Cerber virus/ransomware making the rounds...
-
@scottalanmiller said in Cerber virus/ransomware making the rounds...:
@wirestyle22 said in Cerber virus/ransomware making the rounds...:
@dafyre said in Cerber virus/ransomware making the rounds...:
@wirestyle22 said in Cerber virus/ransomware making the rounds...:
I am in negotiations currently for a sizable raise or I walk. The issue is my fiance doesn't enjoy the risk/reward of it.
What? She doesn't want you to make more money? ... or she doesn't want you to be out of a job?
The risk of losing my job. She is a worrier though and doesn't understand the market for IT professionals. It's very much in favor of the employee not the company trying to fill the position.
But doesn't she worry that staying will cripple your career? A true worrier should be more worried for you staying, as that is the riskier move, right? It's not that she is a worrier that is the problem, that's proximate. Look for the root. Why is she worried about the potential for being out of a job today and not worried about the future of a dramatically hampered career and long term earnings and long term job stability?
From her perspective I have an unbelievable amount of job security, which is true. I could be here for the rest of my life if I wanted to. Between the two of us we will be making around $140k a year. From her standpoint that is more than enough for us. From my standpoint I'm making ob the bottom 20% of my peers. That isn't okay regardless of the situation.
-
@wirestyle22 Thread was forked already.
-
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
@Kelly said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
Another cool thing that we're going to be doing, but not as a result of this infection, is evaluating and maybe implementing Cylance in lieu of Trend on our systems.
I'm not sure if it's appropriate to say, but their engine seems revolutionary.
What makes you say that Rob?
Mostly that it's not conventional scanning, but instead it analyzes what the files do rather than just signatures or patterns. The closest comparison I can come up with is the way Android app permissions are broken down in the app store - - it can identify if a file's threat by the characteristics contained therein. Here's an analysis of the FreeConferenceCall.com installer:
I really want to see a good comparison of Webroot and Cylance from someone not related to either company.
My problem with Cylance was that there was no small business pricing. they started at something like 1000 licenses at their SpiceWorld 2015 demo. Only knocking it down to 500 during the show.
-
@JaredBusch said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
@Kelly said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
Another cool thing that we're going to be doing, but not as a result of this infection, is evaluating and maybe implementing Cylance in lieu of Trend on our systems.
I'm not sure if it's appropriate to say, but their engine seems revolutionary.
What makes you say that Rob?
Mostly that it's not conventional scanning, but instead it analyzes what the files do rather than just signatures or patterns. The closest comparison I can come up with is the way Android app permissions are broken down in the app store - - it can identify if a file's threat by the characteristics contained therein. Here's an analysis of the FreeConferenceCall.com installer:
I really want to see a good comparison of Webroot and Cylance from someone not related to either company.
My problem with Cylance was that there was no small business pricing. they started at something like 1000 licenses at their SpiceWorld 2015 demo. Only knocking it down to 500 during the show.
I can't +1 this enough. Some of the schools in our system are demoing Cylance but I haven't heard one way or another about them yet.
-
Shouldn't this be in the IT Discussions sub?
Why is it in water-cooler?
-
@DustinB3403 said in Cerber virus/ransomware making the rounds...:
Shouldn't this be in the IT Discussions sub?
Why is it in water-cooler?
Topic Moved to IT Discussions.
-
@JaredBusch said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
@Kelly said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
Another cool thing that we're going to be doing, but not as a result of this infection, is evaluating and maybe implementing Cylance in lieu of Trend on our systems.
I'm not sure if it's appropriate to say, but their engine seems revolutionary.
What makes you say that Rob?
Mostly that it's not conventional scanning, but instead it analyzes what the files do rather than just signatures or patterns. The closest comparison I can come up with is the way Android app permissions are broken down in the app store - - it can identify if a file's threat by the characteristics contained therein. Here's an analysis of the FreeConferenceCall.com installer:
I really want to see a good comparison of Webroot and Cylance from someone not related to either company.
My problem with Cylance was that there was no small business pricing. they started at something like 1000 licenses at their SpiceWorld 2015 demo. Only knocking it down to 500 during the show.
