Genetec to integrate CylancePROTECT

September 2019 Editor's Choice, CCTV, Surveillance & Remote Monitoring, News

Genetec has announced it is partnering with Cylance, a business unit of Blackberry, to bring AI-based antivirus protection to its appliance customers.

Through this partnership, Genetec will offer additional cyber security protection to its Streamvault family of infrastructure solutions by including CylancePROTECT out-of-the-box at no additional cost to its customers. Genetec Streamvault all-in-one and rackmount appliances, storage, and workstations are expected to be shipped pre-installed and optimised with CylancePROTECT in September 2019.

“Genetec is committed to creating secure solutions from the ground up and have practices in place to help identify and mitigate risk for our customers. Cybersecurity is at the core of our development process and we see that cyber threats are evolving faster than ever. With CylancePROTECT, Genetec is delivering the latest in prevention-first, predictive security technology to Streamvault customers and providing them with up-to-date protection, without compromising appliances’ guaranteed performance,” said Francis Lachance, director, video and appliances at Genetec.

CylancePROTECT protects endpoints and organisations from compromise by combining the power of artificial intelligence to block malware infections with additional security controls that safeguard against script-based, file-less memory, and external device-based attacks. Unlike traditional endpoint security products that rely on signatures and behaviour analysis to detect threats in the environment, CylancePROTECT uses machine learning, not signatures, to identify and block known and unknown malware from running on endpoints.

The software delivers prevention against common and unknown (zero-day) threats without an Internet connection. It continuously protects an endpoint without disrupting the end-user and provides minimal impact on system resources.

“For years, traditional antivirus prevention products relied on signatures as their primary threat protection method. Assuming all attacks on a business had been seen before, using signatures made sense. However, today, malware mutates daily, even hourly, making signature-based prevention tools obsolete. In mission-critical industries, such as the physical security industry, organisations need to think beyond traditional antivirus,” said Steve Rossi, global director of OEM sales at Cylance.

Because it uses very little computing power, CylancePROTECT will not affect the smooth running of Genetec appliances, allowing customers to benefit from proactive threat detection without monopolising crucial resources. In addition, with no Internet connection or signature updates required, CylancePROTECT will protect remote endpoints connected to the Genetec system.

For more information contact Brent Cary, Genetec, bcary@genetec.com, www.genetec.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

FortiGuard labs reports disruptive shift of cyber threats
Issue 1 2021 , Editor's Choice
Threat intelligence from the second half of 2020 demonstrates an unprecedented cyber-threat landscape where cyber adversaries maximised the constantly expanding attack surface to scale threat efforts around the world. Adversaries proved to be highly adaptable, creating waves of disruptive and sophisticated attacks.

Read more...
The year resilience paid off
Issue 8 2020 , Editor's Choice, Security Services & Risk Management
Hi-Tech Security Solutions spoke to Michael Davies about business continuity and resilience in a year when everything was put to the test.

Read more...
Retail solutions beyond security
Issue 8 2020, Axis Communications SA, Technews Publishing, Hikvision South Africa , Editor's Choice, CCTV, Surveillance & Remote Monitoring
The need for security technology to deliver more than videos of people falling or stealing from retail stores is greater than ever.

Read more...
AI-powered hardhat detection
Issue 8 2020, Hikvision South Africa , Industrial (Industry), CCTV, Surveillance & Remote Monitoring
Hardhats save lives, but only if people wear them. Intelligent, AI-powered hardhat cameras are helping to ensure workers in dangerous locations stay safe at all times.

Read more...
Decentralised operations is where it’s at
CCTV Handbook 2021, G4S Secure Solutions SA, Technews Publishing , Editor's Choice
Control rooms are evolving into operations centres that serve a variety of applications, such as risk management, surveillance, process management, network monitoring, personnel management and asset management.

Read more...
Advanced enterprise storage architecture
CCTV Handbook 2021 , Editor's Choice
Storage start-up 22dot6 launched an advanced enterprise storage architecture design for the commercial market, the industry’s first software-defined TASS (Transcendent Abstracted Storage System) architecture.

Read more...
Recover your margins with services
CCTV Handbook 2021, Technews Publishing , Editor's Choice
The security industry has reached yet another inflection point with the rise of the cloud, specifically with its utility in security services which have become an operational expenditure reality.

Read more...
The reality of the cloud
CCTV Handbook 2021, Technews Publishing , Editor's Choice
One unmistakable take-away from this year’s CCTV Handbook is that no matter whether it’s a hybrid or an ‘all-in’ model, the cloud is the new frontier for surveillance operations.

Read more...
Keeping Century City safe since 2016
CCTV Handbook 2021 , Editor's Choice
ATG Digital and Century City are celebrating five years of access and security control innovation. The relationship started with visitor registration digitisation and evolved into a collaborative partnership that birthed several custom-built solutions.

Read more...
Storage Selection Guide 2021
CCTV Handbook 2021 , Storage Selection Guide, CCTV, Surveillance & Remote Monitoring
The Storage Selection Guide 2021 includes a range of video storage and management options for small, medium and large surveillance operations.

Read more...