Endpoint Security is Increasingly Important

Attacks are motivated by a variety of reasons, originate from various locales, and continue to evolve in complexity as technology progresses. As part of this evolution, modern threats commonly employ evasion techniques designed to bypass existing security measures. Simply detecting these advanced threats after the fact is hard enough, let alone protecting an entire organization against them beforehand. In order to keep up with modern attackers, security technologies need to evolve alongside them, without relying on human intervention. That’s where math and machine learning have the advantage.

An artificial intelligence learning approach to computer security can fundamentally change the way we understand, categorize, and control execution of every file. MegaplanIT’s team of expert engineers and analysts utilize software that leverages this approach, setting us apart from every other security offering on the market.

How It Works

CylancePROTECT’s architecture consists of a small agent that integrates with existing software management systems or Cylance’s own cloud console. The endpoint will detect and prevent malware through the use of tested mathematical models on the host, independent of a cloud or signatures. It is capable of detecting and quarantining malware in both open and isolated networks without the need for continual signature updates.

Defense requires applying the best protection at the most vulnerable location — the endpoint. Cylance’s mathematical approach stops the execution of harmful code regardless of having prior knowledge or employing an unknown obfuscation technique. No other anti-malware product compares to the accuracy, ease of management, and effectiveness of CylancePROTECT.

Malware Execution Control
  • No signatures
  • Machine learning with predictive analysis
  • Autonomous
  • Pre-execution prevention in under 100ms
  • No daily scans
  • Rejects potentially unwanted programs (PUPs)
  • Controls tools used in lateral movement
Script Control
  • Stops unauthorized PowerShell and Active Scripts
  • Stops risky VBA macro methods, weaponized docs, and fileless attacks
Device Control
  • Provides control over use of USB mass storage devices
  • Helps prevent the exfiltration of data through removable media
Memory Protection
  • Silences memory misuse
  • Stops exploitation
  • Halts process injection
  • Blocks privilege escalation
Application Control
  • Device binary lockdown for fixed function devices
  • Prevents bad binaries
  • Prevents modification of any binary, even good ones
  • Allows for change windows

A great security defense
starts with the right team.

Start Now