Hopefully the testing companies will get there eventually. They're all so geared towards signature detections and it's hard to get them to change. That's why we don't show up in some of them, as they won't come up with a methodology that better reflects what we do.
-
@Nic said in Cerber virus/ransomware making the rounds...:
@JaredBusch said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
@Kelly said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
Another cool thing that we're going to be doing, but not as a result of this infection, is evaluating and maybe implementing Cylance in lieu of Trend on our systems.
I'm not sure if it's appropriate to say, but their engine seems revolutionary.
What makes you say that Rob?
Mostly that it's not conventional scanning, but instead it analyzes what the files do rather than just signatures or patterns. The closest comparison I can come up with is the way Android app permissions are broken down in the app store - - it can identify if a file's threat by the characteristics contained therein. Here's an analysis of the FreeConferenceCall.com installer:
I really want to see a good comparison of Webroot and Cylance from someone not related to either company.
My problem with Cylance was that there was no small business pricing. they started at something like 1000 licenses at their SpiceWorld 2015 demo. Only knocking it down to 500 during the show.
Hopefully the testing companies will get there eventually. They're all so geared towards signature detections and it's hard to get them to change. That's why we don't show up in some of them, as they won't come up with a methodology that better reflects what we do.
I liked Cylance's demo - go to totalvirus, download the last 100 uploaded viruii, and run them.
-
@Dashrender said in Cerber virus/ransomware making the rounds...:
@Nic said in Cerber virus/ransomware making the rounds...:
@JaredBusch said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
@Kelly said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
Another cool thing that we're going to be doing, but not as a result of this infection, is evaluating and maybe implementing Cylance in lieu of Trend on our systems.
I'm not sure if it's appropriate to say, but their engine seems revolutionary.
What makes you say that Rob?
Mostly that it's not conventional scanning, but instead it analyzes what the files do rather than just signatures or patterns. The closest comparison I can come up with is the way Android app permissions are broken down in the app store - - it can identify if a file's threat by the characteristics contained therein. Here's an analysis of the FreeConferenceCall.com installer:
I really want to see a good comparison of Webroot and Cylance from someone not related to either company.
My problem with Cylance was that there was no small business pricing. they started at something like 1000 licenses at their SpiceWorld 2015 demo. Only knocking it down to 500 during the show.
Hopefully the testing companies will get there eventually. They're all so geared towards signature detections and it's hard to get them to change. That's why we don't show up in some of them, as they won't come up with a methodology that better reflects what we do.
I liked Cylance's demo - go to totalvirus, download the last 100 uploaded viruii, and run them.
That's a good start, but it's tough to truly get a zero day virus that hasn't been seen yet, for a real world test. If it's on virustotal then it's already been identified as a virus by most of the AV companies.
-
@Nic said in Cerber virus/ransomware making the rounds...:
@Dashrender said in Cerber virus/ransomware making the rounds...:
@Nic said in Cerber virus/ransomware making the rounds...:
@JaredBusch said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
@Kelly said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
Another cool thing that we're going to be doing, but not as a result of this infection, is evaluating and maybe implementing Cylance in lieu of Trend on our systems.
I'm not sure if it's appropriate to say, but their engine seems revolutionary.
What makes you say that Rob?
Mostly that it's not conventional scanning, but instead it analyzes what the files do rather than just signatures or patterns. The closest comparison I can come up with is the way Android app permissions are broken down in the app store - - it can identify if a file's threat by the characteristics contained therein. Here's an analysis of the FreeConferenceCall.com installer:
I really want to see a good comparison of Webroot and Cylance from someone not related to either company.
My problem with Cylance was that there was no small business pricing. they started at something like 1000 licenses at their SpiceWorld 2015 demo. Only knocking it down to 500 during the show.
Hopefully the testing companies will get there eventually. They're all so geared towards signature detections and it's hard to get them to change. That's why we don't show up in some of them, as they won't come up with a methodology that better reflects what we do.
I liked Cylance's demo - go to totalvirus, download the last 100 uploaded viruii, and run them.
