CylancePROTECT takes new approach to malware defense

Cylance rejects the traditional signatures, heuristics, sandboxing, whitelists, and other malware defenses in favor of a unique, proactive approach.

Remember when you were in trigonometry in high school, and you thought—or possibly stated emphatically for all to hear—“Why do I need to know this stuff? I’m never going to use it in the real world!”? Well, it turns out that younger you was wrong on many levels about just how much math you use on a day-to-day basis. Cylance is applying math in a whole new way, though, to proactively guard networks and endpoints against exploits and malware attacks.

The traditional model of security has been in a state of détente with malware for some time. It does an adequate job of defending against known threats, but it relies almost entirely on a reactionary model where the attackers get the first move, and then security vendors scramble to develop a way to detect and block the new threat. It’s better than nothing, but in many ways the traditional approach has reached the limits of what it can do. It’s time for a new way that can address threats more proactively and give businesses and consumers an advantage over the attackers.

Stuart McClure—founder or Cylance, co-author of Hacking Exposed, and former CTO of McAfee—has been in the trenches dealing with threats and exploits long enough to recognize that there must be a better way. The mathematical approach used by CylancePROTECT involves patent-pending machine learning techniques designed to identify and defend against threats before they happen.

“The fundamental flaw in today’s cybersecurity infrastructure is that protection requires detection, and detection requires a patient zero,” said Stuart McClure, Cylance founder and CEO. “Human-generated signatures, based primarily on previously discovered samples, have failed to solve the problem as zero-day threats continue to operate silently and unimpeded.”

According to internal testing conducted by Cylance, the mathematical algorithms yield a 500-fold improvement in the detection of both good and bad data, and resulted in stopping 100 percent of the threats discovered.

“Attacks keep evolving, bypassing all kinds of traditional security technologies," said Richard Stiennon, chief research analyst at IT-Harvest. "The market is ripe for a revolutionary new solution to securing the endpoint. Cylance’s approach is the most exciting innovation in endpoint security I have seen."

CylancePROTECT is a very small client that consumes few resources. It won’t slow your system down, or bother you with pop-up alerts, and it can function side-by-side with your existing antimalware solution. Because the protection in CylancePROTECT is based on a mathematical algorithm, it is always “up to date”, and you don’t have to concern yourself with making sure you’ve applied the latest signature files.

Maybe you should start putting that silly math stuff to some good use, and take a look at how CylancePROTECT might be able to help you protect your network and endpoints against malware threats and zero day exploits more effectively.

Copyright © 2014 IDG Communications, Inc.

The 10 most powerful cybersecurity companies