Cylance and JASK Partner to Integrate Endpoint Security Solution into JASK’s Autonomous Security Operations Center Platform

Technology Alliance Provides Customers a Single Source for Unprecedented Visibility Across Data and Assets from Endpoints to Data Center

January 18, 2018 – SAN FRANCISCO and IRVINE, CALIF – JASK and Cylance Inc. today announced a technology alliance through which JASK’s Autonomous Security Operations Center (ASOC) platform will integrate with the CylancePROTECT® AI-powered endpoint security platform.

The JASK ASOC platform frees analysts from the mundane data collection, aggregation and normalization effort to become proactive threat investigators and responders. Driven by AI and machine learning, the JASK ASOC platform couples data collection and visibility from a multitude of sources with AI-based actionable insights that produce meaningful recommendations to IT department staff. CylancePROTECT redefines what antivirus (AV) can and should do for organizations by leveraging artificial intelligence to detect and prevent malware from executing on endpoints in real time.

Through the integration, joint customers will be able to ingest Cylance Threat Event, Alert, Threat Classification and Audit logs into JASK, offering improved context and visibility. For example, the ability to autonomously bring together Cylance data about malware on an endpoint with information about malicious application behavior presented in JASK’s ASOC platform provides unprecedented insights and actionable intelligence without all of the manual work required today.

“The integration of JASK and Cylance gives security operations teams the ability to tap into network data, which provides important context that has been missing,” said Malcolm Harkins, chief security and trust officer at Cylance. “Security analysts gain more knowledge that allows them to make faster, more precise decisions about threats – thereby reaching new levels of efficiency and effectiveness.”

The combination of JASK and Cylance delivers customers a single source for unparalleled visibility across all data and assets. Cylance reduces noise and identifies unknown threats, while JASK uniquely fuses its data with information from existing security solutions and applies AI and machine learning to automate a smarter correlation and analysis of threat alerts to a meaningful incident.

“This partnership that integrates two AI-driven technologies delivers customers an unprecedented level of insights, representing the evolution of future SOC requirements,” said Greg Martin, CEO of JASK. “Collaborating with a known industry innovator like Cylance elevates SOC teams’ ability to better stay ahead of adversaries.”

The agreement with Cylance demonstrates how JASK is focused on building its ecosystem of security partners to better combat malicious cyber actors. For more information on becoming a JASK technology alliance or reseller partner, please visit

About JASK

JASK is modernizing security operations to reduce organizational risk and improve human efficiency. Through technology consolidation, enhanced AI and machine learning, the JASK Autonomous Security Operations Center (ASOC) platform automates the correlation and analysis of threat alerts, helping SOC analysts focus on highest-priority threats, streamlining investigations and delivering faster response times.

About Cylance® Inc.

Cylance is the first company to apply artificial intelligence, algorithmic science and machine learning to cybersecurity to prevent the most advanced security threats in the world. Using a breakthrough predictive analysis process, CylancePROTECT quickly and accurately identifies what is benign and what is a threat, and prevents malicious code from ever executing on a targeted system. By coupling advanced machine learning and artificial intelligence with a unique understanding of an attacker’s mentality, Cylance provides technology and services that are truly predictive and preventive against the most advanced threats.


Jessica MacGregor
fama PR for JASK
(617) 986-5024
[email protected]

Skygofree malware displays never-before-seen surveillance features

With a long history of governments trying to eavesdrop through WhatsApp or break its encryption, the sophistication of this malware is far above common criminal-level,” Rod Soto, director of security research at JASK told SC Media. “The app allows for true end-to-end encryption – making it a good tool for private communications. As such, it has been abused by criminals.

Read Full Article Here

Critical vulnerability afflicts all processor chips, not just Intel’s

“The flaw in Intel processors presents complicated scenarios – mostly for the millions of devices powered by them that could be affected,” said Rod Soto, director of security research at JASK, which makes a security operations platform. “Some devices may be patchable, but others may not. Reports indicate that popular and commonly used virtualization/cloud platforms are impacted by this flaw, and a number of these devices may indeed be fixable via updates – with security risks mitigated if done in due time.”

Read Full Article Here.

Data on 123M US households exposed in latest misconfigured AWS cloud storage case

“Discussing the possibility that the data may have been accessed, JASK’s Director of Security Research, Rod Soto told SiliconANGLE that “there’s a good chance data is the wrong hands” as “malicious actors are using many different tools to discover such buckets, or they are finding information in other sources such as, or by performing other attacks that may get hints or direct clues of the use of AWS buckets.”

Read Full Article Here.

What is a botnet? And why they aren’t going away anytime soon

“In addition to creating a common, worldwide cybercrime enforcement system, there also needs to be standard regulations for manufacturers, requiring a certain level of minimal security in IoT devices. "Any regulation must also apply to all manufacturers, as many markets tend to be flooded with very cheap devices produced in regions where internet laws are very lax or non-existent," says Rod Soto, director of security research at Jask, an AI cybersecurity startup.”

Read Full Article Here.

Flaw in macOS High Sierra allows easy access

“The MacOS High Sierra vulnerability is alarming because it makes it seamless for someone to log into a system as root. While there are other methods that can provide bad actors with access and password reset capabilities via physical access, these require some technical knowledge and time,” said JASK Director of Cybersecurity Rod Soto, who has tested and verified the flaw. “The severity of this is how simple and quick anyone can execute the method and log in to reset and access user information even if their passwords are complicated.”

Read Full Article Here.

Death of the Tier 1 SOC Analyst

"Greg Martin, founder of startup JASK, which offers an artificial intelligence-based SOC platform, says Tier 1 analysts are basically the data entry-level job of cybersecurity. "We created it out of necessity because we had no other way to do it," he says. But he envisions them ultimately taking on more specialized tasks such as assisting in investigations using intel they gather from an incident."

Read Full Article Here.

Cool Companies in Cognitive Computing

"JASK, an enterprise artificial intelligence (AI) cybersecurity company, that recently launched with the announcement of $12 million in Series A funding, offers a cloud platform that uses machine learning and AI to deliver end-to-end network monitoring—identifying and triaging the most relevant attacks, and allowing security analysts to focus their resources on only the most dangerous threats."

Read Full Article Here.

What is Bad Rabbit? Petya-Style Ransomware Attack Hits Russia, Ukraine

"Security researchers reported Tuesday a new wave of potentially destructive ransomware known as Bad Rabbit. The malicious attack spread quickly across computer systems in Eastern Europe, including targets in Russia and Ukraine, and has been detected in the United States.

The outbreak of Bad Rabbit, which reportedly bears some similarity to the damaging Petya/NotPetya wiper attack that spread earlier this year, resulted in service outages at news agencies, train stations and airports among other organizations."

Read Full Article Here.

10 Cyber Attacks Machine Learning Can Help Prevent

"Not even Cersei Lannister's scheming or Sir Jorah's father-like protectiveness could have prevented attackers from breaching HBO's network and stealing 1.5 terabytes of data (including unreleased Game of Thrones episodes). Machine learning, however, may have offered a more sound defense of HBO's virtual fortress.

Artificial intelligence (AI) and machine learning (ML) are the topics of much debate, especially within the cybersecurity community. Is machine learning the next big security frontier? Is AI ready to take on machine learning-driven attacks? Is AI even ready for use, generally speaking? No matter your conviction about whether machine learning is cybersecurity's savior, two things remain true: There is a place for analytics in security, and there are specific use cases where machine learning represents the best answer we have today."

Read Full Article Here.