Fujitsu picks Cylance to extend AI-powered endpoint protection

Cylance Inc., a provider of AI-driven, prevention-first security solutions, and Fujitsu America, Inc., a information and communication technology (ICT) company, has announced an alliance that will leverage the cyber threat intelligence capabilities of both companies to deliver a more robust, resilient protection and detection security services portfolio, the company said.

The partnership will deliver advanced protection to enterprise customers utilizing predictive AI-based security solutions and professional services.

Fujitsu began installing Cylance technologies in its global security operations center (SOC) in 2017 in order to secure its customers´ endpoints. With the extension of the global relationship to include the Americas region, customers in the United States can now benefit from Cylance´s industry-leading AI-powered endpoint detection, prevention, response, managed services, and research and intelligence capabilities. The partnership facilitates the direct integration and configuration of CylancePROTECT® and CylanceOPTICSâ„¢ into the Fujitsu intelligent SOC and security services to automatically detect and prevent attacks.

Fujitsu is the Japanese information and communication technology (ICT) company, offering a full range of technology products, solutions, and services. Approximately 140,000 Fujitsu people support customers in more than 100 countries. We use our experience and the power of ICT to shape the future of society with our customers. Fujitsu Limited (TSE: 6702) reported consolidated revenues of 4.1 trillion yen (US USD 39 billion) for the fiscal year ended March 31, 2018. For more information, please see

Cylance develops artificial intelligence to deliver prevention-first, predictive security products and specialized security services that change how organizations approach endpoint security. Cylance´s security solutions provide full spectrum predictive threat prevention and visibility across the enterprise, combating threats such as malware, ransomware, fileless malware, malicious scripts, weaponized docs, and other attack vectors.