sb-as logo
Story image

Cylance gains top spot in Magic Quadrant for second year running

07 Feb 2017

AI cybersecurity provider Cylance has been positioned as a ‘Visionary’ in the Gartner Magic Quadrant for Endpoint Protection Platforms for the second year running, placing highest for its Ability To Execute.

The company states the Ability to Execute criteria include high scoring in product and service; Overall viability; Sales execution/pricing; market responsiveness/record; marketing execution; operations; and customer experience.

The company says the positioning highlights its vision to continue innovating year on year, and comes off the back of ‘unprecedented’ momentum.

The company, which uses artificial intelligence, machine learning and algorithms to predict and prevent advanced cyber threats, experienced 607% growth, far exceeding its 322% growth in 2015.

“Nothing honours us more greatly than reports of success from our customers,” says Stuart McClure, Cylance president and CEO.

The company states that its customers have reported experiencing ‘easy deployment and management, low performance impact, and high pre-execution detection rates against both known and unknown attack types’.

“The reports of their ability to prevent even zero-day malware from executing with CylancePROTECT are highly gratifying. This ability to prevent cyber attacks in the real world is what motivates us not just to keep executing on our original vision, but to keep innovating year after year,” McClure concludes.

Link image
Why the threat of ransomware requires quality resources to keep it at bay
With this ransomware prevention kit, learn actionable tactics for IT departments on how to manage backups and enable staff so that ransomware is a managed and controlled risk.More
Story image
The business case for an in-house ethical hacker
Ethical hackers, also known as penetration testers or white-hat hackers, mimic the techniques used by malicious hackers to try and break into computer systems and discover vulnerabilities before the bad guys can exploit them.More
Story image
Google Cloud observes spike in DDoS volumes in last two years
Google Cloud has seen an ‘exponential’ rise in distributed denial of service (DDoS) attacks over the past decade, but the biggest attacks have only occurred in the past couple of years.More
Story image
Microsoft is most imitated brand for phishing attacks in Q3
Popular phishing tactics using the Microsoft brand used email campaigns to steal credentials of Microsoft accounts, luring victims to click on malicious links which redirect them to a fraudulent Microsoft login page. More
Story image
New project development inhibited by cybersecurity, Kaspersky research states
"There are still some practical steps that can be taken to make sure that an emerging technology or a product reaches its launch. Cybersecurity doesn’t have to be another corporate barrier, but it should be on an integral part of the project all long."More
Story image
Criminals scale back DDoS attacks after 'abnormal' spike in Q2
The Q2 spike seems to have been short-lived as DDoS activity returns to ‘normal’ levels over Q3, with 73% fewer attacks than seen in the previous quarter.More