Data Privacy Day is January 28th, and it is designated as an annual effort to create awareness about the importance of respecting privacy, safeguarding data and enabling trust – three things that are very important to Cylance, our customers, investors, partners and employees.
Cylance was formed specifically to address the privacy and security of information assets. We’ve made it our mission to protect everyone under the sun. Using artificial intelligence, algorithmic science and machine learning, we’re revolutionizing cyber defense with products and services that proactively prevent, rather than reactively detect, the execution of advanced persistent threats and malware.
Cylance believes that providing security and protecting privacy is not a zero-sum gain proposition. Information that is proprietary to an organization or personally identifies individuals deserve the highest levels of protection, and should not be done at the expense of privacy.
Cylance has designed its software from the ground up to minimize data collection, while maximizing security. CylancePROTECT® focuses on executable files and malicious processes, not the associated data irrelevant to the purpose of the agent. This analysis occurs on the endpoint and uses the least amount of data possible and does not require Internet connectivity to determine the probability a file is malicious.
When the agent encounters abnormal, potentially unwanted files, it strips out information irrelevant to determining if it is malware at the first opportunity. To address regional compliance requirements and customer concerns, Cylance has established data centers in Germany, Japan, Brazil, and North America to respect national regulations.
This year, on May 25th, the European Union (EU) General Data Protection Regulation (GDPR) will replace the existing EU Data Protection Directive 95/46/EC. The GDPR will introduce new rights to individuals, along with additional obligations and penalties to companies that collect information about, or can identify, an individual.
This is a Security Bloggers Network syndicated blog post authored by Paul Dockter. Read the original post at: Cylance Blog