Cylance Endpoint Detection and Response

Antivirus that works for OT

Catching Threats with AI Is Catching On

The Cylance AI Platform is a cybersecurity suite that protects the complete attack surface with automated threat prevention, detection, and response capabilities.

Build your strategy on a security platform that provides best-in-class prevention, and augments and enables your team to get ahead of attackers.

With low CPU/Memory footprint, legacy platform support from XP and no signatures to update, CylancePROTECT provides a best-in-class unified protection against malware, malicious scripts and fileless attacks on your OT endpoints.

Why choose Cylance?

Cylance delivers a predictive advantage against never-before-seen malware an average of 25 months before it appears online. By using mathematical algorithms to detect malware, this removes the need for continual signature updates which is ideal for OT networks where patching and maintenance windows are limited.

Cylance’s unique artificial intelligence (AI) approach, predicts and protects against known and unknown malware, file-less attacks and zero-day payload execution. Cylance is deployed to more than 3,400 forward-thinking customers securing 14.5 million endpoints.

Find out more

Key Benefits

AI Driven Threat Protection


Get in front of malicious cyberattacks with the data science driven power of AI. CylancePROTECT works where most attacks occur; at the endpoint for better efficiency, faster resolution and less disruption.

Find out more

Prevent. Detect. Respond


CylanceOPTICS pushes all detection and response decisions down to the endpoint, eliminating response latency that can mean the difference between a minor security event and a widespread, uncontrolled security incident.

Download the datasheet

Work Smarter, Not Harder


AI-driven threat prevention, response, and attack mitigation stop attacks that legacy products miss while dramatically reducing alert fatigue. Discover hidden vulnerabilities in your environment with InSights to perform on-demand threat hunting across the enterprise.

Find out more

 Manage like a Boss


Take control of endpoints with granular controls of USB devices, running of scripts and execution of applications. Legacy Operating systems can be hardened by ‘freezing’ the version of application and executables, prohibiting the running of any additional programs that are not authorised. Furthermore, CylancePROTECT doesn’t need signature updates so is ideal for air-gapped deployments and OT systems.

Find out more

Threat Hunting


CylanceOPTICS uses automated threat detection, investigation, and response capabilities to provide continuous situational awareness. Maintain a strong security posture regardless of changes to the threat landscape, budget, or security staff. React to threats at machine speed, when a threat is detected, automated playbooks can drive responses so your system takes immediate action without requiring human intervention.

Find out more

AI-Driven Endpoint Detection and Response

“Organisations are Deploying Endpoint Detection and Response (EDR) Solutions to Accelerate Threat Detection, Reinforce Incident Response, and Complement Endpoint Threat Prevention” – ESG

Download the E-book

How The Technology Works

Profile Billions of File Samples

Cylance’s advanced AI creates profiles of basic aspects and file behaviours providing an intricate and comprehensive perspective to be evaluated and reviewed

Exhaustive File Appraisal

For each file 2.7 million points are considered in a matter of milliseconds, without opening or executing a potential threat, without endangering device or data

Determines If a Threat Is Present

Machine learning qualifies the presence or absence of features for each of these 2.7 million points, generating a score that will determine the nature of the file

Quarantines the Threat

Reduce downtime. Our AI quarantines files it identifies as threats, allowing security professionals to review individual files, without taking whole devices or networks offline

SolutionsPT OT Cyber Security Solutions

Using a Secure by Design approach we've got the answers to whatever OT cyber concerns you have.