Math vs. Malware: How Cylance Uses Math to Defeat Malware


Download This asset is brought to you by:

The information submitted is collected by both UBM and our sponsor. Click here to view our sponsor's privacy policy.

Enterprise security personnel are defending a castle riddled with holes, secret passageways, and protected by ineffective barriers. These weak points are a consequence of poor quality security software, inferior hardware, and backdoors planted by malicious insiders. The end result is a begrudging acceptance that the attackers are winning the cybersecuirty war.

In order to keep up with modern attackers, security technologies need to evolve without relying on human intervention. That's where math and machine learning have the advantage. If we can objectively classify "good" files from "bad" based on mathematical risk factors, then we can teach a machine to make the appropriate decisions on these files in real time, allowing the "good" files to run, and the "bad" files to be quarantined BEFORE they can cause harm.

In this report, Cylance demonstrates that a math and machine learning approach to computer security will fundamentally change the way we understand, categorize and control execution of every file. We'll also discuss how our products leverage this approach and demonstrate just how different they are from every other security offering on the market.

0 Comment

Leave a Reply

Captcha image


  • 5300c769af79e

    White House Call for Set-Top Competition Strikes Nerves

    The Obama administration last week called on the Federal Communications Commission to open the cable TV set-top box market to competition.The real issue is that the set-top box "is becoming less of a point of interconnection for video and other services," he told the E-Commerce Times.
  • 5300c769af79e

    Lenovo Shows Off Bendable Phones, Tablets

    At the company's Tech World Expo in San Francisco, Chief Technology Officer Peter Hortensius said there are two main engineering obstacles to overcome.First, Lenovo's focus groups have shown that people want to interact with the phone or tablet when it's folded.
  • 5300c769af79e

    4 Reasons to Build an Agile Data Mart

    They solved those problems by creating an agile data mart based on SAP HANA in-memory database technology.The agile data mart was a repository for the company's data that was designed to meet the needs of its business analysts and to provide blazing fast performance.
  • 5300c769af79e

    The Technology You Need to Outfit Your Smart Home

    Bedroom Turn down the lights and turn up the tech in the most blissful and restful place in the house.Backyard Maximize your fun-in-the-sun time with these cool gadgets that help ease the burden of outdoor chores and keep your alfresco oasis in tip-top shape.