AI Driven Threat Protection. Get in front of malicious cyberattacks with the data science driven power of artificial intelligence (AI). CylancePROTECT works where most attacks occur - at the endpoint - for better efficacy, faster resolution, and less disruption. 

CylancePROTECT for Powerful Prevention

Endpoint security redefined. Our AI driven technology prevents attacks before they can damage your devices, network, or reputation. No signatures. More predictability. Less hassle. Prevention is possible with CylancePROTECT.

Scope of Threat Coverage

  • Malware Prevention
  • Memory Exploitation
  • Script Management
  • Application Control
  • Device Usage
  • Console Reporting

Detect and Prevent Malware

CylancePROTECT leverages artificial intelligence to detect and prevent attacks before they can execute.

Memory Exploitation Detection and Prevention

Memory protection adds an additional layer of security and strengthens the OS’s basic protection features – preventing attackers from using memory to exploit vulnerabilities.

Protect Against Malicious Scripts

Monitor, detect and protect against malicious scripts/script paths running in your environment – before they can execute.

Maintain Control of Fixed Function Devices

Lockdown specified systems and restrict any changes to the devices after being locked down. Perfect to ensure fixed-function devices remain in a pristine uncompromised state.

Control Device Access

Set parameters for what devices can connect to your environment – granting access can be as specific as designating serial numbers or as general as device category.

Understand Your Attack Surface

Using interactive dashboards with real-time statistics, users can easily increase their situational awareness and gain insight into their potential attack surface.

Scope of Threat Coverage

  • Malware Prevention

    Detect and Prevent Malware

    CylancePROTECT leverages artificial intelligence to detect and prevent attacks before they can execute.
  • Memory Exploitation

    Memory Exploitation Detection and Prevention

    Memory protection adds an additional layer of security and strengthens the OS’s basic protection features – preventing attackers from using memory to exploit vulnerabilities.
  • Script Management

    Protect Against Malicious Scripts

    Monitor, detect and protect against malicious scripts/script paths running in your environment – before they can execute.
  • Application Control

    Maintain Control of Fixed Function Devices

    Lockdown specified systems and restrict any changes to the devices after being locked down. Perfect to ensure fixed-function devices remain in a pristine uncompromised state.
  • Device Usage

    Control Device Access

    Set parameters for what devices can connect to your environment – granting access can be as specific as designating serial numbers or as general as device category.
  • Console Reporting

    Understand Your Attack Surface

    Using interactive dashboards with real-time statistics, users can easily increase their situational awareness and gain insight into their potential attack surface.
The Cylance Predictive Advantage The Cylance Predictive Advantage The Cylance Predictive Advantage

The Cylance Predictive Advantage

SE Labs tested CylancePROTECT in an offline environment against major threats in the wild. Using our AI model from May 2015, SE Labs collected and tested threats from February 2016 to November 2017.

The results demonstrate CylancePROTECT users would have been safe from the zero-day attacks even if they had not updated their software for up to two years, nine months.

CylanceAPI: Automate Your Workflows

Scalable, Repeatable, and Automated Workflow Integration

CylanceAPI is a series of RESTful APIs that deliver easy access to CylancePROTECT data, administration, and investigation tasks to enable full integration of CylancePROTECT into existing security frameworks and workflows.

Acclaim for CylancePROTECT

2017 Gartner Peer Insights Customer Choice Awards for Endpoint Protection Platforms – Silver Medal

Named to Cyber Defense Magazine's Cyber Security Leaders of 2017

Cylance Named to CNBC Disruptor 50 List for the second consecutive year

CylancePROTECT Deployment Options Designed for Your Environment

Cloud Deployment for Connected Environments

Streamline management from the cloud. A single lightweight agent supporting Windows, Mac and Linux. Deploy in minutes – no reboots, no signatures, with zero hardware and maintenance cost – for immediate effective prevention.

Hybrid Deployment for Unique Environments

Choose a single-point connectivity solution. Download once, redistribute locally.  Hybrid deployment facilitates security-related communication between the cloud and local infrastructure without exposing your network.

On-Premises Deployment for Closed Environments

On-premises deployment architecture represents a common environment, deployed exclusively within your local network infrastructure. You can choose to host CylancePROTECT on a physical server or from a compatible virtual server.

Learn More About CylancePROTECT

CylancePROTECT Data Sheet CylancePROTECT Data Sheet CylancePROTECT Data Sheet
Read Data Sheet
How Artificial Intelligence Will Secure the 21st Century How Artificial Intelligence Will Secure the 21st Century How Artificial Intelligence Will Secure the 2…
Read White Paper
Forrester Consulting: The Total Economic Impact of Cylance Forrester Consulting: The Total Economic Impact of Cylance Forrester Consulting: The Total Economic Impa…
Read Case Study
CylancePROTECT Vs. Ransomware CylancePROTECT Vs. Ransomware CylancePROTECT Vs. Ransomware
Watch Video

We use cookies to provide you a relevant user experience, analyze our traffic, and provide social media features. Read More

GOT IT