Ideal virus protection for small and medium-sized businesses.

Companies are increasingly targeted by criminal hackers. Our Intelligent Security Software Endpoint Detection and Response) detects and thwarts cyber threats before they strike.

Try for free

PERSEUS CARE

AI based protection for businesses

Modern security software + all around protection

Perseus' antivirus solution in cooperation with BlackberryCylance is one of the most advanced and effective programs on the market. It is not just a conventional virus protection, it also recognizes potential modifications of existing malware, using artificial intelligence, even before they exist.

On this page

 

Have you been attacked by cyber criminals?

+49 30 / 95 999 80 80 (Mon - Fri 09:00am - 6:00pm) Get advice now!

More than just a virus protection - Perseus all around protection

As a Perseus customer, you receive our professional security software at unbeatable conditions. The Endpoint Detection and Response (EDR) technology is an important part of our integrated cyber security concept for small and mid-sized businesses, with multiple concerted services: security software, phishing testing, employee training and technical tools for IT security and data privacy. The professional endpoint detection solution for all devices, even of a small company (about 30 employees), can quickly cost well over 1,000 euros per year. And that would only provide technical protection. You also need to take care of employee training and awareness. With Perseus you will be able to receive the complete package.

Virus protection and prevention with Perseus

Ideally protected with artificial intelligence

Our partner Cylance's malware execution control uses artificial intelligence and machine learning to detect and prevent malware on either Windows, Mac, or Linux systems. This approach is much more effective than a classic approach, based solely on static signatures.

Protection against all cyber threats

Cyber threats, such as viruses, trojans, worms and other malware are changing and evolving on a daily basis. Malicious software, even when recognized by security software, today, it can infect your systems without being detected, tomorrow. Cylance's mathematical model uses a massive set of secure and insecure executable files for Mac, Windows, and Linux operating systems. All these records are automatically compared for similarities and differences.

Even from unknown malware

This parsed data is then used to train Artificial Intelligence to determine which files are safe or unsafe. Then, if unknown files end up on an endpoint (terminal), the security software can detect, in real-time, dangerous similarities to existing malware and prevent the files from being executed. As the landscape of malware changes, the quality of Cylance also changes, as it learns live and real-world threats without having to constantly update.

Virus protection alone is not enough

But by itself, even the best antivirus software does not provide sufficient protection against human error. Only the combination of security software, online training in cyber security and privacy, and consistent phishing awareness trainings, as included in Perseus products, protects small and medium-sized businesses from cyber threats.

Antivirus with artificial intelligence

Perseus’ security software vs. traditional virus protection

 

Traditional virus protection

 

  • Outdated technology
  • Numerous confusing features
  • Frequent updates
  • System-straining scans

 

Endpoint Detection with Perseus

 

  • Operated with artificial intelligence
  • Powerful software without frills
  • Constantly learning security software
  • No daily scans necessary

How does intelligent security software work?

Install the program on your computer in a couple of minutes and we’ll do the restores

 

Step 1: Artificial intelligence scan
  • Incoming data on your computer is checked for known malicious programs by matching it with a database.
  • Machine learning also detects unknown variations of dangerous programs.
  • Suspicious actions are automatically blocked and shielded from the "healthy" system. Inconspicuous information is passed on normally. If you have any questions, we are here for you.
Step 2: Irregularities checked by experts
  • Suspicious activity that is not clearly a cyber attack from the outset will be reported to our IT security experts.
  • These irregularities are checked by us, manually.
  • In the case of serious cyber incidents, we will inform you.

Convinced?

All around protection with Perseus

 

Try it for free

 

Companies need special virus protection

Endpoint Detection and Response - Protection against hackers on all devices

Small and medium-sized businesses, too, have ever- widening networks, making them more vulnerable to cyber incidents triggered by hackers and other criminals. Your employees’ terminals are a serious technical weakness for your company.

Endpoint protection with Perseus

Whether desktop PCs, laptops, tablets or smartphones, every device is a potential gateway to your corporate network, giving attackers the ability to access sensitive data about your company or customers. Regulate the number of devices on your network and install our intelligent Cylance security software for more cyber security on your employees' computers.

Bring your own device

The dangers of malware, ransomware, etc., are a big challenge for businesses. These pests can get into your system through various devices. As if these dangers were not already drastic enough, small and an increasing number of medium-sized organizations allow their employees to use their own private devices for professional purposes (bring your own device). You quickly lose track of which poorly protected devices are logging into your network and making data breaches more likely.

Better virus protection thanks to expert check

Once the security software detects any irregularities on your systems, the potential threats will be manually checked by our cyber security experts. This personalized service from Perseus offers a tremendous advantage over purely software-based security concepts. The combination of state-of-the-art technical tools and the expertise of our cyber security experts, grounded upon years of experience, offers the best service by humans and technology.

This approach allows us to inform you immediately in the event of serious cyber incidents and helps you to correct them and prevent damage. Private data, such as browsing history, emails, documents and other private information cannot be seen by our experts. E.g. if an Excel spreadsheet infects your computer, we have access to all of its data, because it is security-related information and we want to act in the best interest of your company. But this is the exception. As a rule, an infected document does not contain any significant commercial information.

 

Is Windows Defender sufficient?

Standard software guarantees a lot of risk

 

An antivirus program with weaknesses

If you use Windows 10 on your devices, you have preinstalled security software from Microsoft on those devices. Some tests have shown that the new Windows Defender has improved compared to previous versions. Also, it's obviously more convenient to use free, preinstalled virus protection.

