Você já pensou que seria possível parar um ataque cibernético antes que aconteça? Uma startup empresa, Cylance, não só acredita que é possível, mas também iniciou um projeto de AI para nos mostrar como. Meet CylanceProtect, an ambitious project that aims to prevent cyber attacks.
Just yesterday, Cylance made an announcement that they successfully raised $100 million in Series D funding. CylanceProtect promises to accomplish AI-based endpoint security while employing just a chunk of the system resources needed by current security approaches.
How Is CylanceProtect Going to Prevent Cyber Attacks?
Advanced Threat Protection Relying on Artificial Intelligence
Como apontado por pesquisadores de segurança, current technologies (assinaturas, heuristics, etc.) use a reactionary approach while CylanceProtect uses artificial intelligence to analyze a file’s DNA and predict whether it’s malicious or not. Before it executes on the local host!
Para fazê-lo, Cylance excerpts millions of unique characteristics from the code, analyzes them and compares them to trained statistical models. This is how the project predicts their purpose. Contudo, the whole evaluation process takes less than 100 milliseconds, and this swiftness can stop malicious file execution.
O que é mais, CylanceProtect should protect various types of cyber attacks, Incluindo:
- Both system- and memory-based attacks
- Spear phishing campaigns
- Zero-day exploits and flaws
- Escalation of privileges
- Programas maliciosos
- scripts maliciosos
The AI-based security solution should wipe out the need of AV protection and intrusion detection. More surprisingly, no Internet connection or updates will be needed.
This is how Cylance advertises their product:
Predict. Prevent. PROTECT.
Stop merely detecting attacks. Prevent them using CylancePROTECT®, the only enterprise endpoint solution that blocks threats in real time BEFORE they ever cause harm.
According to the company’s CEO Stuart McClure, CylanceProtect goal is to reinvent endpoint security by using machine learning to think like a cyber hacker. “We now must ensure that it is put in the hands of security leaders inside enterprises, organizações, governos, and small businesses as quickly as possible“, he concludes.