That's a good start, but it's tough to truly get a zero day virus that hasn't been seen yet, for a real world test. If it's on virustotal then it's already been identified as a virus by most of the AV companies.
No way to get around it entirely
-
@wirestyle22 said in Cerber virus/ransomware making the rounds...:
@Nic said in Cerber virus/ransomware making the rounds...:
@Dashrender said in Cerber virus/ransomware making the rounds...:
@Nic said in Cerber virus/ransomware making the rounds...:
@JaredBusch said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
@Kelly said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
Another cool thing that we're going to be doing, but not as a result of this infection, is evaluating and maybe implementing Cylance in lieu of Trend on our systems.
I'm not sure if it's appropriate to say, but their engine seems revolutionary.
What makes you say that Rob?
Mostly that it's not conventional scanning, but instead it analyzes what the files do rather than just signatures or patterns. The closest comparison I can come up with is the way Android app permissions are broken down in the app store - - it can identify if a file's threat by the characteristics contained therein. Here's an analysis of the FreeConferenceCall.com installer:
I really want to see a good comparison of Webroot and Cylance from someone not related to either company.
My problem with Cylance was that there was no small business pricing. they started at something like 1000 licenses at their SpiceWorld 2015 demo. Only knocking it down to 500 during the show.
Hopefully the testing companies will get there eventually. They're all so geared towards signature detections and it's hard to get them to change. That's why we don't show up in some of them, as they won't come up with a methodology that better reflects what we do.
I liked Cylance's demo - go to totalvirus, download the last 100 uploaded viruii, and run them.
That's a good start, but it's tough to truly get a zero day virus that hasn't been seen yet, for a real world test. If it's on virustotal then it's already been identified as a virus by most of the AV companies.
No way to get around it entirely
Run them side by side in the real world (honeypot kind of thing) and test.
-
@scottalanmiller said in Cerber virus/ransomware making the rounds...:
@wirestyle22 said in Cerber virus/ransomware making the rounds...:
@Nic said in Cerber virus/ransomware making the rounds...:
@Dashrender said in Cerber virus/ransomware making the rounds...:
@Nic said in Cerber virus/ransomware making the rounds...:
@JaredBusch said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
@Kelly said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
Another cool thing that we're going to be doing, but not as a result of this infection, is evaluating and maybe implementing Cylance in lieu of Trend on our systems.
I'm not sure if it's appropriate to say, but their engine seems revolutionary.
What makes you say that Rob?
Mostly that it's not conventional scanning, but instead it analyzes what the files do rather than just signatures or patterns. The closest comparison I can come up with is the way Android app permissions are broken down in the app store - - it can identify if a file's threat by the characteristics contained therein. Here's an analysis of the FreeConferenceCall.com installer:
I really want to see a good comparison of Webroot and Cylance from someone not related to either company.
My problem with Cylance was that there was no small business pricing. they started at something like 1000 licenses at their SpiceWorld 2015 demo. Only knocking it down to 500 during the show.
Hopefully the testing companies will get there eventually. They're all so geared towards signature detections and it's hard to get them to change. That's why we don't show up in some of them, as they won't come up with a methodology that better reflects what we do.
I liked Cylance's demo - go to totalvirus, download the last 100 uploaded viruii, and run them.
That's a good start, but it's tough to truly get a zero day virus that hasn't been seen yet, for a real world test. If it's on virustotal then it's already been identified as a virus by most of the AV companies.
No way to get around it entirely
Run them side by side in the real world (honeypot kind of thing) and test.
No I mean zero day viruses
-
@wirestyle22 said in Cerber virus/ransomware making the rounds...:
@scottalanmiller said in Cerber virus/ransomware making the rounds...:
@wirestyle22 said in Cerber virus/ransomware making the rounds...:
@Nic said in Cerber virus/ransomware making the rounds...:
@Dashrender said in Cerber virus/ransomware making the rounds...:
@Nic said in Cerber virus/ransomware making the rounds...:
@JaredBusch said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
@Kelly said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
Another cool thing that we're going to be doing, but not as a result of this infection, is evaluating and maybe implementing Cylance in lieu of Trend on our systems.
