Companies are increasingly targeted by criminal hackers. Our Intelligent Security Software Endpoint Detection and Response) detects and thwarts cyber threats before they strike.
Modern security software + all around protection
Perseus' antivirus solution in cooperation with BlackberryCylance is one of the most advanced and effective programs on the market. It is not just a conventional virus protection, it also recognizes potential modifications of existing malware, using artificial intelligence, even before they exist.
As a Perseus customer, you receive our professional security software at unbeatable conditions. The Endpoint Detection and Response (EDR) technology is an important part of our integrated cyber security concept for small and mid-sized businesses, with multiple concerted services: security software, phishing testing, employee training and technical tools for IT security and data privacy. The professional endpoint detection solution for all devices, even of a small company (about 30 employees), can quickly cost well over 1,000 euros per year. And that would only provide technical protection. You also need to take care of employee training and awareness. With Perseus 360 ° you will be able to receive the complete package.
Ideally protected with artificial intelligence
Our partner Cylance's malware execution control uses artificial intelligence and machine learning to detect and prevent malware on either Windows, Mac, or Linux systems. This approach is much more effective than a classic approach, based solely on static signatures.
Cyber threats, such as viruses, trojans, worms and other malware are changing and evolving on a daily basis. Malicious software, even when recognized by security software, today, it can infect your systems without being detected, tomorrow. Cylance's mathematical model uses a massive set of secure and insecure executable files for Mac, Windows, and Linux operating systems. All these records are automatically compared for similarities and differences.
This parsed data is then used to train Artificial Intelligence to determine which files are safe or unsafe. Then, if unknown files end up on an endpoint (terminal), the security software can detect, in real-time, dangerous similarities to existing malware and prevent the files from being executed. As the landscape of malware changes, the quality of Cylance also changes, as it learns live and real-world threats without having to constantly update.
But by itself, even the best antivirus software does not provide sufficient protection against human error. Only the combination of security software, online training in cyber security and privacy, and consistent phishing awareness trainings, as included in Perseus 360° products, protects small and medium-sized businesses from cyber threats.
All around protection with Perseus 360°
Endpoint Detection and Response - Protection against hackers on all devices
Small and medium-sized businesses, too, have ever- widening networks, making them more vulnerable to cyber incidents triggered by hackers and other criminals. Your employees’ terminals are a serious technical weakness for your company.
Whether desktop PCs, laptops, tablets or smartphones, every device is a potential gateway to your corporate network, giving attackers the ability to access sensitive data about your company or customers. Regulate the number of devices on your network and install our intelligent Cylance security software for more cyber security on your employees' computers.
The dangers of malware, ransomware, etc., are a big challenge for businesses. These pests can get into your system through various devices. As if these dangers were not already drastic enough, small and an increasing number of medium-sized organizations allow their employees to use their own private devices for professional purposes (bring your own device). You quickly lose track of which poorly protected devices are logging into your network and making data breaches more likely.
Once the security software detects any irregularities on your systems, the potential threats will be manually checked by our cyber security experts. This personalized service from Perseus offers a tremendous advantage over purely software-based security concepts. The combination of state-of-the-art technical tools and the expertise of our cyber security experts, grounded upon years of experience, offers the best service by humans and technology.
This approach allows us to inform you immediately in the event of serious cyber incidents and helps you to correct them and prevent damage. Private data, such as browsing history, emails, documents and other private information cannot be seen by our experts. E.g. if an Excel spreadsheet infects your computer, we have access to all of its data, because it is security-related information and we want to act in the best interest of your company. But this is the exception. As a rule, an infected document does not contain any significant commercial information.
If you use Windows 10 on your devices, you have preinstalled security software from Microsoft on those devices. Some tests have shown that the new Windows Defender has improved compared to previous versions. Also, it's obviously more convenient to use free, preinstalled virus protection.
Nevertheless, the weaknesses of such a standardized antivirus software for companies persist. Standardized programs are more vulnerable, because criminal hackers focus particularly on Windows Defender, its functions and vulnerabilities. After all, this software runs on a huge number of systems, and the more systems that can be infiltrated through a gap in a standard program, the more attractive it is for hackers.
