Story image

Cylance makes APIs available in endpoint detection offering

10 Dec 2018

Security solutions provider Cylance has announced the availability of application programming interfaces (APIs) as part of its endpoint detect and respond offering, CylanceOPTICS.

CylancePROTECT and OPTICS customers can automate repeatable tasks and have the improved ability to identify and respond to advanced threats without an increase in headcount or process complexity.

Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.

CylanceOPTICS exposes field-tested artificial intelligence to detect and prevent advanced threats, enabling organisations to use automated analyses to disrupt attackers across their environments.

It also builds the policies for device control and memory exploitation protection that prevent attacks from executing in the network.

“Data captured at the endpoint is important to many teams across the enterprise,” Cylance product marketing vice president Sasi Murthy.

”By making that data accessible in real time, we can absolutely improve threat visibility, but we can also improve an organisation’s ability to drive policy compliance, monitor device health, and maintain situational awareness across their vast and changing IT environments.”

The availability of APIs allows CylanceOPTICS to creating automated workflows to generate helpdesk tickets, initiate data collection, quarantine files, or launch other tasks in real time.

Organisations gain flexibility in their security stack because of the interoperability with existing technology investments such as security orchestration, automation, response (SOAR) and security information and event management (SIEM) tools.

Users of the Cylance next-generation AI platform have the ability to correlate endpoint data against known and prospective threats, which provides increased understanding of the attack surface.

Security teams also benefit from the speed and accuracy of bringing new devices online and implementing changes across their ecosystems on the fly.

Last month, Cylance was acquired by BlackBerry for US1.4billion for its AI and cybersecurity capabilities, with the deal expected to close before February 2019.  

BlackBerry executive chairman and CEO John Chen said that Cylance’s leadership in artificial intelligence and cybersecurity will immediately complement its entire portfolio, UEMand QNX in particular.

Cylance will continue to operate as a separate business unit within BlackBerry.

Cylance has worked on creating strategic partnerships this year, including with Unisys, KPMG, and Securonix, to deliver its services on more platforms.

Forescout strengthens investment in OT security
Forescout’s latest features will provide enterprises with improved productivity, lower risk profiles and faster mitigation of threats.
Hybrid cloud security big concern for business leaders
A new study highlights that IT and security professionals have significant concerns around security for hybrid cloud and multi-cloud environments.
GitHub launches fund to sponsor open source developers
In addition to GitHub Sponsors, GitHub is launching the GitHub Sponsors, GitHub will match all contributions up to $5,000 during a developer’s first year in GitHub Sponsors.
Check Point announces integration with Microsoft Azure
The integration of Check Point’s advanced policy enforcement capabilities with Microsoft AIP’s file classification and protection features enables enterprises to keep their business data and IP secure, irrespective of how it is shared. 
ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.