Nevertheless, the weaknesses of such a standardized antivirus software for companies persist. Standardized programs are more vulnerable, because criminal hackers focus particularly on Windows Defender, its functions and vulnerabilities. After all, this software runs on a huge number of systems, and the more systems that can be infiltrated through a gap in a standard program, the more attractive it is for hackers.

Both Apple and Windows devices in operation?

Another critical point is the incompatibility of Windows Defender with multiple devices and operating systems. Nowadays, it is more common for both Windows computers and Apple devices to be used in an organization. Most design and graphics are done on Macs.

With Cylance, Perseus offers one of the most advanced EDR solutions for small and medium-sized businesses running concurrently on Windows, Apple and Linux devices. Thanks to Cylance and Perseus all your computers are under the same high level of virus protection. In addition, with Perseus you have direct emergency assistance that is customized for your situation as a company. With standardized software that is preinstalled on all Windows systems and has many millions of private and professional users, such support can, naturally, hardly be offered.

Fast, easy installation

Installing Cylance Security Software in the Perseus All Around Cyber Security Package is quick and easy. Your employees will receive all the necessary information for the installation in an e-mail. It contains download links for CylancePROTECT and CylanceOPTICS, as well as a short manual. Installing the software will take only minutes for you and your staff.

 

Which systems will the security software run on?

The security software of our partner, Cylance, runs on numerous modern system environments. Here is where you can check for yourself whether protection for your devices is included.

 

Cylance Optics:

Windows 7 and later (7, 8, 8, 8.1, 10)
Windows Server 2008 and later (2008, 2012, 2016)
MacOS X 10.10 and later (10.10, 10.11, 10.12, 10.13)
System Requirements:
4 GB of RAM
1 GB of available hard disk space
Local Administrator

Cylance Protect:

Windows XP and later (XP, 7, 8, 8, 8.1, 10)
Windows Server 2003 and later (2003, 2008, 2012, 2016, 2019)
MacOS X 10.9 and later (10.9, 10.10, 10.10, 10.11, 10.12, 10.13, 10.14)
Linux:
RedHat 6.6 and higher (6.6, 6.7, 6.8, 6.9, 6.10, 7.0, 7.1, 7.2, 7.3, 7.5, 7.6)
Ubuntu 14.04 LTS and higher(14.04, 16.04, 18.04)
Amazon Linux AMI (AMI 2017.9, AMI 2018.03, 2 2017.12)
System Requirements:
2 GB of RAM
500 MB of available hard disk space
Local Administrator

Low data storage on your devices for fast performance

Unlike other EDR solutions that create large volumes of data, Cylance's security software was designed to work directly on your computers (endpoints), with a lean infrastructure and no continuous uploads to the cloud.

An additional advantage to other EDR solutions is low data storage on your computers. Most other security solutions store all endpoint activity on your computers, including those that are guaranteed to be secure and pose no threat. Cylance collects only the forensically relevant data. This dramatically reduces the amount of data that needs to be stored on your devices, burdening them significantly less.

 

 

Additional or alternative use

Replace your old software with Cylance, or use it in addition

Cylance's EDR can replace your existing security software and offers extensive protection against hackers , Trojans, worms or other malware. But there is no problem installing and running our AI solution in addition to your existing antivirus program. In this way, your computer and data are never exposed (for example, during the software change).

Will the security software slow down my computers?

No elaborate scans and constant updates

 

Perseus' Cylance security software is a real lightweight, when it comes to using your system resources. None of your other running programs, whether browsers, writing or graphics programs, are adversely affected by the operation of Cylance. Once installed, our virus protection goes unnoticed in the background, without annoying system load, updates or pop- ups.

One of the biggest criticisms by users of anti-virus software, virus scanners, etc., is the burden on their own system. Daily scanning and updating of databases takes time and disturbs employees at work, in many cases even hindering them at times. The lean Perseus application requires only a fraction of the computing power of classic antivirus programs.

Possible costs due to inadequate virus protection

Modern security software is an integral part of cyber security for small and medium-sized businesses. Other building blocks include employee training, awareness through phishing tests and financial security. All these building blocks are a part of Perseus. When it comes to cyber incidents due to lack of IT security, it can quickly become expensive for small and medium-sized businesses.

With 70 percent, phishing attacks are the most common cause of cyber incidents in small and medium-sized enterprises (source). If one of your employees clicks on a phishing email and installs malicious software on your computer that destroys important data or inaccessibly encrypts it, you need professional staff to remedy the damage. This may include services such as IT forensics, which identify the cause of damage, as well as data recovery or legal advice on data privacy, to prevent expensive damages in consequence.

More information about the software

Still have questions? Please see our FAQ.

 

  • Product Data Sheet (german)More background information and technical details about Cylance's intelligent security software.
  • Test report (german)Even during the AV performance test, the intelligent security software achieved only the highest marks. Read the full report here.
  • Case study Caritas (german)Learn what the application of the security software looks like in practice, using the example of the charity, Caritas.
  • User report Klaus Union (german)Learn what the application of the safety software looks in practice: the example of the market leader in the manufacture and sale of industrial pump systems and valves.

We take care of your cyber security, you of your business.

We enable employees to actively contribute to the cyber security of your company.

Get a custom offer for your business now

Any questions?
We are here for you.

Arrange a free consultation with our IT security experts. We look forward to meeting you.

+49 030/95 999 80 80 (Mon - Fri 09:00am - 6:00pm)