I'm not sure if it's appropriate to say, but their engine seems revolutionary.
What makes you say that Rob?
Mostly that it's not conventional scanning, but instead it analyzes what the files do rather than just signatures or patterns. The closest comparison I can come up with is the way Android app permissions are broken down in the app store - - it can identify if a file's threat by the characteristics contained therein. Here's an analysis of the FreeConferenceCall.com installer:
I really want to see a good comparison of Webroot and Cylance from someone not related to either company.
My problem with Cylance was that there was no small business pricing. they started at something like 1000 licenses at their SpiceWorld 2015 demo. Only knocking it down to 500 during the show.
Hopefully the testing companies will get there eventually. They're all so geared towards signature detections and it's hard to get them to change. That's why we don't show up in some of them, as they won't come up with a methodology that better reflects what we do.
I liked Cylance's demo - go to totalvirus, download the last 100 uploaded viruii, and run them.
That's a good start, but it's tough to truly get a zero day virus that hasn't been seen yet, for a real world test. If it's on virustotal then it's already been identified as a virus by most of the AV companies.
No way to get around it entirely
Run them side by side in the real world (honeypot kind of thing) and test.
No I mean zero day viruses
Me too.
-
@scottalanmiller said in Cerber virus/ransomware making the rounds...:
@wirestyle22 said in Cerber virus/ransomware making the rounds...:
@scottalanmiller said in Cerber virus/ransomware making the rounds...:
@wirestyle22 said in Cerber virus/ransomware making the rounds...:
@Nic said in Cerber virus/ransomware making the rounds...:
@Dashrender said in Cerber virus/ransomware making the rounds...:
@Nic said in Cerber virus/ransomware making the rounds...:
@JaredBusch said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
@Kelly said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
Another cool thing that we're going to be doing, but not as a result of this infection, is evaluating and maybe implementing Cylance in lieu of Trend on our systems.
I'm not sure if it's appropriate to say, but their engine seems revolutionary.
What makes you say that Rob?
Mostly that it's not conventional scanning, but instead it analyzes what the files do rather than just signatures or patterns. The closest comparison I can come up with is the way Android app permissions are broken down in the app store - - it can identify if a file's threat by the characteristics contained therein. Here's an analysis of the FreeConferenceCall.com installer:
I really want to see a good comparison of Webroot and Cylance from someone not related to either company.
My problem with Cylance was that there was no small business pricing. they started at something like 1000 licenses at their SpiceWorld 2015 demo. Only knocking it down to 500 during the show.
Hopefully the testing companies will get there eventually. They're all so geared towards signature detections and it's hard to get them to change. That's why we don't show up in some of them, as they won't come up with a methodology that better reflects what we do.
I liked Cylance's demo - go to totalvirus, download the last 100 uploaded viruii, and run them.
That's a good start, but it's tough to truly get a zero day virus that hasn't been seen yet, for a real world test. If it's on virustotal then it's already been identified as a virus by most of the AV companies.
No way to get around it entirely
Run them side by side in the real world (honeypot kind of thing) and test.
No I mean zero day viruses
Me too.
I don't have faith either would do the job
-
@wirestyle22 said in Cerber virus/ransomware making the rounds...:
@scottalanmiller said in Cerber virus/ransomware making the rounds...:
@wirestyle22 said in Cerber virus/ransomware making the rounds...:
@scottalanmiller said in Cerber virus/ransomware making the rounds...:
@wirestyle22 said in Cerber virus/ransomware making the rounds...:
@Nic said in Cerber virus/ransomware making the rounds...:
@Dashrender said in Cerber virus/ransomware making the rounds...:
@Nic said in Cerber virus/ransomware making the rounds...:
@JaredBusch said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
@Kelly said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
Another cool thing that we're going to be doing, but not as a result of this infection, is evaluating and maybe implementing Cylance in lieu of Trend on our systems.
I'm not sure if it's appropriate to say, but their engine seems revolutionary.
What makes you say that Rob?
