{"id":1119,"date":"2024-09-23T11:56:02","date_gmt":"2024-09-23T15:56:02","guid":{"rendered":"https:\/\/web.uri.edu\/draft-its\/?p=1119"},"modified":"2024-12-12T14:08:48","modified_gmt":"2024-12-12T19:08:48","slug":"cylance","status":"publish","type":"post","link":"https:\/\/web.uri.edu\/draft-its\/cylance\/","title":{"rendered":"Cylance"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h2 class=\"wp-block-heading\">Cylance<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/Cylance.jpg\" alt=\"\" class=\"wp-image-1120\" style=\"width:250px;height:250px\" srcset=\"https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/Cylance.jpg 1000w, https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/Cylance-300x300.jpg 300w, https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/Cylance-150x150.jpg 150w, https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/Cylance-768x768.jpg 768w, https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/Cylance-364x364.jpg 364w, https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/Cylance-500x500.jpg 500w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"mw-100 text-justify\"><strong>Cylance Protect<\/strong> is an advanced threat protection program that utilizes machine learning and artificial intelligence to categorize files and running processes. This antivirus software quarantines any files that are deemed unsafe or abnormal. By using this technology, we can protect ourselves from both known and unknown threats while improving performance on our endpoints. Cylance is available for all faculty and staff University-owned computers. <\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><section class=\"cl-wrapper cl-boxout-wrapper\"><div class=\"cl-boxout  \">\n\n<h3 class=\"wp-block-heading has-text-align-center\">Executive Lead<\/h3>\n\n\n\n<p class=\"has-text-align-center\">Michael Khalfayan<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Technical Lead<\/h3>\n\n\n\n<p class=\"has-text-align-center\">Michael Khalfayan<br><a href=\"mailto:mkhalfayan@uri.edu\">mkhalfayan@uri.edu<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Support Team<\/h3>\n\n\n\n<p class=\"has-text-align-center\">ITS Security<\/p>\n\n<\/div><\/section><\/div>\n<\/div>\n\n\n\n<p><strong>To check if Cylance is installed on your computer:<\/strong> On a Windows computer, a green shield icon will appear in the lower right corner of your screen.  On a Mac, a black and white shield will appear in the upper right corner of your screen.  <\/p>\n\n\n\n<p>If you cannot find the icon, then search for Cylance in your search bar either at the bottom left of your screen for Windows or the top right of your screen for Mac.<\/p>\n\n\n\n<p>If you have any further questions or believe that a legitimate work-related file is listed as a threat, please email ITS Security at <a href=\"mailto:security@uri.edu\">security@uri.edu<\/a>. Please attach any relevant screenshots, computer name, and file(s) detected in your email.<\/p>\n\n\n\n<p><strong>If you require assistance installing Cylance or require consultation, please contact the ITS Service Desk.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Advanced antivirus protection using AI to safeguard URI computers from known and unknown threats.<\/p>\n","protected":false},"author":5142,"featured_media":1120,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[24],"tags":[112,7,106,8,63,10],"class_list":["post-1119","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-services","tag-anti-malware","tag-faculty","tag-secure-computing","tag-sec","tag-security-privacy","tag-students"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/posts\/1119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/users\/5142"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/comments?post=1119"}],"version-history":[{"count":5,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/posts\/1119\/revisions"}],"predecessor-version":[{"id":54455,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/posts\/1119\/revisions\/54455"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/media\/1120"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/media?parent=1119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/categories?post=1119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/tags?post=1119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}