Resource Library
Resource Library

    Data Sheets

  • VDI Data Sheet

    Data Sheets

    Read Now
  • CylancePROTECT®

    Data Sheets

    Read Now
  • CylancePROTECT®: Next-Generation AV

    Data Sheets

    Read Now
  • CylanceOPTICS™

    Data Sheets

    Read Now
  • Splunk App

    Data Sheets

    Read Now
  • ThreatZERO Services

    Data Sheets

    Read Now
  • ThreatZERO Training

    Data Sheets

    Read Now
  • ThreatZERO Resident Expert

    Data Sheets

    Read Now
  • ThreatZERO + Compromise Assessment

    Data Sheets

    Read Now
  • ThreatZERO + SIEM Services – Add-on to ThreatZERO

    Data Sheets

    Read Now
  • ThreatZERO Prevention Assurance – Add-on to ThreatZERO

    Data Sheets

    Read Now
  • Ransomware Prevention & Remediation

    Data Sheets

    Read Now
  • Incident Containment

    Data Sheets

    Read Now
  • Malware Assessment

    Data Sheets

    Read Now
  • Facilisafe Consulting

    Data Sheets

    Read Now
  • Cylance - Who We Are

    Data Sheets

    Read Now
  • Web Application Pen Test Assessment

    Data Sheets

    Read Now
  • Social Engineering Assessment

    Data Sheets

    Read Now
  • Physical Security Assessment

    Data Sheets

    Read Now
  • Wireless Pen Test Assessment

    Data Sheets

    Read Now
  • Internal Pen Test

    Data Sheets

    Read Now
  • External Pen Test

    Data Sheets

    Read Now
  • ISO 27002 Gap Analysis

    Data Sheets

    Read Now
  • Source Code Review

    Data Sheets

    Read Now
  • Industrial Control System Assessment

    Data Sheets

    Read Now
  • Incident Response Tabletop Exercise

    Data Sheets

    Read Now
  • Security Tools Assessment

    Data Sheets

    Read Now
  • Compromise Prevention Assessment

    Data Sheets

    Read Now
  • Incident Readiness Assessment

    Data Sheets

    Read Now
  • Incident Containment Retainer

    Data Sheets

    Read Now
  • Incident Response Technical Training

    Data Sheets

    Read Now
  • NIST Cybersecurity Framework Gap Analysis

    Data Sheets

    Read Now
  • Incident Containment/Malware Analysis

    Data Sheets

    Read Now
  • Embedded System Security Assessment

    Data Sheets

    Read Now
  • Med Device Security Assessment

    Data Sheets

    Read Now
  • Forensic Investigation and Analysis

    Data Sheets

    Read Now

    Feature Focus

  • Feature Focus: CylancePROTECT 1450 Release

    Feature Focus

    Read Now
  • Feature Focus : CylancePROTECT Linux Agent

    Feature Focus

    Read Now
  • Feature Focus : CylancePROTECT Memory Protection

    Feature Focus

    Read Now
  • Feature Focus : CylancePROTECT App Control

    Feature Focus

    Read Now
  • Feature Focus : CylancePROTECT Mac OS Sierra

    Feature Focus

    Read Now
  • Feature Focus: CylancePROTECT Script Control

    Feature Focus

    Read Now
  • Feature Focus: CylanceOPTICS Root Cause Analysis

    Feature Focus

    Read Now
  • Feature Focus: CylanceOPTICS Smart Threat Hunting and InstaQuery (IQ)

    Feature Focus

    Read Now
  • Feature Focus: CylanceOPTICS Incident Response

    Feature Focus

    Read Now
  • Feature Focus: CylanceOPTICS Distributed Search and Collection

    Feature Focus

    Read Now

    White Papers

  • Generations of Machine Learning in Cybersecurity

    White Paper

    Read Now
  • AI Based Prevention and Detection: CylanceOPTICS™

    White Paper

    Read Now
  • Competitive System Resource Impact Testing

    White Paper

    Read Now
  • False Positives

    White Paper

    Read Now
  • Radical Approach To Risk Management

    White Paper

    Read Now
  • Universal Unhooking

    White Paper

    Read Now
  • Not All Machine Learning Is Created Equal

    White Paper

    Read Now
  • Better Security and Fewer Resources

    White Paper

    Read Now
  • How Artificial Intelligence Will Secure the 21st Century

    White Paper

    Read Now
  • Cybersecurity in the Federal Government

    White Paper

    Read Now
  • Assault on Healthcare

    White Paper

    Read Now
  • Malware Prevention SecOps Multiplier

    White Paper

    Read Now
  • The Medical Device Paradox

    White Paper

    Read Now
  • Prevention vs. Detect & Respond

    White Paper

    Read Now
  • CylanceSPEAR: Redirect to SMB Vulnerability

    White Paper

    Read Now
  • Math vs. Malware

    White Paper

    Read Now
  • Ransomware Prevention is Possible

    White Paper

    Read Now
  • CylanceSPEAR: Trick Us Once, ShameOnUAC

    White Paper

    Read Now
  • Protecting Critical Infastructure

    White Paper

    Read Now

    Briefs

  • CylancePROTECT Linux Release Soultion Brief

    Briefs

    Read Now
  • GDPR Business Brief

    Briefs

    Read Now
  • Fileless Malware Business Brief

    Briefs

    Read Now
  • High Value Assets (CNAP) Business Brief for Federal Agencies

    Briefs

    Read Now
  • CylancePROTECT and CylanceOPTICS Solution Brief

    Briefs

    Read Now
  • Australian Privacy Act Legislation Brief

    Briefs

    Read Now
  • WannaCry Business Brief

    Briefs

    Read Now

    Reports

  • 2017 SANS Threat Landscape Survey Report

    Report

    Read Now
  • SANS Next Generation Endpoint Security (NGES) Test Report

    Report

    Read Now
  • CarbonView Survey Report and Infographics

    Report

    Read Now
  • 451 Research Report: Cylance Jumps Into Detection and Response

    Report

    Read Now
  • IDC MarketScape: Worldwide Endpoint Specialized Threat Analysis and Protection 2017 Vendor Assessment

    Report

    Read Now
  • NSS Labs 2017 Advanced Endpoint Testing

    Report

    Read Now
  • AV-TEST Advanced Threat Prevention Test Results

    Report

    Read Now
  • The Forrester Wave™: Endpoint Security Suites, Q4 2016

    Report

    Read Now
  • Operation Dust Storm

    Report

    Read Now
  • The Operation Cleaver Report

    Report

    Read Now
  • Frost & Sullivan: Cylance Vendor Profile

    Report

    Read Now

    Podcasts

  • 20 Aug 2017 - Insecurity: Who and Why vs. How and What

    Podcast

    Read Now
  • 11 Aug 2017 - Insecurity: AMTSO AV Testing Standards

    Podcast

    Read Now
  • 06 Aug 2017 - Insecurity: Security and M&A - A BIllion Dollar Risk

    Podcast

    Read Now
  • 30 Jul 2017 - Insecurity: Security Friction in Business

    Podcast

    Read Now
  • 24 Jul 2017 - Insecurity: GDPR Compliance

    Podcast

    Read Now
  • 17 Jul 2017 - Insecurity: The Illusion of Protection

    Podcast

    Read Now

    eBooks

  • The Artificial Intelligence Revolution in Cybersecurity

    eBook

    Read Now