SlideShare uma empresa Scribd logo
1 de 8
Tech You Oughta Know
Mission & Values
2
Mission: Intelligent Security. Everywhere.
Values: Prevention is possible by using Cylance AI to prevent incursion. Eliminate 99.7% of the malicious files.
Using Advanced AI to detect and respond for the remaining .3 percent.
Company Overview
• The BlackBerry name has been around for a long time. However, it has
gone through some changes over the years. This is not your father’s
BlackBerry anymore.
• In 2019, BlackBerry bought Cylance. Cylance was an up-and-coming name
in the AI/ML world for endpoint protection and EDR.
• Over the last few years BlackBerry has evolved into a Cybersecurity
company powered by Cylance AI.
• Main offerings with Cybersecurity are: CylanceProtect (EPP) CylanceOPTICS
(EDR) CylancePERSONA (Behavioral Analytics) CylanceGATEWAY (AI Driven
VPN, ZTNA) CylanceAVERT (DLP) CylanceGUARD (MDR PROTECT, OPTICS
PERSONA and GATEWAY managed 24/7)
Use Cases
4
BlackBerry/ Cylance provides full-spectrum threat prevention that stops endpoint breaches by solving the following use
cases:
• Identify and block malicious executables without the need for constant updates or a cloud connection
• Identify security vulnerabilities and potential malicious activities by monitoring OS updates, system parameters, device
configurations, and system libraries
• Control where, how, and who can execute scripts
• Manage USB device usage and prevent unauthorized devices from being used
• Stop fileless malware attacks
• Lock down fixed-function devices such as kiosks, POS terminals, etc.
• Prevent zero-day and ransomware attacks
• Stop memory and Script-based attacks and exploitations
• Use application sandboxing and code analysis as well as app-security testing to identify malware and grayware
• Identify any malware that might come in through sideloaded applications, unique signature-based malware, or simulations
• Protection for endpoints when users are online or offline
Why ?
5
• Seventh-Generation Cybersecurity AI
• Cylance AI set the standard as one of the first machine learning (ML) models for cybersecurity.
Now in its seventh generation, Cylance AI has trained on billions of diverse threat data sets over
several years of real-world operation. Tested across an array of cybersecurity applications, its
performance has proven unparalleled effectiveness for identifying and preventing malware.
• While many security providers' claims around using AI or ML in their offerings may be true, they
may be using AI to optimize and automate some aspects of their heuristics or signature-
generation processes. But they fall short of the full promise of AI—preventing cyberthreats.
• As both a pioneer and innovator in cybersecurity AI, the Cylance AI team has and continues to
lead in research, development, application, depth and effectiveness—specifically when applying
AI and ML to the challenges of cybersecurity. And our data science-led approach to strengthen AI
models against future threat variants offers a clear advantage over solutions that use AI as a
plugin or add-on feature.
Why is it cool to you?
6
• I started my career at a VAR. I am a cybersecurity nerd. It was
interesting to me when Cylance popped on to the scene and to see
how they were utilizing AI to prevent attacks was fascinating. Fast
forward a few years and now I’m working for them. I am part of the
new era here at BlackBerry/ Cylance, tasked with showing how our
technology is second to none. We have an 8 year head start on most
EPP platforms that claim they use AI. Our technology is tested daily
against our competition and can out perform them at the endpoint.
What are YOUR goals with the organization?
7
I want to build a strong book of business and show my territory that BlackBerry/
Cylance can really deliver. Internally, I want to be the one that everyone looks to for
advice. I love helping my colleagues with different problems/issues. I want to make
it easier for clients to feel protected. That’s why we do this. Yes, money is great, but
when you have clients that trust you, the money follows. I also just had twins in
January, so I am very invested in getting the name out there!
What does integrate with?
8
That’s a good question. If you’re talking about CylancePROTECT. It can sit infront of any EDR and be the
first layer of defense.
If you’re asking can the BlackBerry/Cylance’s product set integrate with other Endpoint Protection
software or EDRs, the answer is not yet.
We offer an MDR platform to maximize the efficacy rate of our products called BlackBerry Guard. That
incorporates EPP, EDR, and Manages 24/7 it so you don’t have to worry about the alarms going off.