Mostly that it's not conventional scanning, but instead it analyzes what the files do rather than just signatures or patterns. The closest comparison I can come up with is the way Android app permissions are broken down in the app store - - it can identify if a file's threat by the characteristics contained therein. Here's an analysis of the FreeConferenceCall.com installer:
I really want to see a good comparison of Webroot and Cylance from someone not related to either company.
My problem with Cylance was that there was no small business pricing. they started at something like 1000 licenses at their SpiceWorld 2015 demo. Only knocking it down to 500 during the show.
Hopefully the testing companies will get there eventually. They're all so geared towards signature detections and it's hard to get them to change. That's why we don't show up in some of them, as they won't come up with a methodology that better reflects what we do.
I liked Cylance's demo - go to totalvirus, download the last 100 uploaded viruii, and run them.
That's a good start, but it's tough to truly get a zero day virus that hasn't been seen yet, for a real world test. If it's on virustotal then it's already been identified as a virus by most of the AV companies.
No way to get around it entirely
Run them side by side in the real world (honeypot kind of thing) and test.
No I mean zero day viruses
Me too.
I don't have faith either would do the job
Isn't the other choice... neither, though? Will "none" do the job?
-
@scottalanmiller said in Cerber virus/ransomware making the rounds...:
@wirestyle22 said in Cerber virus/ransomware making the rounds...:
@scottalanmiller said in Cerber virus/ransomware making the rounds...:
@wirestyle22 said in Cerber virus/ransomware making the rounds...:
@scottalanmiller said in Cerber virus/ransomware making the rounds...:
@wirestyle22 said in Cerber virus/ransomware making the rounds...:
@Nic said in Cerber virus/ransomware making the rounds...:
@Dashrender said in Cerber virus/ransomware making the rounds...:
@Nic said in Cerber virus/ransomware making the rounds...:
@JaredBusch said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
@Kelly said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
Another cool thing that we're going to be doing, but not as a result of this infection, is evaluating and maybe implementing Cylance in lieu of Trend on our systems.
I'm not sure if it's appropriate to say, but their engine seems revolutionary.
What makes you say that Rob?
Mostly that it's not conventional scanning, but instead it analyzes what the files do rather than just signatures or patterns. The closest comparison I can come up with is the way Android app permissions are broken down in the app store - - it can identify if a file's threat by the characteristics contained therein. Here's an analysis of the FreeConferenceCall.com installer:
I really want to see a good comparison of Webroot and Cylance from someone not related to either company.
My problem with Cylance was that there was no small business pricing. they started at something like 1000 licenses at their SpiceWorld 2015 demo. Only knocking it down to 500 during the show.
Hopefully the testing companies will get there eventually. They're all so geared towards signature detections and it's hard to get them to change. That's why we don't show up in some of them, as they won't come up with a methodology that better reflects what we do.
I liked Cylance's demo - go to totalvirus, download the last 100 uploaded viruii, and run them.
That's a good start, but it's tough to truly get a zero day virus that hasn't been seen yet, for a real world test. If it's on virustotal then it's already been identified as a virus by most of the AV companies.
No way to get around it entirely
Run them side by side in the real world (honeypot kind of thing) and test.
No I mean zero day viruses
Me too.
I don't have faith either would do the job
Isn't the other choice... neither, though? Will "none" do the job?
That's definitely a question
-
@wirestyle22 said in Cerber virus/ransomware making the rounds...:
@scottalanmiller said in Cerber virus/ransomware making the rounds...:
@wirestyle22 said in Cerber virus/ransomware making the rounds...:
@scottalanmiller said in Cerber virus/ransomware making the rounds...:
@wirestyle22 said in Cerber virus/ransomware making the rounds...:
@scottalanmiller said in Cerber virus/ransomware making the rounds...:
@wirestyle22 said in Cerber virus/ransomware making the rounds...:
@Nic said in Cerber virus/ransomware making the rounds...:
@Dashrender said in Cerber virus/ransomware making the rounds...:
@Nic said in Cerber virus/ransomware making the rounds...:
@JaredBusch said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
@Kelly said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
Another cool thing that we're going to be doing, but not as a result of this infection, is evaluating and maybe implementing Cylance in lieu of Trend on our systems.
