F
ForgottenSeer 69673
ForgottenSeer 58943, is fort knox firewall any good? That is what I used along with cylance protect. Along with appguard, voodooshield and mb antiexploit, windscribe vpn and shadow defender.
You only miss SpyShelter there.ForgottenSeer 58943, is fort knox firewall any good? That is what I used along with cylance protect. Along with appguard, voodooshield and mb antiexploit, windscribe vpn and shadow defender.
You only miss SpyShelter there.
I do use Spyshelter now but did not use it when I was using Cylance protect
ForgottenSeer 58943, is fort knox firewall any good? That is what I used along with cylance protect. Along with appguard, voodooshield and mb antiexploit, windscribe vpn and shadow defender.
Holy protection batman!
I haven't evaluated Cylance with adjunct technologies other than hardware technologies. We tested it behind a UTM with the UTM providing DNS, Web, Application Filtration and the heavy lifting involved with all of that. Cylance was quite nice behind a qualified, effective UTM appliance. In fact, it's a great setup IMO. (assuming you won't have lateral attacks) But I personally wouldn't run it without adjunct technologies as a normal consumer, so you are probably doing the right thing there if not stacking a few too many things perhaps?
I'm thinking for home users, tossing Cylance behind Gryphon, Dojo, F-Secure Sense, Cujo, Firewalla, Norton Sphere, Bit Defender Box or some other UTM/UTM-Like appliance would be pretty decent. All of the filtration of websites, DNS and traffic scanning would be offloaded to hardware, and Cylance could run as the exclusive and only solution on the desktops and probably still be fairly protected. That is decent until one of your IoT devices decides to move laterally and attack your systems.
I'm envisioning this for the average consumer; You have a Gryphon your gateway. It's filtering all of the web traffic (thank's to ESET/Zvelo), offering parental controls, and scanning for traffic anomalies (ML/AI IPS System). That closes off almost all vectors from 80/443 (etc) without any load on any devices AND providing some level of lateral network attack protection. Toss Cylance on the endpoints for a near-zero weight solution that's probably secure enough for anyone.
Over on Spiceworks Cylance gets some interesting threads from marketing shills, like this:
So my question is - all of these shills and IT guys promoting Cylance - do they not understand the threat vectors of their customers? How are they planning to protect their customers from Phishing or Web Exploits? How about rogue browser extensions? DNS attacks? The list goes on and on, and the more I read the more I feel bad about Cylance.
Tell me I am wrong Lockdown, tell me Cylance is magical unicorn technology. Please. I want to believe.
3,800 enterprises think beyond security layers to predict and prevent cybersecurity attacks with next-generation artificial intelligence
The question might be if their product itself is not protecting from all that other stuff what are they running along side it?
Those are expeeeeensive
'Once Cylance is installed, you don't care what your employees browse to and click on'..
The U.S. enterprise market is all about the decision makers covering their asses. So they gravitate strongly towards solutions that place highest in the AV lab tests. In other words those with long track records of placing high in AV lab test. That way, if the company ends up in court - being sued by some party that was harmed because of a data breach - they can say "We used the best performing security solution available..."
This is actually 100% correct. I have a good amount of experience in the enterprise/corporate market. The common thought mentality is - 'We can at least prove we implemented the best solutions!'. That in and of itself absolves them of a good measure of liability.
I cannot even tell you how many times I have heard that sentence in some variance.
Scratching my head emoticonI know right? But what are your thoughts on Fort Knox Firewall?
h all of that. Cylance was quite nice behind a qualified, effective UTM appliance. In fact, it's a great setup IMO. (assuming you won't have lateral attacks) But I personally wouldn't run it without adjunct technologies as a normal consumer, so you are probably doing the right thing there if not stacking a few too many things perhaps?
I'm thinking for home users, tossing Cylance behind Gryphon, Dojo, F-Secure Sense, Cujo, Firewalla, Norton Sphere, Bit Defender Box or some other UTM/UTM-Like appliance would be pretty decent. All of the filtration of websites, DNS and traffic scanning would be offloaded to hardware, and Cylance could run as the exclusive and only solution on the desktops and probably still be fairly protected. That is decent until one of your IoT devices decides to move laterally and attack your systems.