CylanceOPTICS v2.1 Delivers AI-Driven Endpoint Detection and Response

We are pleased to announce the release of CylanceOPTICS® version 2.1, an artificial intelligence (AI) driven Endpoint Detection and Response (EDR) component that provides organizations with constant endpoint security visibility, security event root cause analysis, robust and scalable threat hunting, as well as automated threat detection and response.

Augmenting the superior prediction and prevention offered by CylancePROTECT®, CylanceOPTICS provides automated detection and response capabilities to thwart hard-to-find threats across the enterprise, including:

  • Distributed Search and Collection: Our unique approach to data collection that optimizes data collection, search, and analysis
  • Root Cause Analysis: Web-based, on-demand, root cause analysis of attacks blocked by CylancePROTECT as well as other interesting artifacts identified on endpoints
  • Enterprise-wide Threat Hunting: Search endpoint data instantly for potential threats hiding on endpoints
  • Fast Incident Response: Take incident response actions fast, quarantining, acquiring suspicious files, and/or isolating compromised endpoints from the network
  • Dynamic Threat Detection: Automates potential threat discovery, in real time, using curated detection rules
  • Automated Response: Customize automated response actions, associated with rule set, to eliminate the dwell time between threat detection and incident response action

Unlike other EDR products that require organizations to make significant investment in on-premises infrastructure, CylanceOPTICS is designed to automate the threat detection and response tasks using existing resources, reducing the workload on security analysts without increasing costs.

The combination of CylancePROTECT and CylanceOPTICS delivers total endpoint security.

EDR Security Challenges

Endpoint security teams are inundated with data from the security products deployed across their network. Unfortunately, due to the need to maintain business continuity above all else these teams have little to no time to perform any proactive threat hunting or strategic security improvements, leaving critical threats unidentified and their security infrastructure at risk.

Compounded by the scarcity of skilled security resources on the market, many organizations must rely (Read more...)

This is a Security Bloggers Network syndicated blog post authored by Steve Salinas. Read the original post at: Cylance Blog