sb-au logo
Story image

KPMG and Cylance team up to secure enterprise endpoints

27 Jun 2018

US audit, tax and advisory firm KPMG and endpoint security provider Cylance have announced an alliance to protect enterprises with predictive AI-based security solutions and specialised services. 

KPMG’s Cyber Security Services practice guides enterprises through governance, organisational transformation, cyber defence and incident response. 

The alliance with Cylance adds AI-enabled endpoint security technology to KPMG’s portfolio of security strategy and roadmap services.

KPMG cyber response services principal and national leader Ed Goings says, “With the proliferation of cybersecurity incidents, organisations are grappling with how to protect their data with limited personnel and resources." Said

"Through our alliance with Cylance, we can now offer clients an AI-powered cybersecurity solution that focuses on proactively preventing both known and unknown threats before they cause harm.”

Cylance and KPMG Cyber Security Services enable security teams to prevent and respond to attacks more effectively, and KPMG professionals leverage Cylance’s ThreatZERO services to assess enterprise environments to strategically deploy Cylance’s solutions.

The combination of KPMG and Cylance’s services and technologies assist companies with:

  • Endpoint protection and threat prevention: Use advanced AI and machine learning technology to instantly identify, detect and prevent attacks against the most vulnerable facet of enterprise networks, the endpoint  
  • Rapid incident response: Quickly deploy an AI-driven, cloud-based endpoint detection and response solution to rapidly respond to incidents regardless of network size or endpoint location  
  • Compromise assessments: Generate deeper insight into enterprise networks through advanced data and analytics to quickly detect compromises and intrusions  
  • General Data Protection Regulation compliance: Help ensure the integrity and confidentiality of sensitive data through continuous monitoring  
  • Cyber due diligence: Every merger, acquisition, and/or divestiture should include a cybersecurity assessment to identify and remediate any gaps that could have a significant impact on a deal  
  • Third-party risk assessments: A level of comfort that critical third-parties that access networks do not have malware  
  • Managed response services: Provide end-to-end support for endpoint protection, including strategy, implementation, monitoring, response and reporting

Cylance chairman and chief executive officer Stuart McClure says, “Cylance’s AI-powered threat prevention technology and services complements the industry knowledge of KPMG’s professionals, helping clients solve business challenges while protecting their systems and sensitive data from threats.”

Cylance achieved over 99% security effectiveness and received a recommended rating in NSS Labs’ second annual Next-Generation Advanced Endpoint Protection Group Test.

Most recently, KPMG has been positioned as a leader in the 2018 IDC MarketScape for US incident response services.

According to the IDC report, “KPMG customer feedback included praise for incident response communications, overall incident handling, and service delivery.”

Story image
Plugging the gaps: Australian organisations are leaving their defence barriers wide open
Cybercriminals are are walking through the gaping holes in Australia’s organisational defences – gaps that leadership teams don’t even realise are there.More
Story image
Global attack volume down, but fraud and cyber threats still going strong
“The move to digital, for both businesses and consumers, has been significant. Yet with this change comes opportunity for exploitation. Fraudsters look for easy targets: whether government support packages, new lines of credit or media companies with fewer barriers to entry."More
Story image
ConnectWise launches bug bounty program to bolster cybersecurity strategy
“Crowdsourcing in this way represents a solid additional layer of security, and we clearly value the community's expertise and participation in helping us keep our products secure."More
Story image
Interview: Check Point profiles 5 battles that SOC teams face in 2020
Security operations centres (SOCs) are often the first lines of defence.More
Story image
ESET launches the latest version of its Mobile Security solution
“With this latest version of ESET Mobile Security, we want to ensure our users feel completely secure when performing financial transactions on their devices, in addition to being protected from malware and phishing attempts."More
Story image
Video: 10 Minute IT Jams - The benefits of converged cloud security
Today, Techday speaks to Forcepoint senior sales engineer and solutions architect Matthew Bant, who discusses the benefits of a converged cloud security model, and the pandemic's role in complicating the security stack in organisations around the world.More