SlideShare a Scribd company logo
Next Generation ANTIVIRUS
CylancePROTECT
The current, outdated approach of blacklisting relies almost entirely on using signatures and simplistic
behavioral information to detect attacks. This worked for a while as the costs for attackers and defenders
to respond to each other were at parity. As the bad guys added new tricks, defenders adapted and
evolved, forcing attackers to innovate further. The attackers now have the advantage. The sheer number
of threats is exploding exponentially, with large numbers of new threats appearing daily. Always-on,
always-connected devices provide new, fertile ground for attacks. Improvements in defense are met
with swift, advanced responses – to the point where adversaries are gaining a significant advantage.
The cost for attackers is far lower than for defenders, due to outdated detection and response strategies.
Traditional methods are failing.
Automated static code analysis – Dormant and non-active code should be analyzed by its core DNA,
or characteristics. These characteristics can be as basic as the PE file size or the compiler used, or as
complex as a review of the first logic leap in the binary. Cylance extracts millions of unique characteristics
from potentially hazardous files and applies machine analysis to determine their intention.
Execution control – Detection of bad, abnormal and good files should be coupled with the ability to
control the object in real-time. Rather than relying on hash comparison or post-run behavior heuristics
to determine what to do, Cylance evaluates objects in less than 100 milliseconds. This allows the agent
to prevent execution if it the object is determined to be malicious.
No daily updates – A key weakness of traditional security solutions that rely on whitelisting and
blacklisting is the need to retain vast databases of hashes, other signatures of known malware or
approved applications. CylancePROTECT is a sophisticated agent that makes decisions in real-time by
classifying an object’s characteristics against optimally trained statistical models. Those models are
updated every few months, but retain effectiveness for much longer. There is no need to constantly
download new file signatures and worry that detection doesn’t flag when you miss a day’s worth of
updates.
The cybersecurity industry is wrought with change, yet the fundamentals of malware detection have
remained the same for more than three decades. In the face of constant innovation from attackers,
antivirus vendors continue to focus on aging technologies that use “signatures” and post-attack behavior
heuristics to protect computers. AV is dead because those techniques do not work. A new approach is
required.
Algorithmic science and machine learning can fundamentally shift the equation, offering new ways
to effectively identify, diagnose, categorize and control the execution of every file. Cylance is leading
this revolution with predictive and preventive products such as CylancePROTECT, which define Next-
Generation Antivirus (NGAV).
Defining NGAV
Key elements of a Next Generation Antivirus include:
+1 (877) 973-3336
sales@cylance.com
www.cylance.com
46 Discovery, #200 Irvine, CA 92618 USA
No connectivity requirements – Many traditional security solutions rely heavily on the cloud to
supplement their protective capacity. While internet access is often available, piping vast amounts of
information to a vendor is not always possible. CylancePROTECT can operate autonomously, classifying
threats using its entirely disconnected engine. Being able to autonomously make the correct decisions is
imperativeforsituationssuchasair-gappednetworksusedinindustrialcontrolsystems,low-bandwidth
networks used by retail point-of-sales systems, branch offices and remote employees.
Non-disruptive – The appropriate protection architecture should be invisible to users as well as simple
to deploy and administer. The CylancePROTECT agent is only 30 megabytes and typically uses less than
1 percent of CPU. It is easily deployed with common distribution tools and offers browser-based alerting
and policy management.
Contextual visibility – In addition to predictive, proactive detection and blocking, Next-Generation
Antivirus should collect data that provides the full context of attacks for analyst and incident response
intelligence. The Cylance management console provides pre-execution insight and detonation
intelligence from dynamic analysis.
Some vendors already claim to offer Next-Generation Antivirus technology. Yet CylancePROTECT is the
first and only product that is both highly effective in blocking threats and has a low impact on users.
NGAV must offer both to satisfy the requirements of a “next new” that imparts better detection and
protection while seamlessly fitting into normal company operations.
Given that it’s taken 30 years to roll out the current AV solutions, a NGAV needs to either be able to
significantly enhance current endpoint security or replace it entirely.
Cylance consulting services’ mission is to empower corporate IT to better protect their organization by
helping reduce the attack surface. Vulnerability and penetration testing establish a baseline security
posture. A compromise assessment determines the who, what, when and how of a successful attack
and provides best practices for remediation. Our incident response and customized services fix problems
much faster and in a less intrusive manner than alternative approaches.
Cylance is the first company to apply artificial intelligence, algorithmic science and machine learning to
cyber security and improve the way companies, governments and end users proactively solve the world’s
most difficult security problems. Using a breakthrough predictive analysis process, Cylance quickly and
accurately identifies what is safe and what is a threat, not just what is in a blacklist or whitelist. By
coupling sophisticated math and machine learning with a unique understanding of a hacker’s mentality,
Cylance provides the technology and services to be truly predictive and preventive against advanced
threats. For more information, visit cylance.com
Cylance Professional Services
About Cylance:

