capabilities of traditional signature-based technologies today. In building our forthcoming Infinity Cloud Advanced Threat Intelligence platform, we are able to detect what has previously been undetectable and want to make this a product that is free to the world."

Cylance's unique technological approach is to apply big math and science to security. Many industries, like high frequency trading, pharmaceutical development and life insurance, have applied mathematical algorithms to calculate large amounts of data into highly accurate groupings, normalizations and abnormalities. Cylance is the first to apply this science to the world of network security. In testing against dozens of the most widely used detection technologies, CylanceDETECT discovers 3-5 times more than other technologies, including the most advanced threats -- the ones never before seen. It is widely known that signature-based technologies like anti-virus are required elements of protection, detecting everyday malware like adware, spyware and potentially unwanted programs (PuPs); however they simply miss too many of the advanced threats. CylanceDETECT complements existing endpoint and network solutions to deliver true advanced detection capabilities to the masses.

A second benefit CylanceDETECT provides is its 'weight.' Most endpoint solutions can be a burden on the computing power and footprint of the endpoint device and only get 'heavier' with each additional signature protection update. This causes PCs to have slow boot up times, drag on regular performance and the burden of updating on a regular basis -- enabling gaps in protection until the next update is applied. CylanceDETECT addresses these issues with an almost non-existent, featherweight, real-time detection. As a browser interface, there is no burden on the endpoint and advanced threat detection can be seen from any web browser -- whether on that device or not.

The third benefit CylanceDETECT provides is derived from social sharing. Through a 'community or herd immunity' model, users of CylanceDETECT can add family, friends and associates to their circle and help identify who might have bad elements on their machine. For every bad item found on one machine, the intelligence populates our advanced threat database in real-time for the protection of everyone. In this way, the more people who use it, the better the detection gets. With the mission to protect the world from cyber hacks and attacks, the planet of computer users who implement CylanceDETECT will significantly progress towards reducing a hacker's current ease of breaking into networks and endpoints.

Cylance's approach to security protection is called Presponse. This is a philosophical, practical and cyclical manner of understanding a hacker's mentality and coupling algorithmic intelligence with technology to be truly predictive and preventive against advanced threats. Through this approach, organizations can understand how they could be compromised before a breach occurs and help recover after an attack, therefore preventing incidents before business is affected.

"Security is an industry full of new threats, problems and vulnerabilities, but you hear little in the way of new forms of defense," said Patrick Heim, Chief Trust Officer with Salesforce.com. "Cylance is not satisfied with the current model nor waiting for a 'successful' attack to diagnose a cure. Their initiative to bring to market a free advanced threat detection product for the greater good is admirable and highly beneficial in the fight against hackers and attackers for both individuals and organizations."

CylanceDETECT can be accessed by visiting http://my.cylance.com.

About Cylance, Inc.

Cylance, Inc. is a global provider of cybersecurity products and services that is changing the way companies, governments and end users proactively solve the world's most difficult security problems. Through a holistic security process called Presponse&trade, a philosophical, practical and cyclical approach, Cylance couples the understanding of a hacker's mentality with algorithmic intelligence and technology to be truly predictive and preventive against advanced threats. Powered by a global user community and an elite team of security experts, Cylance is solving very large and complex problems simply and elegantly. For more information, visit www.cylance.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-20
A CWE-200: Information Exposure vulnerability exists in Modicon Controllers (M340 CPUs, M340 communication modules, Premium CPUs, Premium communication modules, Quantum CPUs, Quantum communication modules - see security notification for specific versions), which could cause the disclosure of FTP har...
PUBLISHED: 2019-11-20
A CWE-79: Failure to Preserve Web Page Structure vulnerability exists in Andover Continuum (models 9680, 5740 and 5720, bCX4040, bCX9640, 9900, 9940, 9924 and 9702) , which could enable a successful Cross-site Scripting (XSS attack) when using the products web server.
PUBLISHED: 2019-11-20
Cross-site Scripting (XSS) in Dolibarr ERP/CRM 3.3.1 allows remote attackers to inject arbitrary web script or HTML in functions.lib.php.
PUBLISHED: 2019-11-20
Dolibarr ERP/CRM 3.3.1 does not properly validate user input in viewimage.php and barcode.lib.php which allows remote attackers to execute arbitrary commands.
PUBLISHED: 2019-11-20
The snprintf implementation in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 does not properly handle system-call errors, which allows attackers to obtain sensitive information or have other unspecified impact via unknown vectors, as d...