Mais conteúdo relacionado

Semelhante a Tech You Oughta Know - BlackBerry_Cylance.pptx

Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Jeremy Siewert
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOPDevConFu
 
Tech Trends and Best Practices for 2014
Tech Trends and Best Practices for 2014Tech Trends and Best Practices for 2014
Tech Trends and Best Practices for 2014TechSoup Canada
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityDevOps.com
 
Cyber security innovation imho v5
Cyber security innovation imho v5Cyber security innovation imho v5
Cyber security innovation imho v5W Fred Seigneur
 
11 IT Management Predictions for 2011
11 IT Management Predictions for 201111 IT Management Predictions for 2011
11 IT Management Predictions for 2011Nathan Burke
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesMighty Guides, Inc.
 
Delta g ric_consulting_presentation_erpscan_2015
Delta g ric_consulting_presentation_erpscan_2015Delta g ric_consulting_presentation_erpscan_2015
Delta g ric_consulting_presentation_erpscan_2015Tunde Ogunkoya
 
Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!Jason Jolley
 
Oracle here. now. your choice.
Oracle   here.  now.  your choice.Oracle   here.  now.  your choice.
Oracle here. now. your choice.CIOEastAfrica
 
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docxMicrosoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docxARIV4
 
DevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogDevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogStefan Streichsbier
 
2018 01 smart city symposium - db
2018 01 smart city symposium - db2018 01 smart city symposium - db
2018 01 smart city symposium - dbDavid Bressler
 
Solving the dilemma should you build or buy ai
Solving the dilemma  should you build or buy aiSolving the dilemma  should you build or buy ai
Solving the dilemma should you build or buy aiSkyl.ai
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsJulien Ott
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or looseBjørn Sloth
 

Semelhante a Tech You Oughta Know - BlackBerry_Cylance.pptx (20)

Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOP
 
Tech Trends and Best Practices for 2014
Tech Trends and Best Practices for 2014Tech Trends and Best Practices for 2014
Tech Trends and Best Practices for 2014
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber Security
 
Cyber security innovation imho v5
Cyber security innovation imho v5Cyber security innovation imho v5
Cyber security innovation imho v5
 
11 IT Management Predictions for 2011
11 IT Management Predictions for 201111 IT Management Predictions for 2011
11 IT Management Predictions for 2011
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT Practices
 
Delta g ric_consulting_presentation_erpscan_2015
Delta g ric_consulting_presentation_erpscan_2015Delta g ric_consulting_presentation_erpscan_2015
Delta g ric_consulting_presentation_erpscan_2015
 
Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!Alfresco Virtual DevCon 2020 - Security First!
Alfresco Virtual DevCon 2020 - Security First!
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
Oracle here. now. your choice.
Oracle   here.  now.  your choice.Oracle   here.  now.  your choice.
Oracle here. now. your choice.
 
The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018
 
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docxMicrosoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
Microsoft Strategic InitiativeCharls Yang, Yining Xie, Andres .docx
 
DevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogDevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together Log
 
2018 01 smart city symposium - db
2018 01 smart city symposium - db2018 01 smart city symposium - db
2018 01 smart city symposium - db
 
Solving the dilemma should you build or buy ai
Solving the dilemma  should you build or buy aiSolving the dilemma  should you build or buy ai
Solving the dilemma should you build or buy ai
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applications
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 

Último

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Último (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Tech You Oughta Know - BlackBerry_Cylance.pptx

