Advanced Threat Prevention Test

Thumb original av test report   analyst report

Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was developed jointly to provide additive testing to the commodity Anti-Virus protection tests currently produced by AV-TEST.

CylancePROTECT® was tested against 5 competitor endpoint products from Kaspersky, McAfee, Sophos, Symantec and Trend Micro. The test was performed in December 2016 and January 2017. This report contains the results of four test cases. The primary goal was to show the detection and prevention capabilities of new and unknown malicious executables.

View study
Date: 10 October 2019, 11:23 am   |   Provider: Blackberry Cylance   |   Size: 596 KB   |   Language: English
This may interest you too:
Thumb original replace your av ebook

Artificial Intelligence: The Smarter Approach To Information Security

The news headlines are replete with stories of devastating data breaches, compromising the personal and professional data of millions. Cyber attackers spare no industry, infiltrating the assets of even the most sophisticated technology adopters, in turn impacting their executives, employees, and perhaps worst of all — customers and users. All of which bag the question: What's going wrong?

The answer lies not in changing the motives of bad actors, but rather, in the advanced techniques that help them evade traditional methods of system protec ...

To the download
Thumb original bbcy forrester tei 2019   report

The Total Economic Impact™ Of CylancePROTECT® And CylanceOPTICS™

Employee endpoints are the interfaces between employees and the corporate data and applications they need to do their jobs. Attackers understand this — and actively target employee endpoints as well as the server endpoints hosting corporate data. More than 50% of companies experience a significant data breach each year, and endpoints, as a critical conduit for valuable corporate data, are the top targets for attack. Endpoint security solutions provide a critical line of defense, protecting PCs, laptops, and servers from malicious threats.

Cy ...

To the download
Thumb original wp understanding the obstacles to wan transformation

Understanding the Obstacles to WAN Transformation — Security, Performance, and TCO

Network engineering and operations leaders are looking to software-defined wide- area networks (SD-WAN) to support the influx of traffic and applications driven by digital transformation (DX). These applications improve staff productivity while creating new business opportunities, but they also reshape corporate networking and security needs.

In response, many organizations are beginning to rethink their traditional WAN architecture. SD WAN has emerged as a replacement, but many SD-WAN implementations also present serious challenges—from ina ...

To the download
Thumb original wp sd wan in the age of digital innovation a4

SD-WAN in the Age of Digital Innovation — Achieving Business Agility While Reducing Disruption

Most organizations are in the midst of some form of digital innovation (DI) - leveraging technology to achieve specific goals—and ultimately deliver greater value to their customers. But DI also brings disruption. Disruption in the form of an expanded attack surface and the introduction of a more sophisticated threat landscape. Disruption can also lead to increased complexity as organizations try to counter these new threats with a range of new security solutions. Finally, maintaining compliance with relevant industy and regulatory standards su ...

To the download
Thumb original sd wan isnt just for retail   low res   web

SD-WAN Isn’t Just for Retail

In any organization, being responsible for cybersecurity is a complex job entailing interactions with the teams managing software development, servers, databases, storage, and networking. It becomes even more challenging where there is also a need to protect industrial installations and the Operational Technology (OT) that runs them in critical industries such as manufacturing, energy, and extraction.

Although it is not always on the OT security team’s radar, in the IT networking world Software Defined Wide Area Network, or SD-WAN, is the ho ...

To the download