More Related Content

What's hot

Building A Security Operations Center
Building A Security Operations CenterBuilding A Security Operations Center
Building A Security Operations Center
Siemplify
 
CIO Review 2016-AUG SentinelOne
CIO Review 2016-AUG SentinelOneCIO Review 2016-AUG SentinelOne
CIO Review 2016-AUG SentinelOne
Sean Roth
 
SentinelOne Buyers Guide
SentinelOne Buyers GuideSentinelOne Buyers Guide
SentinelOne Buyers Guide
Exclusive Networks ME
 
Reveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet ENReveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet EN
ITrust - Cybersecurity as a Service
 
ThreatAlytics Compliance Monitoring CADSI 23 Nov_rev3
ThreatAlytics Compliance Monitoring CADSI 23 Nov_rev3ThreatAlytics Compliance Monitoring CADSI 23 Nov_rev3
ThreatAlytics Compliance Monitoring CADSI 23 Nov_rev3
Edward Johnson
 
SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016
Sarah Bark
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
ReZa AdineH
 
Make IR Effective with Risk Evaluation and Reporting
Make IR Effective with Risk Evaluation and ReportingMake IR Effective with Risk Evaluation and Reporting
Make IR Effective with Risk Evaluation and Reporting
Priyanka Aash
 
Cisco - See Everything, Secure Everything
Cisco - See Everything, Secure EverythingCisco - See Everything, Secure Everything
Cisco - See Everything, Secure Everything
Redington Value Distribution
 
Alien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligenceAlien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligence
AlienVault
 
The New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Netw...
The New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Netw...The New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Netw...
The New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Netw...
Digital Transformation EXPO Event Series
 
Exploring the Capabilities and Economics of Cybercrime
Exploring the Capabilities and Economics of CybercrimeExploring the Capabilities and Economics of Cybercrime
Exploring the Capabilities and Economics of Cybercrime
Cylance
 
APT Monitoring and Compliance
APT Monitoring and ComplianceAPT Monitoring and Compliance
APT Monitoring and Compliance
Marcus Clarke
 
Introduction to MicroSolved, Inc.
Introduction to MicroSolved, Inc.Introduction to MicroSolved, Inc.
Introduction to MicroSolved, Inc.
MRMaguire
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
Cisco Security
 
Challenges of Vulnerability Management
 Challenges of Vulnerability Management Challenges of Vulnerability Management
Challenges of Vulnerability Management
Rahul Neel Mani
 
what is security
what is securitywhat is security
what is security
Dedi Dwianto
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
Lionel Medina
 
Data mining in Cyber security
Data mining in Cyber securityData mining in Cyber security
Data mining in Cyber security
PsychoCryGaming
 

What's hot (19)

Building A Security Operations Center
Building A Security Operations CenterBuilding A Security Operations Center
Building A Security Operations Center
 
CIO Review 2016-AUG SentinelOne
CIO Review 2016-AUG SentinelOneCIO Review 2016-AUG SentinelOne
CIO Review 2016-AUG SentinelOne
 
SentinelOne Buyers Guide
SentinelOne Buyers GuideSentinelOne Buyers Guide
SentinelOne Buyers Guide
 
Reveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet ENReveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet EN
 
ThreatAlytics Compliance Monitoring CADSI 23 Nov_rev3
ThreatAlytics Compliance Monitoring CADSI 23 Nov_rev3ThreatAlytics Compliance Monitoring CADSI 23 Nov_rev3
ThreatAlytics Compliance Monitoring CADSI 23 Nov_rev3
 
SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Make IR Effective with Risk Evaluation and Reporting
Make IR Effective with Risk Evaluation and ReportingMake IR Effective with Risk Evaluation and Reporting
Make IR Effective with Risk Evaluation and Reporting
 
Cisco - See Everything, Secure Everything
Cisco - See Everything, Secure EverythingCisco - See Everything, Secure Everything
Cisco - See Everything, Secure Everything
 
Alien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligenceAlien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligence
 
The New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Netw...
The New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Netw...The New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Netw...
The New Era of Cyber-Threats: The Shift to Self Learning, Self Defending Netw...
 