  • 2. Mission & Values 2 Mission: Intelligent Security. Everywhere. Values: Prevention is possible by using Cylance AI to prevent incursion. Eliminate 99.7% of the malicious files. Using Advanced AI to detect and respond for the remaining .3 percent.
  • 3. Company Overview • The BlackBerry name has been around for a long time. However, it has gone through some changes over the years. This is not your father’s BlackBerry anymore. • In 2019, BlackBerry bought Cylance. Cylance was an up-and-coming name in the AI/ML world for endpoint protection and EDR. • Over the last few years BlackBerry has evolved into a Cybersecurity company powered by Cylance AI. • Main offerings with Cybersecurity are: CylanceProtect (EPP) CylanceOPTICS (EDR) CylancePERSONA (Behavioral Analytics) CylanceGATEWAY (AI Driven VPN, ZTNA) CylanceAVERT (DLP) CylanceGUARD (MDR PROTECT, OPTICS PERSONA and GATEWAY managed 24/7)
  • 4. Use Cases 4 BlackBerry/ Cylance provides full-spectrum threat prevention that stops endpoint breaches by solving the following use cases: • Identify and block malicious executables without the need for constant updates or a cloud connection • Identify security vulnerabilities and potential malicious activities by monitoring OS updates, system parameters, device configurations, and system libraries • Control where, how, and who can execute scripts • Manage USB device usage and prevent unauthorized devices from being used • Stop fileless malware attacks • Lock down fixed-function devices such as kiosks, POS terminals, etc. • Prevent zero-day and ransomware attacks • Stop memory and Script-based attacks and exploitations • Use application sandboxing and code analysis as well as app-security testing to identify malware and grayware • Identify any malware that might come in through sideloaded applications, unique signature-based malware, or simulations • Protection for endpoints when users are online or offline
  • 5. Why ? 5 • Seventh-Generation Cybersecurity AI • Cylance AI set the standard as one of the first machine learning (ML) models for cybersecurity. Now in its seventh generation, Cylance AI has trained on billions of diverse threat data sets over several years of real-world operation. Tested across an array of cybersecurity applications, its performance has proven unparalleled effectiveness for identifying and preventing malware. • While many security providers' claims around using AI or ML in their offerings may be true, they may be using AI to optimize and automate some aspects of their heuristics or signature- generation processes. But they fall short of the full promise of AI—preventing cyberthreats. • As both a pioneer and innovator in cybersecurity AI, the Cylance AI team has and continues to lead in research, development, application, depth and effectiveness—specifically when applying AI and ML to the challenges of cybersecurity. And our data science-led approach to strengthen AI models against future threat variants offers a clear advantage over solutions that use AI as a plugin or add-on feature.
  • 6. Why is it cool to you? 6 • I started my career at a VAR. I am a cybersecurity nerd. It was interesting to me when Cylance popped on to the scene and to see how they were utilizing AI to prevent attacks was fascinating. Fast forward a few years and now I’m working for them. I am part of the new era here at BlackBerry/ Cylance, tasked with showing how our technology is second to none. We have an 8 year head start on most EPP platforms that claim they use AI. Our technology is tested daily against our competition and can out perform them at the endpoint.
  • 7. What are YOUR goals with the organization? 7 I want to build a strong book of business and show my territory that BlackBerry/ Cylance can really deliver. Internally, I want to be the one that everyone looks to for advice. I love helping my colleagues with different problems/issues. I want to make it easier for clients to feel protected. That’s why we do this. Yes, money is great, but when you have clients that trust you, the money follows. I also just had twins in January, so I am very invested in getting the name out there!
  • 8. What does integrate with? 8 That’s a good question. If you’re talking about CylancePROTECT. It can sit infront of any EDR and be the first layer of defense. If you’re asking can the BlackBerry/Cylance’s product set integrate with other Endpoint Protection software or EDRs, the answer is not yet. We offer an MDR platform to maximize the efficacy rate of our products called BlackBerry Guard. That incorporates EPP, EDR, and Manages 24/7 it so you don’t have to worry about the alarms going off.