Story image

Securonix and Cylance partner to drive end-to-end security offering

16 Oct 2018

Security solutions providers Cylance and Securonix have announced a partnership to support the interoperability of CylancePROTECT with the release of the Securonix Security Analytics Platform.

Customers of Cylance and Securonix will now have the tools necessary to implement a prevention-first security strategy with CylancePROTECT and Securonix’s Security Analytics Platform to view and contextualise real-time intelligence collected at the endpoint.

In tandem, the two products will provide security operations centre (SOC) teams with a view of both cloud and endpoint security events in addition to the continuous protection and prevention capabilities required to proactively detect and defeat viruses, malware, ransomware, and other known and unknown threats.

Securonix products senior vice president Nitin Agale says, “By integrating our Security Analytics Platform with CylancePROTECT, we not only prevent bad actors from infecting endpoint systems, but we also ensure that every attempt they make at moving laterally across the network can be promptly detected, traced, and terminated automatically before critical systems or data are compromised.

In combination, CylancePROTECT and the Security Analytics Platform will enable SOC teams to minimise organisational risk while optimising operational efficiency.”

Threats can be resolved and remediated automatically, minimising time-to-detection but and the time between detection and quarantine.

For example, if CylancePROTECT detects and blocks a malicious file at one endpoint, the Security Analytics Platform can respond immediately by pushing out rules to every other endpoint on-premises and in the cloud to quarantine that file and block its execution.

Cylance chief product officer Eric Cornelius says, “Organisations need cybersecurity solutions that are proven to be effective at preventing both today’s and tomorrow’s attacks while providing the actionable threat intelligence SOC teams need to proactively manage cyber risk across the enterprise.”

CylancePROTECT and the Security Analytics Platform aim to provide a consolidated view of security event activity:

  1. CylancePROTECT prevents adversaries from gaining a foothold at the endpoint by detecting and blocking the execution of both file-based and fileless attacks and by applying policies for device and script control, application control, and memory exploitation protection.  
  2. The Security Analytics Platform uses restful APIs to ingest the security event data collected by CylancePROTECT at the endpoint. This includes not only information about suspect files, applications, scripts, and processes, but also event metadata, file attributes, and more.  
  3. The Security Analytics Platform aggregates and correlates ingested data with user behaviour analytics and network-based threat indicators and applies sophisticated machine learning algorithms to accurately detect advanced and insider threats and rank them based on risk scores. The Security Analytics Platform then generates prioritised alerts for threats that exceed a pre-defined risk threshold.  
  4. SOC personnel can visualise and interrogate the resulting threat chain data within the Securonix management dashboard, drilling down and pivoting from one threat indicator
Kiwis know security is important, but they're not doing much about it
Only 49% of respondents use antivirus software and even fewer – just 19% -  change their passwords regularly.
Avi Networks: Using visibility to build trust
Visibility, also referred to as observability, is a core tenet of modern application architectures for basic operation, not just for security.
Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.
Myth-busting assumptions about identity governance - SailPoint
The identity governance space has evolved and matured over the past 10 years, changing with the world around it.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.