IRVINE, CA — (Marketwired) — 08/06/13 — , a global cybersecurity technology and services company applying science to security, today announced the disclosure of its Infinity Advanced Threat Cloud engine. Infinity is the first security technology to deliver a revolutionary new threat classification model that is scientifically founded while providing simplistic and user friendly detection of the most advanced threats in the world.
As current detection solutions rely on signatures, filters, heuristics, behavior, white lists, and policy management, they simply cannot keep up with the advancing threat landscape. The inability of traditional defenses to quickly adapt and react to attacks continues to leave Enterprises and end users frustrated with their traditional defenses. Additionally, with a primary focus on malware, these technologies are incredibly burdensome to install, configure and manage, particularly while keeping up with signature updates. Cylance Infinity Advanced Threat Cloud was created to address a hard fact: the security industry is at a point where traditional defenses simply miss too many threats present in today-s environment.
Advanced threats have quickly become the most apparent flaw in traditional defenses. These attacks use exploits and evasion tactics exposing the most prolific and vulnerable access points into any environment — the endpoints, which have grown exponentially thanks to enterprise mobility and consumerization. Hackers and attackers use malware, but often employ all kinds of access rights, rootkits, and other binaries naturally resident on the endpoint that, while legitimate, may be used for bad purposes. Cylance Infinity is a cloud based, non-signature, non-heuristic and non-behavioral engine that detects and blocks these attacks through advanced mathematical analysis and machine learning of activity and attributes — identifying good from bad and allowing employees to work without overbearing restrictions.
Here-s a look at the technology powering Cylance-s Infinity Cloud engine:
– Identifying the “bad” requires going beyond looking for modern malware to identifying advanced threats by -interrogating- the data and device and forces classification of what-s good and bad. Cylance is the first to apply existing principles of algorithmic science used today in high frequency trading, insurance and pharmaceuticals to the world of security. Unlike traditional security products, Infinity has the intelligence to attribute features of disparate objects and never before seen elements into data that qualifies that element to a threat or non-threat to an accuracy greater than what exists today.
– Created for enterprise Incident Response and Forensics teams as well as IT departments, Cylance V takes the tedium out of tracking down infected computers and determining which machines are compromised. Cylance V-Forensics empowers anyone to automatically and quickly discover and detect all compromised endpoints while beginning forensic analysis — reporting -bad- advanced threats determining what is truly -good- and removing the labor intensive, time consuming and inexact nature of forensics.
– Helpdesk and Managed Security Services organizations often use a variety of -heavyweight- asset inventory and configuration tools to help them remotely detect a compromise as well as diagnose issues on endpoints. By their nature and design, these tools do not detect or address advanced threats. The deployment of Cylance V-Helpdesk powers real-time detection and provides quick diagnosis to pinpoint the need for deeper forensic analysis and determine appropriate corrective action on enterprise endpoints.
– 3rd party technology and partner integrations utilize the Cylance V-APIs to harness the power of Cylance-s Infinity Advanced Threat Cloud for heightened accuracy and visibility into threat environments. Security Operations Centers (SOC) often need integration into outside systems to provide quick context to alerts received, providing the details needed to determine a legitimate incident or attack versus a phantom or Red Herring. Cylance V-API allows any SOC to harness the power of Cylance-s Infinity Advanced Threat Cloud to instantly determine whether a case needs to be opened and processed, saving thousands of dollars every year.
Cylance released its first productization of Infinity in June 2013 with its launch of the free, public use beta of . This consumer grade endpoint offering uses Infinity to detect and quarantine advanced threats and elements considered -bad- in real time. It supplements existing anti-virus to provide unparalleled security on the endpoint.
“Just looking for malware in today-s advanced threat environment is not sufficient,” said Patrick Heim, Chief Trust Officer at Salesforce.com. “We know the bad guys have worked around enterprise infrastructure using many different modes of attack. The real impact and cost to us is reducing the noise, getting specific on the exploited endpoints and taking corrective action.”
When Cylance V is used in combination with , information security-s easiest evidence collection software, advanced threats can be captured anywhere, by anyone regardless of technical background.
“The security industry has been littered with antiquated solutions to the same problems. With this technology, we provide a truly revolutionary form of defense,” said Stuart McClure, Cylance CEO. “I-m excited to bring our new mathematical mindset to the security market and help customers protect themselves and respond to incidents like never before.”
Cylance, Inc. is a global provider of cybersecurity products and services that is changing the way companies, governments and end users proactively solve the world-s most difficult security problems. Through a holistic security process called Presponse, a philosophical, practical and cyclical approach, Cylance couples the understanding of a hacker-s mentality with algorithmic intelligence and technology to be truly predictive and preventive against advanced threats. Powered by a global user community and an elite team of security experts, Cylance is solving very large and complex problems simply and elegantly. For more information, visit .
SHIFT Communications
Mike Fearon
617-779-1807
You must be logged in to post a comment Login