Exploring the Capabilities and Economics of Cybercrime
Exploring the Capabilities and Economics of CybercrimeExploring the Capabilities and Economics of Cybercrime
Exploring the Capabilities and Economics of Cybercrime
 
APT Monitoring and Compliance
APT Monitoring and ComplianceAPT Monitoring and Compliance
APT Monitoring and Compliance
 
Introduction to MicroSolved, Inc.
Introduction to MicroSolved, Inc.Introduction to MicroSolved, Inc.
Introduction to MicroSolved, Inc.
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
 
Challenges of Vulnerability Management
 Challenges of Vulnerability Management Challenges of Vulnerability Management
Challenges of Vulnerability Management
 
what is security
what is securitywhat is security
what is security
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
 
Data mining in Cyber security
Data mining in Cyber securityData mining in Cyber security
Data mining in Cyber security
 

Similar to Cylance_Protect_Datasheet

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
 
Global ransomware attacks_2017_final msw_g2_sg
Global ransomware attacks_2017_final msw_g2_sgGlobal ransomware attacks_2017_final msw_g2_sg
Global ransomware attacks_2017_final msw_g2_sg
Christopher R. Ward
 
Global Ransomware Client Alert
Global Ransomware Client AlertGlobal Ransomware Client Alert
Global Ransomware Client Alert
Robyn Melnyk
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in ai
SrajalTiwari1
 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdf
forladies
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
Blueliv
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
Blueliv
 
CROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martinCROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martin
David X Martin
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
Ricardo Resnik
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
Frederic Roy-Gobeil, CPA, CGA, M.Tax.
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
Sandip Juthani
 
Global Ransomware Attacks
Global Ransomware AttacksGlobal Ransomware Attacks
Global Ransomware Attacks
Emily Brown
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
wkyra78
 
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016
Janghyuck Choi
 
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdfElevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
SecurityGen1
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
RuchikaSachdeva4
 
Advanced Endpoint Protection
Advanced Endpoint ProtectionAdvanced Endpoint Protection
Advanced Endpoint Protection
Mustafa YÜKSEL
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
Ulf Mattsson
 
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfHow Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
Webtrills1
 
Telecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGenTelecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGen
SecurityGen1
 

Similar to Cylance_Protect_Datasheet (20)

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Global ransomware attacks_2017_final msw_g2_sg
Global ransomware attacks_2017_final msw_g2_sgGlobal ransomware attacks_2017_final msw_g2_sg
Global ransomware attacks_2017_final msw_g2_sg
 
Global Ransomware Client Alert
Global Ransomware Client AlertGlobal Ransomware Client Alert
Global Ransomware Client Alert
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in ai
 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdf
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017Blueliv Corporate Brochure 2017
Blueliv Corporate Brochure 2017
 
CROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martinCROs must be part of the cybersecurity solution by david x martin
CROs must be part of the cybersecurity solution by david x martin
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Global Ransomware Attacks
Global Ransomware AttacksGlobal Ransomware Attacks
Global Ransomware Attacks
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016
 
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdfElevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
Advanced Endpoint Protection
Advanced Endpoint ProtectionAdvanced Endpoint Protection
Advanced Endpoint Protection
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdfHow Modern Cybersecurity Software Shields Against the Latest Threats.pdf
How Modern Cybersecurity Software Shields Against the Latest Threats.pdf
 
Telecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGenTelecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGen
 

