Cylance Cyber Security in Enterprise Presentation
-
Upload
paul-sweeney -
Category
Technology
-
view
1.711 -
download
5
Transcript of Cylance Cyber Security in Enterprise Presentation
Artificial Intelligence.Real Threat Prevention.
Cylance, Inc. Confidential
Mission: Protect Every Computer on the Planet
600+ Customers. 4,500,000+ Endpoints Awards
Investors
Cylance, Inc. Confidential
2016 Gartner Endpoint Protection Platforms Magic Quadrant
• The Visionary Quadrant Leader• “Cylance is easily the fastest
growing EPP startup in the last ten years.”
• The Cylance machine-learning algorithm has been demonstrated to be very accurate at detecting new variants and repacked versions of existing malware.
• Cylance will appeal to organizations looking for improved zero day malware protection, those looking for low impact protection for resource constrained platforms, and systems that are disconnected and cannot rely on regular signature updates.
Cylance, Inc. Confidential
• AV Engines - Signatures Can’t Keep Up• “Next Gen” is Really Detect & Respond• Humans are Required• Mutations are the Rule not the Exception• Heavy, Impact People, Impact Computers
Several Reasons Other Approaches are Broken
Cylance, Inc. Confidential
Efficacy = Prevention of the Attack
Unbelievable Tour•75 Cities in 2015•10,000+ malware•Over 1000 peoplepublicly viewed
Results•Cylance = 99%•McAfee= 36%•Symantec = 25%•Trend = 18%
Cylance, Inc. Confidential
The Future of Security
Past Present Future
AV SANDBOXING ISOLATIONHIPS / ANTI-X DETECT/RESPOND
Pre-ExecutionHumans Needed Post-Execution Pre-Execution
No Humans
Cylance, Inc. Confidential
Data Science and Machine Learningunlock the DNA ofadvanced threats
The Cure for Malware
Cylance, Inc. Confidential
EXTRACT
COLLECT CLASSIFY& CLUSTER
TRANSFORM,VECTORIZE
& TRAIN
BAD
GOOD
How do we do it? - Its Algorithmic Science & Machine Learning
Cylance, Inc. Confidential
Algorithmic Science•Neural Networks•Random Forests•Decision Trees•Logistic Regression•Support Vector Machines•K-means
Threat Indicators•Anomalies•Collection•Data Loss•Deception•Destruction•Misc
Cylance Cluster, Classify, Context = Malware Identified
Cylance, Inc. Confidential
What is CylancePROTECT ?
© 2015 Cylance, Inc. 10
Advanced Threat PreventionPREdictivePREventionPRE-Execution
Lightweight & Flexible•1-3% CPU / ~40 MB Memory Footprint
Enterprise Ready•Microsoft Approved AV•Windows & Mac OS X•Web-based Console•PCI-DSS Compliant•HIPAA HITECH Compliant
Cylance, Inc. Confidential
Cybersecurity Market Comparison
Isolation
Whitelisting
Detection & Response
Exploit Prevention Antivirus
Cylance, Inc. Confidential
The Difference of CylancePROTECT
12
Rely on Human Classifications
Require Previous Knowledge
Require On-Premise Infrastructure
Require Updates
What We Do:
Analyze Malware at the DNA-Level
No Updates Needed
No Reliance on Human Knowable Indicators
We Do NOT:
Signatures Heuristics Behavioral Analysis
Micro-Virtualization
Sandboxing
99% Threat Prevention
Works offline or online
PREdictive & PREventative
Cylance, Inc. Confidential
• Reduced IT Security needs• AV replacement (& extraneous features)• Less Network security needs
• Reduced Security Operations• Reduced Hunting team• Reduced Investigations• Reduced Legal• Reduced Management distraction
• Reduced Help Desk Calls• Performance complaints• Infection related issues
• Reduced IT operations costs• IT emergency response• Infrastructure costs• Rebuild/re-image costs
Efficiency = Where the Value ResidesLess Obvious Direct Cash Buckets•De-clutter other controls
• Other end point products (Authentication, Encryption, Client Proxy, DLP, etc)
•Extending PC lifecycle• Headroom back due to performance
•Other IT operations costs• EOL’d systems – delayed upgrades• Change patching windows• Servers can be protected • Reduce infrastructure costs due to
less “chattiness” with cloud
Cylance, Inc. Confidential
• Peace of mind • Less chasing• More productivity• Less cost• Better visibility
The Cylance Advantage = Customer Benefits
Thank You.