Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

06:59 PM
Dark Reading
Dark Reading
Products and Releases

Cylance Announces Free Endpoint Technology

CylanceDETECT now ready for broad beta consumption

IRVINE, CA--(Marketwired - Jun 26, 2013) - Cylance, Inc., a global cybersecurity, technology and services company applying science to security, today announced that CylanceDETECT for endpoints, the lightest, easiest to use advanced threat detection, is now ready for broad beta consumption as limited time freeware at http://my.cylance.com.

"Cylance's mission is to protect the world from cyber threats and attacks," said Stuart McClure, CEO/President of Cylance. "Our Company's collective experience over the past two and a half decades building security infrastructure recognizes that hackers' advanced threats surpass the detection capabilities of traditional signature-based technologies today. In building our forthcoming Infinity Cloud Advanced Threat Intelligence platform, we are able to detect what has previously been undetectable and want to make this a product that is free to the world."

Cylance's unique technological approach is to apply big math and science to security. Many industries, like high frequency trading, pharmaceutical development and life insurance, have applied mathematical algorithms to calculate large amounts of data into highly accurate groupings, normalizations and abnormalities. Cylance is the first to apply this science to the world of network security. In testing against dozens of the most widely used detection technologies, CylanceDETECT discovers 3-5 times more than other technologies, including the most advanced threats -- the ones never before seen. It is widely known that signature-based technologies like anti-virus are required elements of protection, detecting everyday malware like adware, spyware and potentially unwanted programs (PuPs); however they simply miss too many of the advanced threats. CylanceDETECT complements existing endpoint and network solutions to deliver true advanced detection capabilities to the masses.

A second benefit CylanceDETECT provides is its 'weight.' Most endpoint solutions can be a burden on the computing power and footprint of the endpoint device and only get 'heavier' with each additional signature protection update. This causes PCs to have slow boot up times, drag on regular performance and the burden of updating on a regular basis -- enabling gaps in protection until the next update is applied. CylanceDETECT addresses these issues with an almost non-existent, featherweight, real-time detection. As a browser interface, there is no burden on the endpoint and advanced threat detection can be seen from any web browser -- whether on that device or not.

The third benefit CylanceDETECT provides is derived from social sharing. Through a 'community or herd immunity' model, users of CylanceDETECT can add family, friends and associates to their circle and help identify who might have bad elements on their machine. For every bad item found on one machine, the intelligence populates our advanced threat database in real-time for the protection of everyone. In this way, the more people who use it, the better the detection gets. With the mission to protect the world from cyber hacks and attacks, the planet of computer users who implement CylanceDETECT will significantly progress towards reducing a hacker's current ease of breaking into networks and endpoints.

Cylance's approach to security protection is called Presponse. This is a philosophical, practical and cyclical manner of understanding a hacker's mentality and coupling algorithmic intelligence with technology to be truly predictive and preventive against advanced threats. Through this approach, organizations can understand how they could be compromised before a breach occurs and help recover after an attack, therefore preventing incidents before business is affected.

"Security is an industry full of new threats, problems and vulnerabilities, but you hear little in the way of new forms of defense," said Patrick Heim, Chief Trust Officer with Salesforce.com. "Cylance is not satisfied with the current model nor waiting for a 'successful' attack to diagnose a cure. Their initiative to bring to market a free advanced threat detection product for the greater good is admirable and highly beneficial in the fight against hackers and attackers for both individuals and organizations."

CylanceDETECT can be accessed by visiting http://my.cylance.com.

About Cylance, Inc.

Cylance, Inc. is a global provider of cybersecurity products and services that is changing the way companies, governments and end users proactively solve the world's most difficult security problems. Through a holistic security process called Presponse&trade, a philosophical, practical and cyclical approach, Cylance couples the understanding of a hacker's mentality with algorithmic intelligence and technology to be truly predictive and preventive against advanced threats. Powered by a global user community and an elite team of security experts, Cylance is solving very large and complex problems simply and elegantly. For more information, visit www.cylance.com.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-12
The ALPS ALPINE touchpad driver before 8.2206.1717.634, as used on various Dell, HP, and Lenovo laptops, allows attackers to conduct Path Disclosure attacks via a "fake" DLL file.
PUBLISHED: 2020-08-12
Sonatype Nexus Repository Manager OSS/Pro before 3.26.0 has Incorrect Access Control.
PUBLISHED: 2020-08-12
search.php in the Nova Lite theme before 1.3.9 for WordPress allows Reflected XSS.
PUBLISHED: 2020-08-12
PHP-Fusion 9.03 allows XSS via the error_log file.
PUBLISHED: 2020-08-12
PHP-Fusion 9.03 allows XSS on the preview page.