Another critical point is the incompatibility of Windows Defender with multiple devices and operating systems. Nowadays, it is more common for both Windows computers and Apple devices to be used in an organization. Most design and graphics are done on Macs.
With Cylance, Perseus offers one of the most advanced EDR solutions for small and medium-sized businesses running concurrently on Windows, Apple and Linux devices. Thanks to Cylance and Perseus 360 ° all your computers are under the same high level of virus protection. In addition, with Perseus you have direct emergency assistance that is customized for your situation as a company. With standardized software that is preinstalled on all Windows systems and has many millions of private and professional users, such support can, naturally, hardly be offered.
Installing Cylance Security Software in the Perseus 360 ° All Around Cyber Security Package is quick and easy. Your employees will receive all the necessary information for the installation in an e-mail. It contains download links for CylancePROTECT and CylanceOPTICS, as well as a short manual. Installing the software will take only minutes for you and your staff.
The security software of our partner, Cylance, runs on numerous modern system environments. Here is where you can check for yourself whether protection for your devices is included.
Windows 7 and later (7, 8, 8, 8.1, 10)
Windows Server 2008 and later (2008, 2012, 2016)
MacOS X 10.10 and later (10.10, 10.11, 10.12, 10.13)
4 GB of RAM
1 GB of available hard disk space
Windows XP and later (XP, 7, 8, 8, 8.1, 10)
Windows Server 2003 and later (2003, 2008, 2012, 2016, 2019)
MacOS X 10.9 and later (10.9, 10.10, 10.10, 10.11, 10.12, 10.13, 10.14)
RedHat 6.6 and higher (6.6, 6.7, 6.8, 6.9, 6.10, 7.0, 7.1, 7.2, 7.3, 7.5, 7.6)
Ubuntu 14.04 LTS and higher(14.04, 16.04, 18.04)
Amazon Linux AMI (AMI 2017.9, AMI 2018.03, 2 2017.12)
2 GB of RAM
500 MB of available hard disk space
Unlike other EDR solutions that create large volumes of data, Cylance's security software was designed to work directly on your computers (endpoints), with a lean infrastructure and no continuous uploads to the cloud.
An additional advantage to other EDR solutions is low data storage on your computers. Most other security solutions store all endpoint activity on your computers, including those that are guaranteed to be secure and pose no threat. Cylance collects only the forensically relevant data. This dramatically reduces the amount of data that needs to be stored on your devices, burdening them significantly less.
Cylance's EDR can replace your existing security software and offers extensive protection against hackers , Trojans, worms or other malware. But there is no problem installing and running our AI solution in addition to your existing antivirus program. In this way, your computer and data are never exposed (for example, during the software change).
Perseus' Cylance security software is a real lightweight, when it comes to using your system resources. None of your other running programs, whether browsers, writing or graphics programs, are adversely affected by the operation of Cylance. Once installed, our virus protection goes unnoticed in the background, without annoying system load, updates or pop- ups.
One of the biggest criticisms by users of anti-virus software, virus scanners, etc., is the burden on their own system. Daily scanning and updating of databases takes time and disturbs employees at work, in many cases even hindering them at times. The lean Perseus application requires only a fraction of the computing power of classic antivirus programs.
Modern security software is an integral part of cyber security for small and medium-sized businesses. Other building blocks include employee training, awareness through phishing tests and financial security. All these building blocks are a part of Perseus 360°. When it comes to cyber incidents due to lack of IT security, it can quickly become expensive for small and medium-sized businesses.
With 70 percent, phishing attacks are the most common cause of cyber incidents in small and medium-sized enterprises (source). If one of your employees clicks on a phishing email and installs malicious software on your computer that destroys important data or inaccessibly encrypts it, you need professional staff to remedy the damage. This may include services such as IT forensics, which identify the cause of damage, as well as data recovery or legal advice on data privacy, to prevent expensive damages in consequence.
Still have questions? Please see our FAQ.