CRN Exclusive: Unisys Rolls Out New Endpoint Protection Solution To Thwart Malware Attacks

Printer-friendly version Email this CRN article

Unisys has combined its consulting and managed security services with Cylance's advanced threat protection technology to combat malware threats on endpoints.  

The Blue Bell, Pa.-based company, No. 19 on the 2017 CRN Solution Provider 500, said its new advanced endpoint protection solution would use artificial intelligence and machine learning to protect customers against cyber threats.

Many of Unisys's customers today still depend on legacy, signature-based antivirus technologies to protect the endpoint, said Jonathan Goldberger, vice president of Unisys Security Solutions. But Cylance's portfolio relies on machine learning, Goldberger said, allowing organizations to evolve their protection as new strains of malware become virulent.

[Related: Unisys Combines Services, Enterprise Teams In Response To Revenue Drop]

Unisys manages and secures more than three million endpoint devices, according to Goldberger. Organizations typically pay Unisys hundreds of thousands of dollars to manage and maintain their endpoints, Goldberger said, with the per-endpoint price varying based on the number of endpoints being protected and the duration of the management term.

Organizations can turn to Unisys for help around security strategy, design and implementation while retaining management over their own technology, according to Goldberger. However, Goldberger said most businesses determine they can get better protection for less money by letting Unisys manage their security portfolio.

Some organizations are specifically looking for better malware protection and to adopt new machine learning approaches, with Goldberger said Unisys should now be well-situated to support. And a significant number of Unisys's customers under management aren't currently using endpoint protection with malware prevention, which Goldberger said presents a golden migration opportunity.

Although malware protection isn't necessarily new, Goldberger said many clients in the Fortune 1000 or Fortune 2000 still think they're sufficiently protected with a legacy antivirus product. Goldberger hopes Unisys's new offering will help organizations evolve from a legacy, signature-based approach to holistic endpoint protection.

The company spoke extensively with existing clients to understand what they were looking for from an endpoint protection standpoint before opting to work with Cylance, according to Goldberger. Unisys knew it wanted to work with an endpoint security vendor with an open system that would allow the company to have access to data for analytics purposes, Goldberger said.

Organizations sourcing Cylance through Unisys will benefit from the company's back-end analytics engine that collates information to ascertain the real risk businesses face, according to Goldberger. Unisys has a team of analytics engineers dedicated to extracting more meaning from the data generated by Cylance, Palo Alto Networks and LogRhythm, Goldberger said.    

For instance, Goldberger said other behavior analytics providers score individual users based on the security risk they pose. But Unisys takes things a step further by looking at the data flowing from the endpoint and finds the most prevalent risk factor such as access to Facebook or executions by certain programs, according to Goldberger.

As a result, Goldberger said Unisys can tell clients which risks would be most worthwhile to address, and with what controls. Poor hygiene is the culprit for many breaches or instances of data loss, according to Goldberger.

Customers have told Goldberger that they are trying to manage between 50 and 70 different security vendors, each of which has their own individual portal. End customers are therefore only getting between 20 percent and 30 percent of the true value out of their technology, Goldberger said, and are finding it extremely difficult to cross-reference data points.

"It's just not sustainable," Goldberger said. "It's not tenable."

Printer-friendly version Email this CRN article