Security Experts:

Connect with us

Hi, what are you looking for?


Endpoint Security

Cylance Takes a Mathematical Approach to Solving Malware Problems

Cylance Launches Mathematically-assisted Endpoint Threat Protection

Cylance Launches Mathematically-assisted Endpoint Threat Protection

Cylance, a Irvine, California-based company focused on threat detection and prevention solutions, today released CylancePROTECT, a new offering that the company says takes a “mathematical and machine learning approach to stop the execution of malware on endpoint computers and mobile devices.”

According to Cylance, its technology applies algorithmic science to security, resulting in a new threat detection model that can determine what is safe and what is a threat in the broadening “grey list” spectrum of unknown data, without the use of traditional means such as signatures, rules, behavior, heuristics, whitelists or sandboxing.

Cylance LogoBy pairing “sophisticated math and machine learning with an understanding of a hacker’s mentality,” Cylance says it can protect customers against new malware, bots and unknown future variants.

“The fundamental flaw in today’s cybersecurity infrastructure is that detection happens before prevention,” said Stuart McClure, Cylance founder and CEO. “Human-generated signatures, based primarily on previously discovered samples, have failed to solve the problem as zero-day malware continues to operate silently and unimpeded.”

While the company does say that traditional security solutions are not effective enough, CylancePROTECT is designed to complement existing endpoint security products.

“Its value is to eliminate the concern for unknown and advanced threats, often missed by the other solutions,” the company explained.

CylancePROTECT’s “agent” sits on top of current security solutions and integrates with existing management software such as like McAfee ePO, the company said. Additionally, the product incorporates memory protection and execution control through kernel modules to address advanced non-resident-based threat tactics, including injection and hijacking techniques, overflows and in-memory execution techniques.

More information on CylancePROTECT is available online

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Expert Insights

Related Content

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.


CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.


Chinese threat actor DragonSpark has been using the SparkRAT open source backdoor in attacks targeting East Asian organizations.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Malware & Threats

Cybercrime in 2017 was a tumultuous year "full of twists and turns", with new (but old) infection methods, a major return to social engineering,...


Russia-linked cyberespionage group APT29 has been observed using embassy-themed lures and the GraphicalNeutrino malware in recent attacks.

Malware & Threats

Norway‎-based DNV said a ransomware attack on its ship management software impacted 1,000 vessels.