Story image

Unisys teams up with Cylance to offer managed security services with endpoint protection

29 Mar 18

Unisys and Cylance have teamed up to launch managed security services and endpoint protection for enterprises around the globe.

The new security offering, called Unisys Advanced Endpoint Protection Solution, combines Unisys consulting and managed security services with Cylance’s advanced threat protection technology.

According to Unisys Security Solutions vice president Jonathan Goldberger, the combination of technologies is designed to help organisations move from legacy antivirus protection to one that addresses modern cyber threats.

Goldberger believes that this is the method by which organisations can operationalise their endpoint security.

“When we operationalise security, we help our clients focus on maximising the value from their technology investments,” he says.

“In teaming with Cylance, we help clients leverage AI and machine learning on their endpoint, as well as automation of management activities. Clients experience more effective security operations by optimising the use of leading technologies and minimising human error.”

Unisys consultants first conduct an initial assessment to discover any undetected endpoint security issues in an organisation’s network, and then they create a deployment plan based on their findings.

After the plan is deployed, Unisys managed security services team starts 24x7 environment monitoring. They are able to identify potential issues as they occur and begin investigation with the client.

The added Cylance advanced threat protection technology allows organisations to apply artificial intelligence and machine learning, which prevent malware attacks and advanced persistent threats on their endpoints.

The new offering is part of an entire portfolio of consulting, products and managed security services.

The company says its solutions provide protection for the entire security lifecycle, from prediction and prevention to remediation.

Unisys Stealth is an example. It is micro segmentation software that allows organisations to dynamically conceal critical assets and create virtual security perimeters.

Unisys offerings include security software and services; digital transformation and workplace services; industry applications and services; and innovative software operating environments for high-intensity enterprise computing. 

Cylance has also been busy gaining traction in the endpoint security space. In January the company announced it had pulled in more than US$100 million revenue in 2017 from more than 3800 enterprise customers.

"At Cylance, we’ve always encouraged our customers to think beyond legacy solutions, to reduce complexity and lower security costs," commented Stuart McClure, Chairman and CEO of Cylance.

In March, Cylance added three new members to its board of directors. The company also announced a partnership with VMware to support the Workspace ONE Trust Network.

How to stay safe when shopping online
Online shopping is a great way to avoid the crowds – but there are risks.
Dell EMC embeds security in latest servers
Dell EMC's 14th generation of PowerEdge servers has comprehensive management tools to provide security across hardware and firmware.
Why data backups should be a part of daily operations
"Disaster recovery needs to address complete system failure and provide a set of security policies to govern disaster incidents."
Businesses focusing on threats from within - survey
Over 50% of respondents reported that 100 days of dwell time or more was representative of their organisation.
Corelight and Exabeam partner to improve network monitoring
The combination of lateral movement and siloed usage of point security products leaves many security teams vulnerable to compromise.
SailPoint releases first identity annual report
SailPoint’s research found that many organisations are lacking maturity in their governance processes over identities.
Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.