Skip Navigation
BlackBerry Blog

Cylance and JASK: Delivering a Single Information Source

NEWS / 05.31.18 / The Cylance Team

The Cylance Axiom Alliances Program is a community of cybersecurity solution providers working together to deliver a prevention-first approach to security.

Unlike other ecosystems built around the assumption of compromise, Axiom vendors are committed to using AI to continuously prevent adversaries from harming organizations by delivering added security controls that, when combined, minimize an organization’s attack surface and enable swift action across the organization’s entire environment, whether it be on-premises, IoT devices, hosted, or public cloud.

Cylance and JASK

Cylance and JASK formed a technology alliance that integrates two best in class, AI-driven technologies that deliver an unprecedented level of protection and insights, representing the evolution of future SOC requirements.

Value Statement

The integration between Cylance and JASK allows joint customers to ingest Cylance Threat Event, Alert, Threat Classification and Audit logs into JASK, offering improved context and visibility.

For example, the ability to autonomously bring together Cylance data about malware on an endpoint with information about malicious application behavior presented in JASK’s ASOC platform provides unprecedented insights and actionable intelligence without the manual work required today.

The Cylance-JASK technology alliance is a seamless integration founded on artificial intelligence and machine learning. Individually, the two companies are committed to simplifying the actions needed to keep an enterprise secure, uninterrupted, and functioning at its core business mission.

Jointly addressing the goal to simplify starts with a prevention-first strategy that can make accurate decisions on attacks. Cylance technology communicates a signal-rich feed to JASK’s Autonomous Security Operations Platform which allows the analyst’s tasks to be focused, confident, and rewarding.

While analysts sleep, Cylance technology and JASK work collaboratively to make preventative decisions and uncover interesting changes within the endpoint, network, users, or logs.

CylancePROTECT® is not an average endpoint protection platform. JASK ASOC is not an average security operations platform. Together, they provide actionable intelligence that resonates in freedom for the security team: freedom from complexity, freedom from noise, freedom from dead-end tasks, and freedom to succeed.

Use Case

Lower Mean Time to Respond (MTTR) To Alerts:

  • Challenge: SOC analysts must sort through and prioritize a myriad of alerts and then perform investigations involving research and correlation, which can take a significant amount of time and is prone to error.
  • Solution: With Cylance’s prevention-first methodology, which lowers noise (less infections, alerts, remediations, and re-imaging), along with JASK’s AI-based analytics that automates all data aspects of alert-based workflows (including alert data from Cylance), customers can respond faster with greater efficiency and accuracy to modern threats.
  • Additional Benefit: With the above solution, SOC analysts will get more time back to perform more important tasks for the security organization.

Cylance Axiom Alliances Program

To accelerate achieving these results, Cylance implemented a comprehensive framework to guide the growth and maturation of its strategic relationships. Cylance recognizes the need for tactical success to fuel mutual investment.

Cylance executes on a straightforward engagement model to drive short term wins and build momentum for relationships within its alliance partners and the customer community. This model successfully activates relationships and builds momentum to drive growth.

More information on the program is available HERE.

The Cylance Team

About The Cylance Team

Our mission: to protect every computer, user, and thing under the sun.

Cylance’s mission is to protect every computer, user, and thing under the sun. That's why we offer a variety of great tools and resources to help you make better-informed security decisions.