The Latest in IT Security

Cylance Takes a Mathematical Approach to Solving Malware Problems

19
Feb
2014

Cylance Launches Mathematically-assisted Endpoint Threat Protection

Cylance, a Irvine, California-based company focused on threat detection and prevention solutions, today releasedCylancePROTECT, a new offering that the company says takes a “mathematical and machine learning approach to stop the execution of malware on endpoint computers and mobile devices.”

According to Cylance, its technology applies algorithmic science to security, resulting in a new threat detection model that can determine what is safe and what is a threat in the broadening “grey list” spectrum of unknown data, without the use of traditional means such as signatures, rules, behavior, heuristics, whitelists or sandboxing.

By pairing “sophisticated math and machine learning with an understanding of a hacker’s mentality,” Cylance says it can protect customers against new malware, bots and unknown future variants.

“The fundamental flaw in today’s cybersecurity infrastructure is that detection happens before prevention,” said Stuart McClure, Cylance founder and CEO. “Human-generated signatures, based primarily on previously discovered samples, have failed to solve the problem as zero-day malware continues to operate silently and unimpeded.”

While the company does say that traditional security solutions are not effective enough, CylancePROTECT is designed to complement existing endpoint security products.

“Its value is to eliminate the concern for unknown and advanced threats, often missed by the other solutions,” the company explained.

CylancePROTECT’s “agent” sits on top of current security solutions and integrates with existing management software such as like McAfee ePO, the company said. Additionally, the product incorporates memory protection and execution control through kernel modules to address advanced non-resident-based threat tactics, including injection and hijacking techniques, overflows and in-memory execution techniques.

More information on CylancePROTECT is available online.

Tweet

Managing Editor, SecurityWeek.Previous Columns by Mike Lennon:Belkin: Security Fixes Were Already Issued for Recent WeMo VulnerabilitiesCylance Takes a Mathematical Approach to Solving Malware Problems Shodan Adds Visual Search Results With Shodan MapsIOActive: Belkins WeMo Home Automation Devices Open Doors for AttackersGoogle Acquires Authentication-by-Sound Startup SlickLogin

sponsored links

Tags: Desktop Security

NEWS INDUSTRY

Virus Malware

Malware

Comments are closed.

Categories

SUNDAY, NOVEMBER 29, 2020
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments