The Latest in IT Security

Cylance Takes a Mathematical Approach to Solving Malware Problems


Cylance Launches Mathematically-assisted Endpoint Threat Protection

Cylance, a Irvine, California-based company focused on threat detection and prevention solutions, today releasedCylancePROTECT, a new offering that the company says takes a “mathematical and machine learning approach to stop the execution of malware on endpoint computers and mobile devices.”

According to Cylance, its technology applies algorithmic science to security, resulting in a new threat detection model that can determine what is safe and what is a threat in the broadening “grey list” spectrum of unknown data, without the use of traditional means such as signatures, rules, behavior, heuristics, whitelists or sandboxing.

By pairing “sophisticated math and machine learning with an understanding of a hacker’s mentality,” Cylance says it can protect customers against new malware, bots and unknown future variants.

“The fundamental flaw in today’s cybersecurity infrastructure is that detection happens before prevention,” said Stuart McClure, Cylance founder and CEO. “Human-generated signatures, based primarily on previously discovered samples, have failed to solve the problem as zero-day malware continues to operate silently and unimpeded.”

While the company does say that traditional security solutions are not effective enough, CylancePROTECT is designed to complement existing endpoint security products.

“Its value is to eliminate the concern for unknown and advanced threats, often missed by the other solutions,” the company explained.

CylancePROTECT’s “agent” sits on top of current security solutions and integrates with existing management software such as like McAfee ePO, the company said. Additionally, the product incorporates memory protection and execution control through kernel modules to address advanced non-resident-based threat tactics, including injection and hijacking techniques, overflows and in-memory execution techniques.

More information on CylancePROTECT is available online.


Managing Editor, SecurityWeek.Previous Columns by Mike Lennon:Belkin: Security Fixes Were Already Issued for Recent WeMo VulnerabilitiesCylance Takes a Mathematical Approach to Solving Malware Problems Shodan Adds Visual Search Results With Shodan MapsIOActive: Belkins WeMo Home Automation Devices Open Doors for AttackersGoogle Acquires Authentication-by-Sound Startup SlickLogin

sponsored links

Tags: Desktop Security


Virus Malware


Comments are closed.



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments