Connect with us

Hi, what are you looking for?


Cloud Security

Cylance Adds AWS Support to CylancePROTECT

Threat prevention provider Cylance this week announced support for Amazon Web Services (AWS) in its CylancePROTECT threat prevention solution.

Threat prevention provider Cylance this week announced support for Amazon Web Services (AWS) in its CylancePROTECT threat prevention solution.

Using artificial intelligence to detect and prevent cyber-threats from executing, Cylance’s integrated security solution aims to protect not only devices and networks, but also applications running on cloud services infrastructure, courtesy of the newly added support for AWS Linux.

The company also says its artificial intelligence techniques now further extend to the AI-powered endpoint detection and response (EDR) solution CylanceOPTICS, aiming to deliver insight and threat hunting capabilities.

The security company aims to stop the pre-execution of both known and unknown malware. Cylance, which says has already stopped tens of millions of attacks, claims to be able to prevent cyber-attacks in milliseconds, including email attachments and zero-days.

The same lightweight agent supports Windows, Mac and Linux for streamlined management from the cloud. To simplify cloud security, Cylance uses a small-footprint agent that doesn’t require configuration or signature-updates.

While 90% of organizations are expected to adopt cloud hybrid strategies by 2020, many will face the challenge of using existing security resources to protect against cyber-attacks across multiple environments, and Cylance aims to help them fill the gap.

“By approaching security with sophisticated machine learning techniques and offering scalable threat detection, response, root cause analysis, and threat hunting, Cylance helps prevent data breaches that impact the security of an organization’s data in the cloud,” Stuart McClure, founder and chief executive at Cylance, said.

Advertisement. Scroll to continue reading.

Earlier this month, BlackBerry announced that it agreed to acquire Cylance for $1.4 billion in cash. In June, the security company had closed a $120 million funding round.

Related: AWS Adds New Feature for Preventing Data Leaks

Related: Amazon Introduces AWS Security Specialty Certification Exam

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

CISO Strategy

Varied viewpoints as related security concepts take on similar traits create substantial confusion among security teams trying to evaluate and purchase security technologies.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.