Cylance Inc., the leading provider of AI-driven, prevention-first security solutions, announced the availability of application programming interfaces (APIs) as part of its leading endpoint detect and respond offering, CylanceOPTICS™.
Thousands of CylancePROTECT® and OPTICS customers around the world now benefit from automated, repeatable tasks and the improved ability to identify and respond to advanced threats without an increase in headcount or process complexity. Extensive APIs enable security teams to more efficiently view, enrich, and contextualize real-time intelligence collected at the endpoint to keep critical systems secure.
CylanceOPTICS exposes field-tested artificial intelligence to detect and prevent advanced threats, enabling organizations to use automated analyses to disrupt attackers across their environments. It also builds the policies for device control and memory exploitation protection that prevent attacks from executing in the network.
“Our robust AI platform not only automatically prevents successful attacks, but it also informs other security and IT systems that may need to take action based on threat activity,” said Sasi Murthy, vice president of product marketing at Cylance. “By making that data accessible in real time, we can absolutely improve threat visibility, but we can also improve an organization’s ability to drive policy compliance, monitor device health, and maintain situational awareness across their vast and changing IT environments.”
The availability of powerful APIs increases the sophistication of CylanceOPTICS by creating automated workflows to generate helpdesk tickets, initiate data collection, quarantine files, or launch other tasks in real time. Organizations large and small benefit from increased flexibility in their security stack because of the interoperability with existing technology investments such as security orchestration, automation, response (SOAR) and security information and event management (SIEM) tools.
Users of Cylance next-generation AI enjoy the ability to correlate endpoint data against known and prospective threats, which provides increased understanding of the attack surface. Security teams also benefit from the speed and accuracy of bringing new devices online and implementing changes across their ecosystems on the fly.