No reliance on virus signatures, third party intelligence feeds, or internet connection – functions well even in an air-gapped environment
Leverages Artificial Intelligence and Machine Learning
Low CPU Usage
>99.4% effective
EXPLORE THE PRODUCT
Prediction, Prevention, Pre-execution
CylancePROTECT
Cylance PROTECT Product Walkthrough
DIVE IN
Here, get a feel for the software by exploring highlights and common actions in the Cylance PROTECT platform.
SCHEDULE YOUR DEMO
CLOUD-BASED MULTI-TENANT CONSOLE
Threat display shows: Running threats Threat files currently running. Auto run threats The number of threats set to run automatically. Quarantined threats The number of threats that have been quarantined in last 24 hours. Threats Unique to Cylance Threats identified by Cylance but not by other anti-virus sources.
Protection percentages display shows: Threat protection The percentage of threats on which you have taken action. Device protection Percentage of devices in the organization associated with a policy enabled with auto quarantine. Benefit: Quickly determine organizational protection.
See the factors in determining threat levels
Threats by priority shows classification: High Medium Low This overview displays the total number of threats that require an action, separates that total by priority, provides a percentage total, and how many devices are affected. Benefit: To triage which threats to address first.
A threat is classified as Low, Medium, or High based on the number of the following attributes it has: • The file has a Cylance score greater than 80. • The file is currently running. • The file has been run previously. • The file is set to auto run. • The priority of the zone where the threat was found.
Threats classification shows heat map of threats: Trojan Virus Adware Parasitic Hacking Tool Benefit: Assist in identifying the type of threats to take more specific action.
Top ten lists displays top ten: Threats found on the most devices. Devices with the most threats. Zones with the most threats within the organization. Benefit: The Top 10 lists on the dashboard highlight Unsafe Threats in your organization that have not been acted upon that need immediate action.
Next: PROTECTION Page
Threat events graph shows threats over the last 30 days showing files that are: Unsafe Abnormal Quarantined Waived Cleared Benefit: Identify threat trends over time to pinpoint attack hotspots.
The protection page shows all threats and customizable sets of information.
Next: Zones Page
PROTECTION PAGE
The zones page lets you group devices of like kind to easily define policies for that zone.
Next: devices Page
ZONES PAGE
The devices page lists all devices in the environment.
Next: settings Page
devices PAGE
The Settings page is the single source to manage the entire organization with: Applying/creating/editing policies Adding /deleting devices Updating Global lists Managing Users Managing agent updates and certificates
Next: how to create or edit policies
settings PAGE
Here's how to create or edit policies in Cyclance Protect: First, select Device Policy from the Settings menu.
CREATING AND EDITING POLICIES
Next, select a policy.
creating and editing policies
Here, you can change file actions, memory actions, protection settings, agent settings and script control.
Learn more about these settings.
Creating and editing policies
Configures how to handle a file detected as unsafe or abnormal.
File Actions
Updating Policy Settings
Configures how to manage an application that exploit running processes or execute within memory.
Memory Actions
Prevents users or other processes from shutting down Cylance protection, new file watch, and application control.
Protection Settings
Enables agent log upload.
Agent Settings
Next: Global Quarantine and Safe Lists
Protection from malicious scripts (VB Script, J script, Powershell, and document macros).
Script Control