sb-as logo
Story image

Wedge Networks to provide massively scaled Cylance AI security solution

23 Sep 2016

Wedge Networks is a successful start-up that has traditionally focused on security for telcos. More precisely it produced highly scalable tools that enabled huge amounts of network data traffic to be scrubbed clean. This enables telco service providers to offer clean internet connectivity to their clients with virus and malware threats already removed.

Their key advantage in this space has been the throughput. No competitors match the massive amount of data traffic that could be screened by their ‘Cloud Network Defense’ product range. It stands alone with throughput up to 10GB per second.

They don’t produce the anti-virus or anti-malware technology themselves but focused on the massively scalable, elastic, virtualised platform. They then partnered with brands like Kaspersky and McAfee.

Today Wedge Networks has added up and coming anti-virus and anti-malware vendor Cylance to its solutions.

Cylance is a security vendor focused on protecting endpoint devices. Their approach is non-traditional and doesn’t involve signatures. Instead of the old-fashioned signature database approach, Cylance uses Artificial Intelligence (AI) to identify threats. The advantage of their approach is that a new threat doesn’t need to be identified in a research facility and then added to the signature database, which gets downloaded to clients. Cylance’s solution can catch previously unknown threats, using its incredible AI approach.

Incorporating Cylance into its solutions enables the same advantages that Cylance is providing the end point, at the network level.

Because of the different approach by Cylance, Wedge has had to make significant architectural changes.

The new product is being called Wedge Advanced Malware Blocker (WedgeAMB) and fits into a whole new family of products called Wedge Absolute Real-time Protection (WedgeARP). 

“We live in an age where collaboration and embracing the innovation of others is key to providing the best possible security solutions available,” said James Hamilton, CEO of Wedge Networks. “We’ve developed the industry’s highest performing real-time hyper-inspection and orchestration engine. Orchestrating that functionality in concert with other best-in-class technologies enables the most effective threat prevention available, with superior performance and scale. That’s what the WedgeARP series is all about – orchestrating the industry’s best security technologies and joining forces in the fight against cybercrime.”   “Security teams worldwide need integrated tools to provide next-generation protection from today’s ever-increasing cyber attacks,” said Stuart McClure, president and CEO at Cylance Inc. “Together, WedgeAMB with the Cylance machine-learning engine delivers a one-two punch, intercepting malware at the perimeter as well as on the endpoint.”   The new product is available in 100 Mbps, 1 Gbps, and 10 Gbps versions. It can be deployed as a virtual machine (VM) or as a pre-configures X86-based appliance

Story image
Hybrid IAM solutions are the way of the future, study states
“As this first-of-its-kind research shows, while IT leaders are faced with unique criteria and conditions that shape their IT strategy, hybrid IAM has emerged as a necessity."More
Story image
IT leaders prioritising automation, Zero Trust and API-based security investments
"The study shows that a cocktail of multiplying threats, the proliferation of hybrid and cloud architectures, blended with a pandemic-fuelled explosion in distributed and remote work has created a perfect storm for network security teams."More
Story image
5G network security a US$9 billion dollar opportunity - report
The cloud-native nature of 5G networks will have a disruptive and positive impact on the cybersecurity industry in the next few years, with 5G network security presenting a US$9 billion enterprise market opportunity by 2025.More
Story image
Claroty discovers vulnerabilities in Ovarro TBox RTUs
The vulnerabilities could enable attackers to break into the systems and run code, crash systems, and meddle with configuration files, amongst other malicious actions.More
Story image
O365 a weak point ripe for exploit, say security professionals
71% of more than 1,000 security professionals have been on the receiving end of a Microsoft 365 account takeover, on average, seven times in the last year alone.More
Story image
rhipe acquires emt Distribution, with aim to expand into enterprise market
The acquisition will enable rhipe to deliver a comprehensive portfolio of end-to-end security capabilities to its partners, the company says.More