@Nic said in Cylance Questions:
@scottalanmiller said in Cylance Questions:
@Jstear said in Cylance Questions:
I tested out Cylance to see if it was as great as everyone says it is, but it was basically Webroot from what I could tell. The biggest issue I had with it was I couldn't do much management. I has to send most requests to the dealer I was getting the trial from. They said that was going to change in the future though.
I've not heard of anything that really differentiates them from Webroot (other than costing way more.) They describe this awesome way that they work, but Webroot describes that way too. So not sure how much different they are. They had a session at SW last year but blew it big time - which was not really their fault and they've apologized and explained about that and that's all fine, but they had an opportunity to explain what made them different and failed to do so. They sound like a good option, but with Webroot at there, more mature, at a fraction of the price, I've not heard a compelling argument for Cylance's value proposition other than providing an alternative.
To boil it down to the essentials we do:
- Online database to identify known malicious software
- Machine Learning and heuristics to catch unknown bad actors
- Journaling and rollback for anything we can't immediately identify
Cylance focuses on one layer which is the machine learning and heuristics to classify software as good or bad. Their approach puts all their energy into making #2 the best it can be, whereas we have three layers that we spread our effort across. Different approaches, but both different from and superior to signature-based definitions.
Basically, the Fro is right. While both our logos are both green and we are both NGAV, our approaches are wildly different. (and yes, he flagged me to come take a look)
Our model is based on a mathematical equation which was made with AI. We asked our AI to define a file, essentially mapping the DNA of a file, mapping its traits/features and other aspects into this equation, which became the endpoint product. We do not rely on DAT/Signatures/heuristics/behavior, instead focusing on the combined traits of the individual file. We make a determination pre-execution in 1/10th of a second.
I'm here to answer questions, or on the other site.