I'm not sure if it's appropriate to say, but their engine seems revolutionary.
What makes you say that Rob?
Mostly that it's not conventional scanning, but instead it analyzes what the files do rather than just signatures or patterns. The closest comparison I can come up with is the way Android app permissions are broken down in the app store - - it can identify if a file's threat by the characteristics contained therein. Here's an analysis of the FreeConferenceCall.com installer:
I really want to see a good comparison of Webroot and Cylance from someone not related to either company.
My problem with Cylance was that there was no small business pricing. they started at something like 1000 licenses at their SpiceWorld 2015 demo. Only knocking it down to 500 during the show.
Hopefully the testing companies will get there eventually. They're all so geared towards signature detections and it's hard to get them to change. That's why we don't show up in some of them, as they won't come up with a methodology that better reflects what we do.
I liked Cylance's demo - go to totalvirus, download the last 100 uploaded viruii, and run them.
That's a good start, but it's tough to truly get a zero day virus that hasn't been seen yet, for a real world test. If it's on virustotal then it's already been identified as a virus by most of the AV companies.
No way to get around it entirely
Run them side by side in the real world (honeypot kind of thing) and test.
No I mean zero day viruses
Me too.
I don't have faith either would do the job
Isn't the other choice... neither, though? Will "none" do the job?
That's definitely a question
What I mean is... certainly trust nothing for zero days, protect as much as you can. But part of that would be getting the best AV that you can. It's part of the security picture.
-
@scottalanmiller said in Cerber virus/ransomware making the rounds...:
@wirestyle22 said in Cerber virus/ransomware making the rounds...:
@scottalanmiller said in Cerber virus/ransomware making the rounds...:
@wirestyle22 said in Cerber virus/ransomware making the rounds...:
@scottalanmiller said in Cerber virus/ransomware making the rounds...:
@wirestyle22 said in Cerber virus/ransomware making the rounds...:
@scottalanmiller said in Cerber virus/ransomware making the rounds...:
@wirestyle22 said in Cerber virus/ransomware making the rounds...:
@Nic said in Cerber virus/ransomware making the rounds...:
@Dashrender said in Cerber virus/ransomware making the rounds...:
@Nic said in Cerber virus/ransomware making the rounds...:
@JaredBusch said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
@Kelly said in Cerber virus/ransomware making the rounds...:
@Rob-Dunn said in Cerber virus/ransomware making the rounds...:
Another cool thing that we're going to be doing, but not as a result of this infection, is evaluating and maybe implementing Cylance in lieu of Trend on our systems.
I'm not sure if it's appropriate to say, but their engine seems revolutionary.
What makes you say that Rob?
Mostly that it's not conventional scanning, but instead it analyzes what the files do rather than just signatures or patterns. The closest comparison I can come up with is the way Android app permissions are broken down in the app store - - it can identify if a file's threat by the characteristics contained therein. Here's an analysis of the FreeConferenceCall.com installer:
I really want to see a good comparison of Webroot and Cylance from someone not related to either company.
My problem with Cylance was that there was no small business pricing. they started at something like 1000 licenses at their SpiceWorld 2015 demo. Only knocking it down to 500 during the show.
Hopefully the testing companies will get there eventually. They're all so geared towards signature detections and it's hard to get them to change. That's why we don't show up in some of them, as they won't come up with a methodology that better reflects what we do.
I liked Cylance's demo - go to totalvirus, download the last 100 uploaded viruii, and run them.
That's a good start, but it's tough to truly get a zero day virus that hasn't been seen yet, for a real world test. If it's on virustotal then it's already been identified as a virus by most of the AV companies.
No way to get around it entirely
Run them side by side in the real world (honeypot kind of thing) and test.
No I mean zero day viruses
Me too.
I don't have faith either would do the job
Isn't the other choice... neither, though? Will "none" do the job?
That's definitely a question
What I mean is... certainly trust nothing for zero days, protect as much as you can. But part of that would be getting the best AV that you can. It's part of the security picture.
Agreed