Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Artificial Intelligence. Real Threat Prevention. Grant Moerschel Director of Sales Engineering We make software that… predicts cyber attacks and blocks them on the endpoint in real-time before they ever execute. • Prevents malware pre-execution • Silences memory attacks, exploits, privilege escalation, fileless attacks • Thwarts unauthorized scripts • Rejects potentially unwanted programs (PUPs) from entering the environment • Uncovers the presence of powerful tools that can be used against you • All without prior knowledge • Protection is not Cloud dependent 2 | © 2015 Cylance, Inc. CylancePROTECT leverages the power of machines, not humans, to dissect malware’s DNA. Artificial intelligence then determines if the code is safe to run. 3 | © 2015 Cylance, Inc. • Approved by Microsoft. We can stand alone or complement what you have. • No signatures / infrequent updates • Ultra light agent footprint • SaaS convenience • Deployment simplicity • Privacy friendly • Mac OS X support 2016 Gartner Endpoint Protection Platforms Magic Quadrant • The Visionary Quadrant Leader • “Cylance is easily the fastest growing EPP startup in the last ten years.” • “The Cylance machine-learning algorithm has been demonstrated to be very accurate at detecting new variants and repacked versions of existing malware.” • “Cylance will appeal to organizations looking for improved zero day malware protection, those looking for low impact protection for resource constrained platforms, and systems that are disconnected and cannot rely on regular signature updates.” 4 | © 2015 Cylance, Inc. Risk vs. Cost Control Types RESPOND Risk Where most of the industry is focused Highest Risk Highest Cost Most Liability DETECT PREVENT Lowest Risk Lowest Cost Limited Liability Automated Cost Semi-Automated Manual Control Approaches 5 Focus is on Minimizing damage – only variables are time to detect and time to contain | © 2015 Cylance, Inc. Source: Upcoming Release of Managing Risk and Information Security 2nd Edition – Malcolm Harkins Focus is on Minimizing vulnerability and potential for harm The Future of Security Present Past Cylance z AV Pre-Execution Humans Needed 6 | © 2015 Cylance, Inc. HIPS / ANTI-EXPLOITATION SANDBOXING Post-Execution ISOLATION EDR Pre-Execution No Humans Several Reasons Why Legacy Approaches are Broken AV Engines Can’t Keep Up Signatures Don’t Scale Mutations are the Rule not the Exception Humans are Required Network Encryption Makes You Blind 7 | © 2015 Cylance, Inc. What is CylancePROTECT? Unrivaled Threat Prevention & Protection PREdictive PREvention PRE-Execution PRE-Zero-Day Enterprise Ready • • • • • Malware | Exploits | Scripts Microsoft Approved AV Windows & Mac OS X SaaS Convenience PCI-DSS / HIPAA Compliant Lightweight & Flexible • 1-3% CPU / ~40 MB Memory Footprint 8 | © 2015 Cylance, Inc. DEMO 9 | © 2015 Cylance, Inc. Cylance Unlocks the DNA of Malware Elastic Cloud Computing Now Makes it Possible • We have 1000’s of nodes in AWS • Algorithmic science puts machines to work Machine Learning Under the Hood ① Collect both good & bad files ② Extract features ③ Train & Vectorize features ④ Classify & Cluster ⑤ A.I. produces confidence score Threat Indicators • Anomalies, Destruction • Data Loss, Deception 10 | © 2015 Cylance, Inc. The Benefits of PROTECT What We Do: Analyze Malware at the DNA-Level 99% Threat Prevention We Do NOT: Rely on Human Classifications Require On-Premise Infrastructure No Updates Needed No Internet Connection Needed! 11 | © 2015 Cylance, Inc. PREdictive & PREventative Heuristics Behavioral Analysis Wait for Threats to Execute Require Updates No Reliance on Human Knowable Indicators Signatures MicroVirtualization Sandboxing Who We Are $77M in funding from Awards 12 | © 2015 Cylance, Inc. 500+ Customers. 1,200,000+ Endpoints Questions?