Cylance introduces AI-powered cloud security solution for AWS

New WAF attack timelines show the start and end of a threat.
No more logs. See how →

Cylance released support for Amazon Web Services (AWS) with CylancePROTECT for the cloud. Cylance develops artificial intelligence capabilities to detect and prevent malware from executing.

CylancePROTECT now supports AWS Linux to protect application instances running on cloud services infrastructure from cyber threats, and its AI techniques further extend to the Cylance AI-powered endpoint detection and response (EDR) solution CylanceOPTICS to provide insight and threat hunting capabilities against those threats.

“We are excited to make our AI-driven, prevention-first security solutions available to cloud computing environments,” said Stuart McClure, founder and chief executive at Cylance. “By approaching security with sophisticated machine learning techniques and offering scalable threat detection, response, root cause analysis, and threat hunting, Cylance helps prevent data breaches that impact the security of an organization’s data in the cloud.”

While nearly two-thirds of enterprise computing still occurs in on-premises data centers, analysts predict that 90 percent of organizations will adopt cloud hybrid strategies by 2020. Organizations with closed networks, private clouds, or limited connectivity face the challenge of protecting against cyber attacks across multiple environments using existing security resources.

“Endpoint security has evolved from signature-based malware scanning, detecting, and blocking to more advanced capabilities,” said Matthew Ball, principal analyst at Canalys. “AI on the endpoint is a game-changer for cybersecurity providers by enabling customers to implement hybrid-IT strategies that utilize both cloud and on-premises resources, while protecting the most vulnerable points in their extended networks. Without AI, securing customer data will become even more challenging as IT complexity increases.”

Are you protecting your users and sensitive O365 data from being leaked? Learn how Specops Authentication for O365 can help.