sb-eu logo
Story image

Cylance makes APIs available in endpoint detection offering

10 Dec 2018

Security solutions provider Cylance has announced the availability of application programming interfaces (APIs) as part of its endpoint detect and respond offering, CylanceOPTICS.

CylancePROTECT and OPTICS customers can automate repeatable tasks and have the improved ability to identify and respond to advanced threats without an increase in headcount or process complexity.

Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.

CylanceOPTICS exposes field-tested artificial intelligence to detect and prevent advanced threats, enabling organisations to use automated analyses to disrupt attackers across their environments.

It also builds the policies for device control and memory exploitation protection that prevent attacks from executing in the network.

“Data captured at the endpoint is important to many teams across the enterprise,” Cylance product marketing vice president Sasi Murthy.

”By making that data accessible in real time, we can absolutely improve threat visibility, but we can also improve an organisation’s ability to drive policy compliance, monitor device health, and maintain situational awareness across their vast and changing IT environments.”

The availability of APIs allows CylanceOPTICS to creating automated workflows to generate helpdesk tickets, initiate data collection, quarantine files, or launch other tasks in real time.

Organisations gain flexibility in their security stack because of the interoperability with existing technology investments such as security orchestration, automation, response (SOAR) and security information and event management (SIEM) tools.

Users of the Cylance next-generation AI platform have the ability to correlate endpoint data against known and prospective threats, which provides increased understanding of the attack surface.

Security teams also benefit from the speed and accuracy of bringing new devices online and implementing changes across their ecosystems on the fly.

Last month, Cylance was acquired by BlackBerry for US1.4billion for its AI and cybersecurity capabilities, with the deal expected to close before February 2019.  

BlackBerry executive chairman and CEO John Chen said that Cylance’s leadership in artificial intelligence and cybersecurity will immediately complement its entire portfolio, UEMand QNX in particular.

Cylance will continue to operate as a separate business unit within BlackBerry.

Cylance has worked on creating strategic partnerships this year, including with Unisys, KPMG, and Securonix, to deliver its services on more platforms.

Story image
Bitglass receives US patent for SAML technology
Bitglass designed its SAML relay to allow a cloud access security broker (CASB) to be inserted into the traffic flow between users and cloud services during the login process.More
Story image
Why it’s essential to re-write IT security for the cloud era
Key components of network security architecture for the cloud era should be built from the ground up, as opposed to being bolted on to legacy solutions built for organisations functioning only on-premises or from only managed devices.More
Story image
Gartner: By 2023, 65% of the world will have personal data covered under modern privacy regulations
“Security and risk management (SRM) leaders need to help their organisation adapt their personal data handling practices without exposing the business to loss."More
Story image
Cryptomining trojan malware discovered by ESET researchers
The malware, primarily targeting victims in Czechia and Slovakia, prioritises subterfuge through deployment of multiple techniques to avoid detection, and leans heavily on the Tor network and BitTorrent protocol to achieve its goals.More
Story image
Proofpoint and CyberArk extend partnership to further safeguard high-risk users
“Our CyberArk partnership extension provides security teams with increased detection and enhanced adaptive controls to help prevent today’s most severe threats."More
Story image
Ripple20 threat could affect 35% of all IT environments – ExtraHop
The vulnerabilities have the potential to ‘ripple’ through complex software supply chains, enabling attackers to steal data or execute code.More