CylancePROTECT: Endpoint security redefined

What is it?

CylancePROTECT is an integrated threat prevention solution that combines the power of artificial intelligence (AI) to block malware infections with additional security controls that safeguard against script-based, fileless, memory and external device-based attacks.

Unlike traditional endpoint security products that rely on signatures and behaviour analysis to detect threats in the environment, CylancePROTECT:

  • Uses AI to identify and block known and unknown malware from running on endpoints
  • Delivers prevention against common and unknown (zero-day) threats without a cloud connection
  • Continuously protects the endpoint without disrupting the end-user.

Why should you care?

Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints. Meanwhile, the cybersecurity industry is prolific with ‘defence in depth’ security that does not provide adequate protection against all the threats that exist today.

Cylance is revolutionising cybersecurity with products and services that proactively prevent the execution of advanced persistent threats and malware at the endpoint.

Their approach to redefining endpoint security is proactive and preventive, rather than reactive. They are using a different, innovative method of using real-time, mathematical, and machine learning threat analysis to solve this problem for organisations, governments and end users worldwide.

How does it work?

Traditional anti-virus relies on the malware files having a signature assigned to it, which means it has to have been seen before.

CylancePROTECT uses AI and its complex ML mathematical model that has been trained on trillions of good and bad file samples to accurately predict unseen and therefore unknown malicious files and stop them before they have had a chance to execute.

This approach renders new malware, viruses, bots and future variants useless.

Differentiation in the market

  • Unbeatable detection: Only an AI approach can predict, identify and prevent both known and unknown cyber threats from executing or causing harm to endpoints. On average and in hundreds of tests, CylancePROTECT stops 99% of threats.
  • Low resource usage: CylancePROTECT uses 1-2% CPU with a tiny memory footprint.
  • Easy to manage: Managing CylancePROTECT is easy with its cloud-based management console. With no signature updates or scan schedules needed, CylancePROTECT simply works without worry.
  • No internet required: Unlike other endpoint security vendors that require connection to a cloud to be effective, CylancePROTECT offers threat prevention on the local host without the need for an internet connection.

How do you position and sell it?

Understanding your customers’ business goals and technology requirements is paramount to finding a solution tailored to their needs. Knowing when to position CylancePROTECT will help you win.

Look for these key requirements when positioning CylancePROTECT:

  • AV augmentation/replacement: Cylance has been successful in both augmenting current endpoint security solutions and replacing entire traditional endpoint (AV) security solutions.

Who to target? Prospects whose current antivirus contract is or will soon be up for renewal.

  • Consolidated endpoint security play: Endpoint security has evolved over the decades into a number of reactive technologies to attempt to stay ahead of the constant changing threat landscape. The use of artificial intelligence to protect the endpoint is enabling organizations to reduce their deployed technologies because the effectiveness rate is so superior to traditional signature-based security.

Who to target? Organisations trying to simplify vendor management or that are looking to consolidate technologies, including endpoint security.

  • Endpoint detection and response project play: Security organisations have turned to endpoint detection and response (EDR) because they have submitted to the inevitable – that they will get breached and their existing protection tools don’t work, so they want a tool to help detect and recover quickly.
  • Custom rules for threat detection: Users can now edit the Cylance-curated rules and create their own rules to meet their security needs. They can adjust the parameters of existing rules or create new ones that minimise false positives and provide security analysts with high-fidelity alerts to investigate.
Discover the benefits with Cylance

Earn a 15% discount for approved deal registrations.

For more information

Contact your Arrow salesperson or submit your details to start a conversation.

Meet the author

Mark Rooney
Arrow Sales Engineer

Mark Rooney has spent the past decade at Arrow working as a certified engineer, specialising across telecommunications and security. As a pre-sales engineer, Mark works closely with partners and customers to design and deploy security solutions that meet their business needs.

Arrow ECS ANZ Blog - Industry Insights

Read Now