Cylance_Protect_Datasheet

  • 1. Next Generation ANTIVIRUS CylancePROTECT The current, outdated approach of blacklisting relies almost entirely on using signatures and simplistic behavioral information to detect attacks. This worked for a while as the costs for attackers and defenders to respond to each other were at parity. As the bad guys added new tricks, defenders adapted and evolved, forcing attackers to innovate further. The attackers now have the advantage. The sheer number of threats is exploding exponentially, with large numbers of new threats appearing daily. Always-on, always-connected devices provide new, fertile ground for attacks. Improvements in defense are met with swift, advanced responses – to the point where adversaries are gaining a significant advantage. The cost for attackers is far lower than for defenders, due to outdated detection and response strategies. Traditional methods are failing. Automated static code analysis – Dormant and non-active code should be analyzed by its core DNA, or characteristics. These characteristics can be as basic as the PE file size or the compiler used, or as complex as a review of the first logic leap in the binary. Cylance extracts millions of unique characteristics from potentially hazardous files and applies machine analysis to determine their intention. Execution control – Detection of bad, abnormal and good files should be coupled with the ability to control the object in real-time. Rather than relying on hash comparison or post-run behavior heuristics to determine what to do, Cylance evaluates objects in less than 100 milliseconds. This allows the agent to prevent execution if it the object is determined to be malicious. No daily updates – A key weakness of traditional security solutions that rely on whitelisting and blacklisting is the need to retain vast databases of hashes, other signatures of known malware or approved applications. CylancePROTECT is a sophisticated agent that makes decisions in real-time by classifying an object’s characteristics against optimally trained statistical models. Those models are updated every few months, but retain effectiveness for much longer. There is no need to constantly download new file signatures and worry that detection doesn’t flag when you miss a day’s worth of updates. The cybersecurity industry is wrought with change, yet the fundamentals of malware detection have remained the same for more than three decades. In the face of constant innovation from attackers, antivirus vendors continue to focus on aging technologies that use “signatures” and post-attack behavior heuristics to protect computers. AV is dead because those techniques do not work. A new approach is required. Algorithmic science and machine learning can fundamentally shift the equation, offering new ways to effectively identify, diagnose, categorize and control the execution of every file. Cylance is leading this revolution with predictive and preventive products such as CylancePROTECT, which define Next- Generation Antivirus (NGAV). Defining NGAV Key elements of a Next Generation Antivirus include:
  • 2. +1 (877) 973-3336 sales@cylance.com www.cylance.com 46 Discovery, #200 Irvine, CA 92618 USA No connectivity requirements – Many traditional security solutions rely heavily on the cloud to supplement their protective capacity. While internet access is often available, piping vast amounts of information to a vendor is not always possible. CylancePROTECT can operate autonomously, classifying threats using its entirely disconnected engine. Being able to autonomously make the correct decisions is imperativeforsituationssuchasair-gappednetworksusedinindustrialcontrolsystems,low-bandwidth networks used by retail point-of-sales systems, branch offices and remote employees. Non-disruptive – The appropriate protection architecture should be invisible to users as well as simple to deploy and administer. The CylancePROTECT agent is only 30 megabytes and typically uses less than 1 percent of CPU. It is easily deployed with common distribution tools and offers browser-based alerting and policy management. Contextual visibility – In addition to predictive, proactive detection and blocking, Next-Generation Antivirus should collect data that provides the full context of attacks for analyst and incident response intelligence. The Cylance management console provides pre-execution insight and detonation intelligence from dynamic analysis. Some vendors already claim to offer Next-Generation Antivirus technology. Yet CylancePROTECT is the first and only product that is both highly effective in blocking threats and has a low impact on users. NGAV must offer both to satisfy the requirements of a “next new” that imparts better detection and protection while seamlessly fitting into normal company operations. Given that it’s taken 30 years to roll out the current AV solutions, a NGAV needs to either be able to significantly enhance current endpoint security or replace it entirely. Cylance consulting services’ mission is to empower corporate IT to better protect their organization by helping reduce the attack surface. Vulnerability and penetration testing establish a baseline security posture. A compromise assessment determines the who, what, when and how of a successful attack and provides best practices for remediation. Our incident response and customized services fix problems much faster and in a less intrusive manner than alternative approaches. Cylance is the first company to apply artificial intelligence, algorithmic science and machine learning to cyber security and improve the way companies, governments and end users proactively solve the world’s most difficult security problems. Using a breakthrough predictive analysis process, Cylance quickly and accurately identifies what is safe and what is a threat, not just what is in a blacklist or whitelist. By coupling sophisticated math and machine learning with a unique understanding of a hacker’s mentality, Cylance provides the technology and services to be truly predictive and preventive against advanced threats. For more information, visit cylance.com Cylance Professional Services About Cylance: