Icon Close country selection

Cylance® Protect

For years, endpoint security products’  primary threat protection was based on signatures, created after patient zeros were impacted and the damage was already done.  Assuming all attacks had been seen before, using signatures made sense. Today, malware mutates daily, even hourly, making signature-based prevention tools obsolete,  and creating the need for a  stronger prevention-based approach to endpoint security. Cylance has redefined what an endpoint protection solution can and should do for organizations by utilizing an automated,  prevention-first approach.  It is an accurate,  efficient,  and effective solution for preventing advanced persistent threats and malware from executing on an organization’s endpoints.   Cylance®  Protect prevents breaches and provides additional security controls to safeguard against script-based, fileless,  memory,  and external device-based attacks.   Cylance Protect does this without user or admin intervention,  a  cloud connection,  signatures, heuristics, or sandboxes. 

 

The algorithmic model  utilized  within Cylance Protect  means  there  are no signatures,  patching,  system  scans,  or  slow  endpoints  due  to  the  security  solution running  on  them. 

Main functionalities

Cylance®  Protect prevents breaches and provides additional security controls to safeguard against script-based, fileless,  memory,  and external device-based attacks.   Cylance Protect does this without user or admin intervention,  a  cloud connection,  signatures, heuristics, or sandboxes. 

  • CUSTOMIZE ROLES AND PERMISSIONS
    Increase your situational awareness and gain insight into potential attacks with interactive dashboards and real-time statistics.
  • MEMORY EXPLOITATION DETECTION
    Memory protection adds a layer of security and strengthens basic protection features included with OSs, -preventing attackers from using memory to exploit vulnerabilities.
  • PROTECT AGAINST MALICIOUS SCRIPTS
    Monitor, detect, and protect against malicious scripts and script paths running in your environment before they can execute. You control when and where scripts run.
  • SECURE FIXED-FUNCTION DEVICES
    Lockdown specified systems and restrict any changes to locked devices to ensure fixed-function devices stay in an uncompromised state.
  • CONTROL DEVICE ACCESS
    Set parameters for what devices can connect to your environment. Set access controls at the category or device level—or anything in between.

 

Common Cylance Protect Use Cases 

 

Cylance Protect  provides  full-spectrum  threat  prevention  that  stops  endpoint breaches by solving the following use cases:

  • Identify and block malicious executables without the need for constant updates or a cloud connection 
  • Identify security vulnerabilities and potentially malicious activities by monitoring OS updates, system parameters, device configurations, and system libraries 
  • Control where, how, and who can execute scripts 
  • Manage USB device usage and prevent unauthorized devices from being used 
  • Stop fileless malware attacks 
  • Lockdown fixed-function devices such as kiosks, POS terminals, etc. 
  • Prevent zero-day and ransomware attacks 
  • Stop memory-based attacks and exploitations 
  • Use application sandboxing and code analysis as well as app-security testing to identify malware and grayware 
  • Identify any malware that might come in through sideloaded applications, unique signature-based malware, or simulations 
  • Protection for endpoints when users are online or offline
bg

Test a product

On local martkets Bakotech Group operates through a well-established partner network, including over 1,000 active dealers. Key IT-integrators and are involved in the realization of large-scale projects concerning implementing solutions for end-customers from various segments of business. Bakotech's business strategy is True Value Added Distribution or in other words - project oriented distribution.

We are providing our partners with a wide range of services such as PR, co-marketing activities, pre post-sales support, trainings for partners and end-customers, PoC, PoV, solution consulting, implementation support and technical support.

Contact Us

Bakotech Sp. z o.o.

ul. Drukarska 18/5

30-348 Kraków

Poland

Dane firmy

VAT ID 6762466740

REGON 122894922

KRS 0000467615

Kontakt

ph. +48 12 340 90 30

office-cee@bakotech.com

Privacy policy

Subscribe to stay updated

Would you like to stay updated on the current IT and InfoSec news? About BAKOTECH events like webinars, trainings and conferences? Please, leave your e-mail:
Error occured. Please check the form fields and try again.
This address is already in our database.
The subscription has been added. Thank you!
© Bakotech - 2022. All rights reserved

The website uses cookies to deliver services in accordance with the Cookies Policy. You can define the conditions for storing or accessing the cookie mechanism in your browser.

I accept